{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:49:25Z","timestamp":1759092565668,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,8,24]],"date-time":"2014-08-24T00:00:00Z","timestamp":1408838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006754","name":"U.S. Army Research Laboratory","doi-asserted-by":"publisher","award":["W911NF-09-2-0053"],"award-info":[{"award-number":["W911NF-09-2-0053"]}],"id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["IIS-0954125","IIS-1219254"],"award-info":[{"award-number":["IIS-0954125","IIS-1219254"]}],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,8,24]]},"DOI":"10.1145\/2623330.2623729","type":"proceedings-article","created":{"date-parts":[[2014,8,22]],"date-time":"2014-08-22T19:38:46Z","timestamp":1408736326000},"page":"1057-1066","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Towards scalable critical alert mining"],"prefix":"10.1145","author":[{"given":"Bo","family":"Zong","sequence":"first","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Yinghui","family":"Wu","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Jie","family":"Song","sequence":"additional","affiliation":[{"name":"LogicMonitor, Santa Barbara, CA, USA"}]},{"given":"Ambuj K.","family":"Singh","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Hasan","family":"Cam","sequence":"additional","affiliation":[{"name":"Army Research Lab, Adelphi, MD, USA"}]},{"given":"Jiawei","family":"Han","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]},{"given":"Xifeng","family":"Yan","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,8,24]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Full version. http:\/\/www.cs.ucsb.edu\/?bzong\/doc\/full.pdf.  Full version. http:\/\/www.cs.ucsb.edu\/?bzong\/doc\/full.pdf."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.11.012"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281203"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963499"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2459976.2459989"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835934"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557047"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.118"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505541"},{"key":"e_1_3_2_2_10_1","volume-title":"ACM workshop on Data Mining for Security Applications","volume":"13","author":"Dain O.","year":"2001","unstructured":"O. Dain and R. K. Cunningham . Fusing a heterogeneous alert stream into scenarios . In ACM workshop on Data Mining for Security Applications , volume 13 , 2001 . O. Dain and R. K. Cunningham. Fusing a heterogeneous alert stream into scenarios. In ACM workshop on Data Mining for Security Applications, volume 13, 2001."},{"key":"e_1_3_2_2_11_1","volume-title":"NIPS","author":"Du N.","year":"2013","unstructured":"N. Du , L. Song , M. Gomez-Rodriguez , and H. Zha . Scalable influence estimation in continuous-time diffusion networks . In NIPS , 2013 . N. Du, L. Song, M. Gomez-Rodriguez, and H. Zha. Scalable influence estimation in continuous-time diffusion networks. In NIPS, 2013."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018477"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.14778\/2047485.2047492"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963217"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972825.40"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/950191.950192"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775101"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.80.046110"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2010.5495775"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835937"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281239"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592596"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-017-1043-5_23"},{"key":"e_1_3_2_2_25_1","volume-title":"Eighth Workshop on Computer Architecture Evaluation using Commercial Workloads","author":"Moore J.","year":"2005","unstructured":"J. Moore , J. Chase , K. Farkas , and P. Ranganathan . Data center workload monitoring, analysis, and emulation . In Eighth Workshop on Computer Architecture Evaluation using Commercial Workloads , 2005 . J. Moore, J. Chase, K. Farkas, and P. Ranganathan. Data center workload monitoring, analysis, and emulation. In Eighth Workshop on Computer Architecture Evaluation using Commercial Workloads, 2005."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01588971"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33486-3_33"},{"key":"e_1_3_2_2_29_1","first-page":"427","volume-title":"UAI","author":"Nielsen U. H.","year":"2008","unstructured":"U. H. Nielsen , J.-P. Pellet , and A. Elisseeff . Explanation trees for causal bayesian networks . In UAI , pages 427 -- 434 , 2008 . U. H. Nielsen, J.-P. Pellet, and A. Elisseeff. Explanation trees for causal bayesian networks. In UAI, pages 427--434, 2008."},{"key":"e_1_3_2_2_30_1","volume-title":"ICML","author":"Rodriguez M. G.","year":"2012","unstructured":"M. G. Rodriguez and B. Sch\u00f6lkopf . Influence maximization in continuous time diffusion networks . In ICML , 2012 . M. G. Rodriguez and B. Sch\u00f6lkopf. Influence maximization in continuous time diffusion networks. In ICML, 2012."},{"key":"e_1_3_2_2_31_1","volume-title":"A matlab toolbox for granger causal connectivity analysis. Journal of neuroscience methods","author":"Seth A. K.","year":"2010","unstructured":"A. K. Seth . A matlab toolbox for granger causal connectivity analysis. Journal of neuroscience methods , 2010 . A. K. Seth. A matlab toolbox for granger causal connectivity analysis. Journal of neuroscience methods, 2010."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009891813863"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1018912507879"},{"key":"e_1_3_2_2_34_1","volume-title":"Asymptotic statistics","author":"Van der Vaart A. W.","year":"2000","unstructured":"A. W. Van der Vaart . Asymptotic statistics , volume 3 . Cambridge university press , 2000 . A. W. Van der Vaart. Asymptotic statistics, volume 3. Cambridge university press, 2000."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04565-7","volume-title":"Approximation Algorithms","author":"Vazirani V. V.","year":"2003","unstructured":"V. V. Vazirani . Approximation Algorithms . Springer 2003 . V. V. Vazirani. Approximation Algorithms. Springer 2003."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2013.55"}],"event":{"name":"KDD '14: The 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"New York New York USA","acronym":"KDD '14"},"container-title":["Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2623330.2623729","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2623330.2623729","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:41Z","timestamp":1750231181000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2623330.2623729"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,24]]},"references-count":35,"alternative-id":["10.1145\/2623330.2623729","10.1145\/2623330"],"URL":"https:\/\/doi.org\/10.1145\/2623330.2623729","relation":{},"subject":[],"published":{"date-parts":[[2014,8,24]]},"assertion":[{"value":"2014-08-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}