{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T00:47:01Z","timestamp":1767833221111,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,8,24]],"date-time":"2008-08-24T00:00:00Z","timestamp":1219536000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,8,24]]},"DOI":"10.1145\/1401890.1401915","type":"proceedings-article","created":{"date-parts":[[2008,8,27]],"date-time":"2008-08-27T11:56:41Z","timestamp":1219838201000},"page":"169-176","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":54,"title":["Anomaly pattern detection in categorical datasets"],"prefix":"10.1145","author":[{"given":"Kaustav","family":"Das","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Jeff","family":"Schneider","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Daniel B.","family":"Neill","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,8,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The Fifth International Conference on Knowledge Discovery and Data Mining","author":"The","year":"1999","unstructured":"The third international knowledge discovery and data mining tools competition, kdd cup 1999 . In The Fifth International Conference on Knowledge Discovery and Data Mining , 1999 . The third international knowledge discovery and data mining tools competition, kdd cup 1999. In The Fifth International Conference on Knowledge Discovery and Data Mining, 1999."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1995.tb02031.x"},{"key":"e_1_3_2_1_3_1","volume-title":"Intl. Symposium on Integrated Network Mgmt.","author":"Bronstein A.","year":"2001","unstructured":"A. Bronstein , J. Das , M. Duro , R. Friedrich , G. Kleyner , M. Mueller , S. Singhal , and I. Cohen . Bayesian networks for detecting anomalies in internet-based services . In Intl. Symposium on Integrated Network Mgmt. , 2001 . A. Bronstein, J. Das, M. Duro, R. Friedrich, G. Kleyner, M. Mueller, S. Singhal, and I. Cohen. Bayesian networks for detecting anomalies in internet-based services. In Intl. Symposium on Integrated Network Mgmt., 2001."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281219"},{"issue":"613","key":"e_1_3_2_1_5_1","first-page":"623","article-title":"Internet security: malicious e-mails detection and protection","volume":"104","author":"Dong-Her S.","year":"2004","unstructured":"S. Dong-Her , C. Hsiu-Sen , C. Chun-Yuan , and B. Lin . Internet security: malicious e-mails detection and protection . Industrial Mgmt. and Data Sys. , 104 : 613 -- 623 , Sep 2004 . S. Dong-Her, C. Hsiu-Sen, C. Chun-Yuan, and B. Lin. Internet security: malicious e-mails detection and protection. Industrial Mgmt. and Data Sys., 104:613 -- 623, Sep 2004.","journal-title":"Industrial Mgmt. and Data Sys."},{"key":"e_1_3_2_1_6_1","first-page":"255","volume-title":"Proc. 17th International Conf. on Machine Learning","author":"Eskin E.","year":"2000","unstructured":"E. Eskin . Anomaly detection over noisy data using learned probability distributions . In Proc. 17th International Conf. on Machine Learning , pages 255 -- 262 . Morgan Kaufmann, San Francisco, CA , 2000 . E. Eskin. Anomaly detection over noisy data using learned probability distributions. In Proc. 17th International Conf. on Machine Learning, pages 255--262. Morgan Kaufmann, San Francisco, CA, 2000."},{"key":"e_1_3_2_1_7_1","volume-title":"Permutation Tests - A Practical Guide to Resampling Methods for Testing Hypotheses","author":"Good P.","year":"2000","unstructured":"P. Good . Permutation Tests - A Practical Guide to Resampling Methods for Testing Hypotheses . Springer-Verlag , 2 nd edition edition, 2000 . P. Good. Permutation Tests - A Practical Guide to Resampling Methods for Testing Hypotheses. Springer-Verlag, 2nd edition edition, 2000.","edition":"2"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/3468.594912"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/sim.3093"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-8137.1912.tb05611.x"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622788.1622792"},{"key":"e_1_3_2_1_12_1","first-page":"552","volume-title":"20th Intl. Conf. on Machine Learning","author":"Moore A.","year":"2003","unstructured":"A. Moore and W.-K. Wong . Optimal reinsertion : A new search operator for accelerated and more accurate bayesian network structure learning . In 20th Intl. Conf. on Machine Learning , pages 552 -- 559 , Aug 2003 . A. Moore and W.-K. Wong. Optimal reinsertion: A new search operator for accelerated and more accurate bayesian network structure learning. In 20th Intl. Conf. on Machine Learning, pages 552--559, Aug 2003."},{"key":"e_1_3_2_1_13_1","first-page":"869","volume-title":"Advances in Neural Information Processing Systems","volume":"17","author":"Neill D. B.","year":"2005","unstructured":"D. B. Neill , A. W. Moore , F. Pereira , and T. Mitchell . Detecting significant multidimensional spatial clusters . In Advances in Neural Information Processing Systems , volume 17 , pages 869 -- 876 , 2005 . D. B. Neill, A. W. Moore, F. Pereira, and T. Mitchell. Detecting significant multidimensional spatial clusters. In Advances in Neural Information Processing Systems, volume 17, pages 869--876, 2005."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"e_1_3_2_1_15_1","first-page":"808","volume-title":"Twentieth Intl. Conf. on Machine Learning","author":"Wong W. K.","year":"2003","unstructured":"W. K. Wong , A. Moore , G. Cooper , and M. Wagner . Bayesian network anomaly pattern detection for disease outbreaks . In Twentieth Intl. Conf. on Machine Learning , pages 808 -- 815 , Aug 2003 . W. K. Wong, A. Moore, G. Cooper, and M. Wagner. Bayesian network anomaly pattern detection for disease outbreaks. In Twentieth Intl. Conf. on Machine Learning, pages 808--815, Aug 2003."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 18th National Conference on Artificial Intelligence. MIT Press","author":"Wong W. K.","year":"2002","unstructured":"W. K. Wong , A. W. Moore , G. Cooper , and M. Wagner . Rule-based anomaly pattern detection for detecting disease outbreaks . In Proceedings of the 18th National Conference on Artificial Intelligence. MIT Press , 2002 . W. K. Wong, A. W. Moore, G. Cooper, and M. Wagner. Rule-based anomaly pattern detection for detecting disease outbreaks. In Proceedings of the 18th National Conference on Artificial Intelligence. MIT Press, 2002."},{"key":"e_1_3_2_1_17_1","first-page":"175","volume-title":"Probabilistic networks with undirected links for anomaly detection","author":"Ye N.","year":"2000","unstructured":"N. Ye and M. Xu . Probabilistic networks with undirected links for anomaly detection . In IEEE Systems, Man , and Cybernetics Information Assurance and Security Workshop , pages 175 -- 179 , June 2000 . N. Ye and M. Xu. Probabilistic networks with undirected links for anomaly detection. In IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, pages 175--179, June 2000."}],"event":{"name":"KDD08: The 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","location":"Las Vegas Nevada USA","acronym":"KDD08","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1401890.1401915","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1401890.1401915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:40Z","timestamp":1750255000000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1401890.1401915"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,8,24]]},"references-count":17,"alternative-id":["10.1145\/1401890.1401915","10.1145\/1401890"],"URL":"https:\/\/doi.org\/10.1145\/1401890.1401915","relation":{},"subject":[],"published":{"date-parts":[[2008,8,24]]},"assertion":[{"value":"2008-08-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}