{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:42:51Z","timestamp":1730238171047,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/iccw.2015.7247390","type":"proceedings-article","created":{"date-parts":[[2015,9,14]],"date-time":"2015-09-14T17:18:06Z","timestamp":1442251086000},"page":"1491-1496","source":"Crossref","is-referenced-by-count":6,"title":["A multi-objective clustering approach for the detection of abnormal behaviors in mobile networks"],"prefix":"10.1109","author":[{"given":"Ilias","family":"Kalamaras","sequence":"first","affiliation":[]},{"given":"Anastasios","family":"Drosou","sequence":"additional","affiliation":[]},{"given":"Dimitrios","family":"Tzovaras","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.183"},{"key":"ref11","first-page":"2211","article-title":"Multiple kernel learning algorithms","volume":"12","author":"g\u00f6nen","year":"2011","journal-title":"The Journal of Machine Learning Research"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/279943.279962"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/354756.354805"},{"year":"2014","key":"ref14","article-title":"GenieLog."},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36883-7_6"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2389662"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2014.2316473"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-010-0182-0"},{"key":"ref6","first-page":"299","article-title":"A visual approach for monitoring logs","volume":"98","author":"girardin","year":"1998","journal-title":"LISA"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00219-9_2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78243-8_13"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2005.1532063"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2009.5072143"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2011.144"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1101149.1101337"}],"event":{"name":"2015 ICC - 2015 IEEE International Conference on Communications Workshops (ICC)","start":{"date-parts":[[2015,6,8]]},"location":"London, United Kingdom","end":{"date-parts":[[2015,6,12]]}},"container-title":["2015 IEEE International Conference on Communication Workshop (ICCW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7226899\/7247062\/07247390.pdf?arnumber=7247390","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T00:04:17Z","timestamp":1490400257000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7247390\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iccw.2015.7247390","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}