{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:21:29Z","timestamp":1729624889314,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/fpt.2014.7082772","type":"proceedings-article","created":{"date-parts":[[2015,4,13]],"date-time":"2015-04-13T21:56:12Z","timestamp":1428962172000},"page":"175-182","source":"Crossref","is-referenced-by-count":5,"title":["An FPGA-based spectral anomaly detection system"],"prefix":"10.1109","author":[{"given":"Duncan J. M.","family":"Moss","sequence":"first","affiliation":[]},{"given":"Zhe","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Nicholas J.","family":"Fraser","sequence":"additional","affiliation":[]},{"given":"Philip H. W.","family":"Leong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/SSP.2012.6319708"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1137\/1.9781611972757.55"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/882085.882086"},{"year":"2014","author":"moss","article-title":"Spectral anomaly detector: Online repository","key":"ref13"},{"year":"2011","author":"keogh","article-title":"The ucr time series classification\/clustering homepage","key":"ref14"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/1541880.1541882"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/CIFEr.2013.6611700"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1016\/j.comnet.2007.02.001"},{"year":"1992","author":"press","article-title":"Numerical Recipes in C (2Nd Ed.): The Art of Scientific Computing","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1023\/B:AIRE.0000045502.10941.a9"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"521","DOI":"10.3233\/IDA-2006-10604","article-title":"A comprehensive survey of numeric and symbolic outlier mining techniques","volume":"10","author":"agyemang","year":"2006","journal-title":"Intell Data Anal"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1086\/160554"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1098\/rsta.2006.1931"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TIFS.2007.916288"}],"event":{"name":"2014 International Conference on Field-Programmable Technology (FPT)","start":{"date-parts":[[2014,12,10]]},"location":"Shanghai, China","end":{"date-parts":[[2014,12,12]]}},"container-title":["2014 International Conference on Field-Programmable Technology (FPT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7063887\/7082738\/07082772.pdf?arnumber=7082772","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,23]],"date-time":"2019-08-23T11:09:04Z","timestamp":1566558544000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7082772\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/fpt.2014.7082772","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}