{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:59Z","timestamp":1750307939414,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,6,20]],"date-time":"2007-06-20T00:00:00Z","timestamp":1182297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,6,20]]},"DOI":"10.1145\/1266894.1266926","type":"proceedings-article","created":{"date-parts":[[2007,9,25]],"date-time":"2007-09-25T19:20:55Z","timestamp":1190748055000},"page":"164-170","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Identification of suspicious, unknown event patterns in an event cloud"],"prefix":"10.1145","author":[{"given":"Alexander","family":"Widder","sequence":"first","affiliation":[{"name":"Centrum f\u00fcr Informations-Technologie Transfer GmbH, Regensburg, Germany"}]},{"given":"Rainer v.","family":"Ammon","sequence":"additional","affiliation":[{"name":"Centrum f\u00fcr Informations-Technologie Transfer GmbH, Regensburg, Germany"}]},{"given":"Philippe","family":"Schaeffer","sequence":"additional","affiliation":[{"name":"T\u00dcV Rheinland Secure iT GmBH, Cologne, Germany"}]},{"given":"Christian","family":"Wolff","sequence":"additional","affiliation":[{"name":"University of Regensburg, Regensburg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2007,6,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1002\/0471722154"},{"volume-title":"CEP Solution","author":"AptSoft Corporation","key":"e_1_3_2_1_2_1","unstructured":"AptSoft Corporation . CEP Solution . http:\/\/www.aptsoft.com, accessed 2006-12-22. AptSoft Corporation. CEP Solution. http:\/\/www.aptsoft.com, accessed 2006-12-22."},{"volume-title":"Fraud Detection and Event Processing for Predictive Business","author":"Bass T.","key":"e_1_3_2_1_3_1","unstructured":"Bass , T. Fraud Detection and Event Processing for Predictive Business . http:\/\/www.tibco.com\/resources\/mk\/fraud_detection_in_cep_wp.pdf, accessed 2007-01-31. Bass, T. Fraud Detection and Event Processing for Predictive Business. http:\/\/www.tibco.com\/resources\/mk\/fraud_detection_in_cep_wp.pdf, accessed 2007-01-31."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/332051.332079"},{"key":"e_1_3_2_1_5_1","volume-title":"Data Mining Methods for Network Intrusion Detection","author":"Brugger T.","year":"2004","unstructured":"Brugger , T. Data Mining Methods for Network Intrusion Detection . University of California at Davis , 2004 . Brugger, T. Data Mining Methods for Network Intrusion Detection. University of California at Davis, 2004."},{"key":"e_1_3_2_1_6_1","first-page":"01","author":"CEP Interest Group","year":"2006","unstructured":"CEP Interest Group . http:\/\/tech.groups.yahoo.com\/group\/CEP- Interest , Blog entry Thu Oct 5 2006 4: 01 pm form leondong1982, accessed 2006-12-09. CEP Interest Group. http:\/\/tech.groups.yahoo.com\/group\/CEP-Interest, Blog entry Thu Oct 5 2006 4:01 pm form leondong1982, accessed 2006-12-09.","journal-title":"Thu"},{"key":"e_1_3_2_1_7_1","unstructured":"Complexevents.com. http:\/\/complexevents.com\/?cat=15 accessed 2006-12-06.  Complexevents.com. http:\/\/complexevents.com\/?cat=15 accessed 2006-12-06."},{"volume-title":"Third Annual UK Online Fraud Report","author":"CyberSource","key":"e_1_3_2_1_8_1","unstructured":"CyberSource . Third Annual UK Online Fraud Report . http:\/\/www.cybersource.co.uk\/resources\/fraud_report_2007, accessed 2007-02-07. CyberSource. Third Annual UK Online Fraud Report. http:\/\/www.cybersource.co.uk\/resources\/fraud_report_2007, accessed 2007-02-07."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the third Biennial Conference on Innovative Data Systems Research","author":"Demers A.","year":"2007","unstructured":"Demers , A. , Gehrke , J. , Panda , B. , Riedewald , M. , Sharma , V. , and White , W . Cayuga: A General Purpose Event Monitoring System . In Proceedings of the third Biennial Conference on Innovative Data Systems Research , Asilomar , 2007 . Demers, A., Gehrke, J., Panda, B., Riedewald, M., Sharma, V., and White, W. Cayuga: A General Purpose Event Monitoring System. In Proceedings of the third Biennial Conference on Innovative Data Systems Research, Asilomar, 2007."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-010-9072-8"},{"volume-title":"Mainstream BI: A dashboard on every desktop?","author":"Fernandes L.","key":"e_1_3_2_1_11_1","unstructured":"Fernandes , L. Mainstream BI: A dashboard on every desktop? . http:\/\/www.it-director.com\/enterprise\/content.php?cid=9035, accessed 2006-12-06. Fernandes, L. Mainstream BI: A dashboard on every desktop?. http:\/\/www.it-director.com\/enterprise\/content.php?cid=9035, accessed 2006-12-06."},{"key":"e_1_3_2_1_12_1","volume-title":"Event Processing Symposium. http:\/\/complexevents.com\/?p=150","author":"First","year":"2006","unstructured":"First Event Processing Symposium. http:\/\/complexevents.com\/?p=150 , accessed 2006 -12-29. First Event Processing Symposium. http:\/\/complexevents.com\/?p=150, accessed 2006-12-29."},{"key":"e_1_3_2_1_13_1","volume-title":"A Treatise on Many-Valued Logics","author":"Gottwald S.","year":"2001","unstructured":"Gottwald , S. A Treatise on Many-Valued Logics . Research Studies Press LTD , Baldock, Hertfordshire , 2001 . Gottwald, S. A Treatise on Many-Valued Logics. Research Studies Press LTD, Baldock, Hertfordshire, 2001."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the third Biennial Conference on Innovative Data Systems Research","author":"Gyllstrom D.","year":"2007","unstructured":"Gyllstrom , D. , Diao , Y. , Stahlberg , P. , Chae , H. , Anderson , G. , and Wu , E . SASE: Complex Event Processing over Streams . In Proceedings of the third Biennial Conference on Innovative Data Systems Research , Asilomar , 2007 . Gyllstrom, D., Diao, Y., Stahlberg, P., Chae, H., Anderson, G., and Wu, E. SASE: Complex Event Processing over Streams. In Proceedings of the third Biennial Conference on Innovative Data Systems Research, Asilomar, 2007."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1896579.1897018"},{"volume-title":"The market for event processing is growing and at some point, it will explode","author":"Howard P.","key":"e_1_3_2_1_16_1","unstructured":"Howard , P. The market for event processing is growing and at some point, it will explode . http:\/\/www.bloor-research.com\/research\/research_report\/802\/event_processing.html, accessed 2006-12-22. Howard, P. The market for event processing is growing and at some point, it will explode. http:\/\/www.bloor-research.com\/research\/research_report\/802\/event_processing.html, accessed 2006-12-22."},{"volume-title":"Best practices for problem determination mean faster problem resolution","author":"Autonomic Computing","key":"e_1_3_2_1_17_1","unstructured":"IBM Autonomic Computing , Best practices for problem determination mean faster problem resolution . http:\/\/www.03.ibm.com\/autonomic\/pd\/pdf\/AC_PD_whitepaper_V4.pdf, accessed 2007-02-10. IBM Autonomic Computing, Best practices for problem determination mean faster problem resolution. http:\/\/www.03.ibm.com\/autonomic\/pd\/pdf\/AC_PD_whitepaper_V4.pdf, accessed 2007-02-10."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/516346"},{"key":"e_1_3_2_1_19_1","first-page":"85","volume-title":"Proceedings of the second DARPA Information Survivability Conference and Exposition","author":"Lee W.","year":"2000","unstructured":"Lee , W. , Stolfo , S. , Chan , P. , Eskin , E. , Fan , W. , Miller , M. , Hershkop , S. , and Zhang , J . Real Time Data Mining-based Intrusion Detection . In Proceedings of the second DARPA Information Survivability Conference and Exposition , Anaheim , 2000 , pp. 85 -- 100 . Lee, W., Stolfo, S., Chan, P., Eskin, E., Fan, W., Miller, M., Hershkop, S., and Zhang, J. Real Time Data Mining-based Intrusion Detection. In Proceedings of the second DARPA Information Survivability Conference and Exposition, Anaheim, 2000, pp. 85--100."},{"key":"e_1_3_2_1_20_1","volume-title":"The power of events","author":"Luckham D.","year":"2002","unstructured":"Luckham , D. The power of events . Addison Wesley , San Francisco , New York, 2002 . Luckham, D. The power of events. Addison Wesley, San Francisco, New York, 2002."},{"key":"e_1_3_2_1_21_1","volume-title":"Multivariate Analysis","author":"Mardia K. V.","year":"1979","unstructured":"Mardia , K. V. , Kent , J. T. , and Bibby , J. M . Multivariate Analysis . Academic Press , San Diego , San Francisco, New York, Boston, London, Sidney, Tokyo, 1979 . Mardia, K. V., Kent, J. T., and Bibby, J. M. Multivariate Analysis. Academic Press, San Diego, San Francisco, New York, Boston, London, Sidney, Tokyo, 1979."},{"key":"e_1_3_2_1_22_1","volume-title":"AAAI--98 Workshop on \"Learning for Text Categorization\". http:\/\/www.kamalnigam.com\/papers\/multinomial-aaaiws98","author":"McCallum A.","year":"2007","unstructured":"McCallum , A. , and Kamal , N . A Comparison of Event Models for Naive Bayes Text Classification . AAAI--98 Workshop on \"Learning for Text Categorization\". http:\/\/www.kamalnigam.com\/papers\/multinomial-aaaiws98 .pdf, accessed 2007 -02-15. McCallum, A., and Kamal, N. A Comparison of Event Models for Naive Bayes Text Classification. AAAI--98 Workshop on \"Learning for Text Categorization\". http:\/\/www.kamalnigam.com\/papers\/multinomial-aaaiws98.pdf, accessed 2007-02-15."},{"issue":"2","key":"e_1_3_2_1_23_1","first-page":"257","volume":"77","author":"Rabiner","year":"1989","unstructured":"Rabiner , L. A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition. In Proceedings of the IEEE 77 ( 2 ), 1989 , pp. 257 -- 286 . Rabiner, L. A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition. In Proceedings of the IEEE 77(2), 1989, pp. 257--286.","journal-title":"A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition. In Proceedings of the IEEE"},{"volume-title":"Ambient Business Intelligence: Pervasive technology to surround and inform","author":"Raden N.","key":"e_1_3_2_1_24_1","unstructured":"Raden , N. Ambient Business Intelligence: Pervasive technology to surround and inform . http:\/\/www.hiredbrains.com\/Ambient%20Business%20%Int elligence.pdf, accessed 2006-12-06. Raden, N. Ambient Business Intelligence: Pervasive technology to surround and inform. http:\/\/www.hiredbrains.com\/Ambient%20Business%20%Int elligence.pdf, accessed 2006-12-06."},{"key":"e_1_3_2_1_25_1","volume-title":"Cluster Analysis for Researchers","author":"Romesburg C.","year":"2004","unstructured":"Romesburg , C. Cluster Analysis for Researchers . Lulu Press , Morrisville , 2004 . Romesburg, C. Cluster Analysis for Researchers. Lulu Press, Morrisville, 2004."},{"volume-title":"Event Processing Seminar","author":"Schloss Dagstuhl","key":"e_1_3_2_1_26_1","unstructured":"Schloss Dagstuhl . Event Processing Seminar . http:\/\/www.dagstuhl.de\/en\/program\/calendar\/semhp\/?semid=32202, accessed 2006-12-28. Schloss Dagstuhl. Event Processing Seminar. http:\/\/www.dagstuhl.de\/en\/program\/calendar\/semhp\/?semid=32202, accessed 2006-12-28."},{"key":"e_1_3_2_1_27_1","unstructured":"Schoder D. Ambient Business http:\/\/www.wim.unikoeln.de\/Ambient-Business.430.0.html accessed 2006-12-21.  Schoder D. Ambient Business http:\/\/www.wim.unikoeln.de\/Ambient-Business.430.0.html accessed 2006-12-21."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","volume-title":"A Mathematical Theory of Evidence","author":"Shafer G.","year":"1976","unstructured":"Shafer , G. A Mathematical Theory of Evidence . Princeton University Press , Princeton , 1976 . Shafer, G. A Mathematical Theory of Evidence. Princeton University Press, Princeton, 1976."},{"key":"e_1_3_2_1_29_1","volume-title":"J. Genetically Optimized Neuronal Network Classifiers for Bankruptcy Prediction. In Proceedings of the 29th annual Hawaii International Conference on System Sciences","author":"Wallrafen","year":"1996","unstructured":"Wallrafen , J. Genetically Optimized Neuronal Network Classifiers for Bankruptcy Prediction. In Proceedings of the 29th annual Hawaii International Conference on System Sciences , Maui , 1996 . Wallrafen, J. Genetically Optimized Neuronal Network Classifiers for Bankruptcy Prediction. In Proceedings of the 29th annual Hawaii International Conference on System Sciences, Maui, 1996."}],"event":{"name":"DEBS07: Distributed Event-based Systems Conference","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","IEEE","ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering","USENIX Assoc USENIX Assoc"],"location":"Toronto Ontario Canada","acronym":"DEBS07"},"container-title":["Proceedings of the 2007 inaugural international conference on Distributed event-based systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1266894.1266926","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1266894.1266926","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:52:14Z","timestamp":1750258334000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1266894.1266926"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,6,20]]},"references-count":29,"alternative-id":["10.1145\/1266894.1266926","10.1145\/1266894"],"URL":"https:\/\/doi.org\/10.1145\/1266894.1266926","relation":{},"subject":[],"published":{"date-parts":[[2007,6,20]]},"assertion":[{"value":"2007-06-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}