{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:56:14Z","timestamp":1725515774023},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/iwcmc.2015.7289222","type":"proceedings-article","created":{"date-parts":[[2015,10,5]],"date-time":"2015-10-05T22:02:15Z","timestamp":1444082535000},"page":"1017-1022","source":"Crossref","is-referenced-by-count":0,"title":["CADMANT: Context Anomaly Detection for MAintenance and Network Troubleshooting"],"prefix":"10.1109","author":[{"given":"Eloy","family":"Martinez","sequence":"first","affiliation":[]},{"given":"Enda","family":"Fallon","sequence":"additional","affiliation":[]},{"given":"Sheila","family":"Fallon","sequence":"additional","affiliation":[]},{"given":"MingXue","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.184"},{"journal-title":"On Clustering Massive Text and Categorical Data Streams","year":"2009","author":"aggarwal","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/PACIFICVIS.2011.5742382"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.109"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1109\/MC.2013.152","article-title":"Real-time visual analytics of text data streams","author":"keim","year":"2013","journal-title":"IEEE Computer"},{"key":"ref15","article-title":"EventRiver: Visually Exploring Text Collections With Temporal References","author":"luo","year":"2012","journal-title":"IEEE Transactions on Visualization and Computer Graphics"},{"key":"ref16","article-title":"Sliding Window-based Outlier Detection in Mixed Data Stream","author":"xiaoke","year":"2010","journal-title":"Information Systems and Computers"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12098-5_17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CIDM.2007.368917"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2011.2163280"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071"},{"key":"ref3","article-title":"Text-Mining: The next step in search technology","author":"scholtes","year":"2009","journal-title":"Global E-Discovery\/E-Disclosure Workshop"},{"year":"0","key":"ref6"},{"year":"0","key":"ref5"},{"key":"ref8","article-title":"An analysis of telecommunication Fraud using outlier detection model based on similar coefficient Sum","author":"gupta","year":"2014","journal-title":"International Journal of Soft Computing and Engineering (IJSCE)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2006.255127"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN.2012.6376017"},{"key":"ref1","article-title":"NEPnet: A scalable monitoring system for anomaly detection of network service","author":"cheng","year":"2011","journal-title":"Network and Service Management (CNSM) 7th International Conference on 2011"},{"journal-title":"Anomaly Detection A Survey","year":"2009","author":"chandola","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.109"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140484"}],"event":{"name":"2015 International Wireless Communications and Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2015,8,24]]},"location":"Dubrovnik, Croatia","end":{"date-parts":[[2015,8,28]]}},"container-title":["2015 International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7275105\/7288920\/07289222.pdf?arnumber=7289222","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T20:49:01Z","timestamp":1498250941000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7289222\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2015.7289222","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}