{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:33:23Z","timestamp":1771706003788,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,28]],"date-time":"2015-10-28T00:00:00Z","timestamp":1445990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"The National High Technology Development Program of China (863 program)","award":["2013AA013302"],"award-info":[{"award-number":["2013AA013302"]}]},{"name":"The National Key Basic Research Program of China (973 program)","award":["2013CB329105"],"award-info":[{"award-number":["2013CB329105"]}]},{"name":"The National Natural Science Foundation of China (NSFC)","award":["61472210"],"award-info":[{"award-number":["61472210"]}]},{"name":"The National Natural Science Foundation of China (NSFC)","award":["61472214"],"award-info":[{"award-number":["61472214"]}]},{"name":"The State Key Program of National Science of China","award":["61233007"],"award-info":[{"award-number":["61233007"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,28]]},"DOI":"10.1145\/2815675.2815679","type":"proceedings-article","created":{"date-parts":[[2015,10,27]],"date-time":"2015-10-27T12:37:04Z","timestamp":1445949424000},"page":"211-224","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":216,"title":["Opprentice"],"prefix":"10.1145","author":[{"given":"Dapeng","family":"Liu","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Youjian","family":"Zhao","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Haowen","family":"Xu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Yongqian","family":"Sun","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Dan","family":"Pei","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Jiao","family":"Luo","sequence":"additional","affiliation":[{"name":"Baidu, Beijing, China"}]},{"given":"Xiaowei","family":"Jing","sequence":"additional","affiliation":[{"name":"PetroChina, Beijing, China"}]},{"given":"Mei","family":"Feng","sequence":"additional","affiliation":[{"name":"PetroChina, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2015,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486035"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851219"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2079296.2079309"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851228"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195498"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195694"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2079296.2079309"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1921168.1921179"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251086.1251117"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251086.1251116"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948236"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/637201.637210"},{"key":"e_1_3_2_1_13_1","first-page":"139","volume-title":"LISA","author":"Brutlag Jake D","year":"2000","unstructured":"Jake D Brutlag . Aberrant behavior detection in time series for network monitoring . In LISA , pages 139 -- 146 , 2000 . Jake D Brutlag. Aberrant behavior detection in time series for network monitoring. In LISA, pages 139--146, 2000."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851215"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644895"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177099"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015492"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080118"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/2540128.2540390"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2009.4804320"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5501984"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1817271.1817458"},{"key":"e_1_3_2_1_24_1","unstructured":"Amazon cloudwatch alarm. http:\/\/docs.aws.amazon.com\/AmazonCloudWatch\/latest\/DeveloperGuide\/ConsoleAlarms.html.  Amazon cloudwatch alarm. http:\/\/docs.aws.amazon.com\/AmazonCloudWatch\/latest\/DeveloperGuide\/ConsoleAlarms.html."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1921168.1921175"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644897"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1341431.1341437"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2600428.2609627"},{"key":"e_1_3_2_1_30_1","volume-title":"The problem of concept drift: definitions and related work. Computer Science Department","author":"Tsymbal Alexey","year":"2004","unstructured":"Alexey Tsymbal . The problem of concept drift: definitions and related work. Computer Science Department , Trinity College Dublin , 2004 . Alexey Tsymbal. The problem of concept drift: definitions and related work. Computer Science Department, Trinity College Dublin, 2004."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.03.025"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833642"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(95)00118-2"},{"key":"e_1_3_2_1_35_1","volume-title":"Time series analysis: forecasting and control","author":"Box George EP","year":"2013","unstructured":"George EP Box , Gwilym M Jenkins , and Gregory C Reinsel . Time series analysis: forecasting and control . John Wiley & Sons , 2013 . George EP Box, Gwilym M Jenkins, and Gregory C Reinsel. Time series analysis: forecasting and control. John Wiley & Sons, 2013."},{"key":"e_1_3_2_1_36_1","unstructured":"Auto arima. http:\/\/www.inside-r.org\/packages\/cran\/forecast\/docs\/auto.arima.  Auto arima. http:\/\/www.inside-r.org\/packages\/cran\/forecast\/docs\/auto.arima."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-7-3"},{"issue":"3","key":"e_1_3_2_1_38_1","first-page":"18","article-title":"Classification and regression by randomforest","volume":"2","author":"Liaw Andy","year":"2002","unstructured":"Andy Liaw and Matthew Wiener . Classification and regression by randomforest . R news , 2 ( 3 ): 18 -- 22 , 2002 . Andy Liaw and Matthew Wiener. Classification and regression by randomforest. R news, 2(3):18--22, 2002.","journal-title":"R news"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/944919.944968"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(97)00043-X"},{"key":"e_1_3_2_1_41_1","volume-title":"Classification and regression trees","author":"Breiman Leo","year":"1984","unstructured":"Leo Breiman , Jerome Friedman , Charles J Stone , and Richard A Olshen . Classification and regression trees . CRC press , 1984 . Leo Breiman, Jerome Friedman, Charles J Stone, and Richard A Olshen. Classification and regression trees. CRC press, 1984."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486025"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639137"},{"key":"e_1_3_2_1_44_1","article-title":"A short introduction to boosting","author":"Freund Yoav","year":"1999","unstructured":"Yoav Freund , Robert Schapire , and N Abe . A short introduction to boosting . Journal-Japanese Society For Artificial Intelligence, 14(771--780):1612 , 1999 . Yoav Freund, Robert Schapire, and N Abe. A short introduction to boosting. Journal-Japanese Society For Artificial Intelligence, 14(771--780):1612, 1999.","journal-title":"Journal-Japanese Society For Artificial Intelligence, 14(771--780):1612"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143874"},{"key":"e_1_3_2_1_46_1","volume-title":"The inconsistency of \"optimal\" cutpoints obtained using two criteria based on the receiver operating characteristic curve. American journal of epidemiology, 163(7):670--675","author":"Perkins Neil J","year":"2006","unstructured":"Neil J Perkins and Enrique F Schisterman . The inconsistency of \"optimal\" cutpoints obtained using two criteria based on the receiver operating characteristic curve. American journal of epidemiology, 163(7):670--675 , 2006 . Neil J Perkins and Enrique F Schisterman. The inconsistency of \"optimal\" cutpoints obtained using two criteria based on the receiver operating characteristic curve. American journal of epidemiology, 163(7):670--675, 2006."},{"key":"e_1_3_2_1_47_1","first-page":"1137","volume-title":"IJCAI","volume":"14","author":"Ron","year":"1995","unstructured":"Ron Kohavi et al. A study of cross-validation and bootstrap for accuracy estimation and model selection . In IJCAI , volume 14 , pages 1137 -- 1145 , 1995 . Ron Kohavi et al. A study of cross-validation and bootstrap for accuracy estimation and model selection. In IJCAI, volume 14, pages 1137--1145, 1995."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_49_1","volume-title":"Velocity Web Perfomance and Operations Conference. O'REILLY","author":"Lazur Adam","year":"2013","unstructured":"Adam Lazur . Building a billion user load balancer . In Velocity Web Perfomance and Operations Conference. O'REILLY , 2013 . Adam Lazur. Building a billion user load balancer. In Velocity Web Perfomance and Operations Conference. O'REILLY, 2013."},{"key":"e_1_3_2_1_50_1","first-page":"451","volume-title":"Machine learning and knowledge discovery in databases","author":"Boyd Kendrick","year":"2013","unstructured":"Kendrick Boyd , Kevin H Eng, and C David Page. Area under the precision-recall curve: Point estimates and confidence intervals . In Machine learning and knowledge discovery in databases , pages 451 -- 466 . Springer , 2013 . Kendrick Boyd, Kevin H Eng, and C David Page. Area under the precision-recall curve: Point estimates and confidence intervals. In Machine learning and knowledge discovery in databases, pages 451--466. Springer, 2013."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.159"}],"event":{"name":"IMC '15: Internet Measurement Conference","location":"Tokyo Japan","acronym":"IMC '15","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 2015 Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2815675.2815679","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2815675.2815679","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:22Z","timestamp":1750225702000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2815675.2815679"}},"subtitle":["Towards Practical and Automatic Anomaly Detection Through Machine Learning"],"short-title":[],"issued":{"date-parts":[[2015,10,28]]},"references-count":51,"alternative-id":["10.1145\/2815675.2815679","10.1145\/2815675"],"URL":"https:\/\/doi.org\/10.1145\/2815675.2815679","relation":{},"subject":[],"published":{"date-parts":[[2015,10,28]]},"assertion":[{"value":"2015-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}