{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T18:14:25Z","timestamp":1763057665551,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1109\/rait.2012.6194613","type":"proceedings-article","created":{"date-parts":[[2012,5,11]],"date-time":"2012-05-11T21:23:58Z","timestamp":1336771438000},"page":"515-519","source":"Crossref","is-referenced-by-count":6,"title":["Pre-clustering algorithm for anomaly detection and clustering that uses variable size buckets"],"prefix":"10.1109","author":[{"given":"Manish","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Durga","family":"Toshniwal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/375827.375845"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/CIDM.2007.368917"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.1145\/235968.233324","article-title":"BIRCH: \"An efficient data clustering method for very large databases","author":"zhang","year":"1996","journal-title":"ACM SIGMOD Conference"},{"key":"15","first-page":"164","article-title":"A linear method for deviation detection in large databases","author":"arning","year":"1996","journal-title":"Proc of KDD'96"},{"key":"16","first-page":"170","article-title":"Outlier detection using replicator neural networks","author":"harkins","year":"2002","journal-title":"Proc of DaWaK'02"},{"key":"13","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-0953-0_4","article-title":"A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data","author":"eskin","year":"2002","journal-title":"Data Mining for Security Applications"},{"key":"14","article-title":"Algorithms for mining distance-based outliers in large datasets","author":"knorr","year":"1998","journal-title":"Proc 24th VLDB"},{"key":"11","article-title":"Detecting distance-based outliers in streams of data","author":"angiulli","year":"2007","journal-title":"Proc of the Sixteenth ACM Conf on Information and Knowledge Management"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/375663.375668"},{"journal-title":"R A Fisher Iris Data Set","year":"1936","key":"3"},{"key":"20","article-title":"A cluster-based approach for outlier detection in dynamic data streams (KORM: K-median OutlieR miner)","volume":"2","author":"dhaliwal","year":"2010","journal-title":"Journal of Computing"},{"key":"2","first-page":"165","article-title":"Streaming algorithms for k-center clustering with outliers and with anonymity","author":"mccutchen","year":"2008","journal-title":"APPROX and RANDOM 2008"},{"key":"1","first-page":"15","article-title":"Adaptive sampling for k-means clustering","author":"aggarwal","year":"2009","journal-title":"Microsoft Research India"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2008.374"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/780542.780548"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-009-5103-0"},{"journal-title":"KDD Cup 1999 Dataset of Network Intrusion Detection in Systems","year":"0","key":"5"},{"journal-title":"Data Minig Concepts and Techniques","year":"0","author":"han","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335437"}],"event":{"name":"2012 1st International Conference on Recent Advances in Information Technology (RAIT)","start":{"date-parts":[[2012,3,15]]},"location":"Dhanbad, India","end":{"date-parts":[[2012,3,17]]}},"container-title":["2012 1st International Conference on Recent Advances in Information Technology (RAIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6188804\/6194433\/06194613.pdf?arnumber=6194613","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T18:38:48Z","timestamp":1497983928000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6194613\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/rait.2012.6194613","relation":{},"subject":[],"published":{"date-parts":[[2012,3]]}}}