{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T00:19:51Z","timestamp":1759969191227,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T00:00:00Z","timestamp":1746662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"JST CREST JPMJCR23M3"},{"name":"JP24KJ1615"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,5,8]]},"DOI":"10.1145\/3701716.3715476","type":"proceedings-article","created":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T16:20:01Z","timestamp":1748017201000},"page":"1214-1218","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["<scp>CyberCScope<\/scp>\n            : Mining Skewed Tensor Streams and Online Anomaly Detection in Cybersecurity Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7123-4259","authenticated-orcid":false,"given":"Kota","family":"Nakamura","sequence":"first","affiliation":[{"name":"SANKEN, Osaka University, Ibaraki, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4202-4513","authenticated-orcid":false,"given":"Koki","family":"Kawabata","sequence":"additional","affiliation":[{"name":"SANKEN, Osaka University, Ibaraki, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-1766-3883","authenticated-orcid":false,"given":"Shungo","family":"Tanaka","sequence":"additional","affiliation":[{"name":"SANKEN, Osaka University, Ibaraki, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3566-7721","authenticated-orcid":false,"given":"Yasuko","family":"Matsubara","sequence":"additional","affiliation":[{"name":"SANKEN, Osaka University, Ibaraki, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7258-2642","authenticated-orcid":false,"given":"Yasushi","family":"Sakurai","sequence":"additional","affiliation":[{"name":"SANKEN, Osaka University, Ibaraki, Japan"}]}],"member":"320","published-online":{"date-parts":[[2025,5,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. CSE-CIC-IDS2018. https:\/\/www.unb.ca\/cic\/datasets\/ids-2018.html."},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. CyberCScope. https:\/\/github.com\/kotaNakm\/CyberCScope"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Siddharth Bhatia Arjit Jain Pan Li Ritesh Kumar and Bryan Hooi. 2021. MStream: Fast Anomaly Detection in Multi-Aspect Streams. In WWW. 3371--3382.","DOI":"10.1145\/3442381.3450023"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Siddharth Bhatia Arjit Jain Shivin Srivastava Kenji Kawaguchi and Bryan Hooi. 2022. MemStream: Memory-Based Streaming Anomaly Detection. In WWW. 610--621.","DOI":"10.1145\/3485447.3512221"},{"key":"e_1_3_2_1_5_1","volume-title":"Jae Myung, and Mark A Pitt.","author":"Gr\u00fcnwald Peter D","year":"2005","unstructured":"Peter D Gr\u00fcnwald, In Jae Myung, and Mark A Pitt. 2005. Advances in minimum description length: Theory and applications. MIT press."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Koki Kawabata Yasuko Matsubara Takato Honda and Yasushi Sakurai. 2020. Non-Linear Mining of Social Activities in Tensor Streams. In KDD. 2093--2102.","DOI":"10.1145\/3394486.3403260"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142495"},{"key":"e_1_3_2_1_8_1","volume-title":"Tensor Decomposition Meets RKHS: Efficient Algorithms for Smooth and Misaligned Data. arXiv preprint arXiv:2408.05677","author":"Larsen Brett W","year":"2024","unstructured":"Brett W Larsen, Tamara G Kolda, Anru R Zhang, and Alex H Williams. 2024. Tensor Decomposition Meets RKHS: Efficient Algorithms for Smooth and Misaligned Data. arXiv preprint arXiv:2408.05677 (2024)."},{"key":"e_1_3_2_1_9_1","volume-title":"2022 IEEE Conference on Communications and Network Security (CNS). IEEE, 254--262","author":"Liu Lisa","year":"2022","unstructured":"Lisa Liu, Gints Engelen, Timothy Lynar, Daryl Essam, and Wouter Joosen. 2022. Error prevalence in nids datasets: A case study on cic-ids-2017 and cse-cic-ids2018. In 2022 IEEE Conference on Communications and Network Security (CNS). IEEE, 254--262."},{"key":"e_1_3_2_1_10_1","volume-title":"Bayesian estimators of the Gamma distribution. arXiv preprint arXiv:1607.03302","author":"Llera A","year":"2016","unstructured":"A Llera and CF Beckmann. 2016. Bayesian estimators of the Gamma distribution. arXiv preprint arXiv:1607.03302 (2016)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220107"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583370"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Ian Porteous David Newman Alexander Ihler Arthur Asuncion Padhraic Smyth and Max Welling. 2008. Fast collapsed gibbs sampling for latent dirichlet allocation. In KDD. 569--577.","DOI":"10.1145\/1401890.1401960"},{"key":"e_1_3_2_1_14_1","first-page":"108","article-title":"2018. Toward generating a new intrusion detection dataset and intrusion traffic characterization","volume":"1","author":"Sharafaldin Iman","year":"2018","unstructured":"Iman Sharafaldin, Arash Habibi Lashkari, Ali A Ghorbani, et al. 2018. Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1 (2018), 108--116.","journal-title":"ICISSp"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098087"}],"event":{"name":"WWW '25: The ACM Web Conference 2025","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Sydney NSW Australia","acronym":"WWW '25"},"container-title":["Companion Proceedings of the ACM on Web Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3701716.3715476","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3701716.3715476","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T03:08:37Z","timestamp":1759892917000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3701716.3715476"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,8]]},"references-count":15,"alternative-id":["10.1145\/3701716.3715476","10.1145\/3701716"],"URL":"https:\/\/doi.org\/10.1145\/3701716.3715476","relation":{},"subject":[],"published":{"date-parts":[[2025,5,8]]},"assertion":[{"value":"2025-05-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}