{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T23:24:39Z","timestamp":1775258679967,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T00:00:00Z","timestamp":1540425600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2016YFB1000503"],"award-info":[{"award-number":["2016YFB1000503"]}]},{"name":"Beihang University Innovation & Practice Fund for Graduate","award":["YCSJ-02-2018-04"],"award-info":[{"award-number":["YCSJ-02-2018-04"]}]},{"name":"National Natural Science Foundation of China","award":["615720626150201961732002"],"award-info":[{"award-number":["615720626150201961732002"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,25]]},"DOI":"10.1145\/3242102.3242130","type":"proceedings-article","created":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T15:34:05Z","timestamp":1540568045000},"page":"71-78","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Network Alarm Flood Pattern Mining Algorithm Based on Multi-dimensional Association"],"prefix":"10.1145","author":[{"given":"Xudong","family":"Zhang","sequence":"first","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"given":"Yuebin","family":"Bai","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"given":"Peng","family":"Feng","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"given":"Weitao","family":"Wang","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"given":"Shuai","family":"Liu","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"given":"Wenhao","family":"Jiang","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"given":"Junfang","family":"Zeng","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]},{"given":"Rui","family":"Wang","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2018,10,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2012.2230627"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.11.012"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2009.22"},{"key":"e_1_3_2_1_4_1","volume-title":"Data mining techniques for alarm rationalization. (01","author":"Cisar Petr","year":"2009","unstructured":"Petr Cisar , E Hostalkova , and Petr Stluka . 2009. Data mining techniques for alarm rationalization. (01 2009 ), 1457--1462. Petr Cisar, E Hostalkova, and Petr Stluka. 2009. Data mining techniques for alarm rationalization. (01 2009), 1457--1462."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/2027819.2027861"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Jens Folmer and Birgit Vogel-Heuser. 2012. Computing dependent industrial alarms for alarm flood reduction. In International Multi-Conference on Systems Signals and Devices. 1 -- 6. Jens Folmer and Birgit Vogel-Heuser. 2012. Computing dependent industrial alarms for alarm flood reduction. In International Multi-Conference on Systems Signals and Devices. 1 -- 6.","DOI":"10.1109\/SSD.2012.6198008"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335372"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"A Hanemann and P Marcu. 2008. Algorithm design and application of service-oriented event correlation. In Ieee\/ifip International Workshop on Business-Driven It Management . 61--70. A Hanemann and P Marcu. 2008. Algorithm design and application of service-oriented event correlation. In Ieee\/ifip International Workshop on Business-Driven It Management . 61--70.","DOI":"10.1109\/BDIM.2008.4540075"},{"key":"e_1_3_2_1_9_1","volume-title":"19th International Congress of Chemical and Process Engineering, Prague, Czech Republic .","author":"Hostalkova E","year":"2010","unstructured":"E Hostalkova and P Stluka . 2010 . Alarm rationalization support via correlation analysis of alarm history . In 19th International Congress of Chemical and Process Engineering, Prague, Czech Republic . E Hostalkova and P Stluka. 2010. Alarm rationalization support via correlation analysis of alarm history. In 19th International Congress of Chemical and Process Engineering, Prague, Czech Republic ."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/WKDD.2008.32"},{"key":"e_1_3_2_1_11_1","volume-title":"International Conference on Telecommunications . 361--365","author":"Jukic O.","unstructured":"O. Jukic and M. Kunstic . 2009. Logical inventory database integration into network problems frequency detection process . In International Conference on Telecommunications . 361--365 . O. Jukic and M. Kunstic. 2009. Logical inventory database integration into network problems frequency detection process. In International Conference on Telecommunications . 361--365."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88192-6_14"},{"key":"e_1_3_2_1_13_1","volume-title":"A Method for Pattern Mining in Multiple Alarm Flood Sequences. Chemical Engineering Research & Design","author":"Lai Shiqi","year":"2017","unstructured":"Shiqi Lai and Tongwen Chen . 2017. A Method for Pattern Mining in Multiple Alarm Flood Sequences. Chemical Engineering Research & Design ( 2017 ). Shiqi Lai and Tongwen Chen. 2017. A Method for Pattern Mining in Multiple Alarm Flood Sequences. Chemical Engineering Research & Design (2017)."},{"key":"e_1_3_2_1_14_1","unstructured":"Lundy Lewis. 1995. Managing Computer Networks: A Case-Based Reasoning Approach . Lundy Lewis. 1995. Managing Computer Networks: A Case-Based Reasoning Approach ."},{"key":"e_1_3_2_1_15_1","volume-title":"A survey of fault localization techniques in computer networks. Science of computer programming","author":"Steinder Ma \u0142gorzata","year":"2004","unstructured":"Ma \u0142gorzata Steinder and Adarshpal S Sethi . 2004. A survey of fault localization techniques in computer networks. Science of computer programming , Vol. 53 , 2 ( 2004 ), 165--194. Ma \u0142gorzata Steinder and Adarshpal S Sethi. 2004. A survey of fault localization techniques in computer networks. Science of computer programming , Vol. 53, 2 (2004), 165--194."},{"key":"e_1_3_2_1_16_1","volume-title":"International Conference on Data Engineering. 215","author":"Pei Jian","year":"2001","unstructured":"Jian Pei , Jiawei Han , Behzad Mortazavi-Asl , Helen Pinto , Qiming Chen , Umeshwar Dayal , and Meichun Hsu . 2001 . PrefixSpan: Mining Sequential Patterns by Prefix-Projected Growth . In International Conference on Data Engineering. 215 . Jian Pei, Jiawei Han, Behzad Mortazavi-Asl, Helen Pinto, Qiming Chen, Umeshwar Dayal, and Meichun Hsu. 2001. PrefixSpan: Mining Sequential Patterns by Prefix-Projected Growth. In International Conference on Data Engineering. 215."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jprocont.2013.03.010"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"R Vaarandi. 2003. A data clustering algorithm for mining patterns from event logs. In Ip Operations & Management . 119--126. R Vaarandi. 2003. A data clustering algorithm for mining patterns from event logs. In Ip Operations & Management . 119--126.","DOI":"10.1109\/IPOM.2003.1251233"},{"key":"e_1_3_2_1_19_1","unstructured":"Risto Vaarandi. 2005. Tools and Techniques for Event Log Analysis. (2005). Risto Vaarandi. 2005. Tools and Techniques for Event Log Analysis. (2005)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cherd.2012.11.001"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11596981_111"}],"event":{"name":"MSWIM '18: 21st ACM Int'l Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems","location":"Montreal QC Canada","acronym":"MSWIM '18","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"]},"container-title":["Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3242102.3242130","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3242102.3242130","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T22:02:49Z","timestamp":1775253769000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3242102.3242130"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,25]]},"references-count":21,"alternative-id":["10.1145\/3242102.3242130","10.1145\/3242102"],"URL":"https:\/\/doi.org\/10.1145\/3242102.3242130","relation":{},"subject":[],"published":{"date-parts":[[2018,10,25]]},"assertion":[{"value":"2018-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}