{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T00:15:44Z","timestamp":1756167344625,"version":"3.44.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2012,6,1]],"date-time":"2012-06-01T00:00:00Z","timestamp":1338508800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2012,6,1]],"date-time":"2012-06-01T00:00:00Z","timestamp":1338508800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/isi.2012.6284312","type":"proceedings-article","created":{"date-parts":[[2012,8,30]],"date-time":"2012-08-30T16:57:57Z","timestamp":1346345877000},"page":"215-220","source":"Crossref","is-referenced-by-count":2,"title":["Design and implementation of SNODSOC: Novel class detection for social network analysis"],"prefix":"10.1109","author":[{"given":"Satyen","family":"Abrol","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Texas at Dallas, Richardson, USA"}]},{"given":"Latifur","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Texas at Dallas, Richardson, USA"}]},{"given":"Vaibhav","family":"Khadilkar","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Texas at Dallas, Richardson, USA"}]},{"given":"Bhavani","family":"Thuraisingham","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Texas at Dallas, Richardson, USA"}]},{"given":"Tyrone","family":"Cadenhead","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Texas at Dallas, Richardson, USA"}]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1049\/cp:20000333"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.157"},{"key":"14","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1109\/ICPR.2002.1047476","article-title":"Parzen-window network intrusion detectors","author":"yan yeung","year":"2002","journal-title":"International Conference on Pattern Recognition"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-011-0447-8"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1363686.1363912"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.3115\/1620754.1620829"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2003.08.002"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1102351.1102408"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.61"},{"key":"7","article-title":"Novelty Detection: A Review. Part 1: Statistical Approaches, Part 2: Neural Network Based Approaches","volume":"83","author":"markou","year":"2003","journal-title":"Signal Processing"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020476"},{"key":"5","first-page":"102","article-title":"Dynamic feature space and incremental feature selection for the classification of textual data streams","author":"katakis","year":"0","journal-title":"European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD 2006) Berlin Germany September 18-22 2006"},{"key":"4","article-title":"Social networks that matter: Twitter under the microscope","volume":"14","author":"huberman","year":"2009","journal-title":"First Monday"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.160"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.49"}],"event":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics (ISI 2012)","start":{"date-parts":[[2012,6,11]]},"location":"Washington, DC, USA","end":{"date-parts":[[2012,6,14]]}},"container-title":["2012 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6269208\/6281845\/06284312.pdf?arnumber=6284312","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T20:16:04Z","timestamp":1756152964000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6284312\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/isi.2012.6284312","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}