{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:26:21Z","timestamp":1774628781444,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,22]],"date-time":"2024-11-22T00:00:00Z","timestamp":1732233600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Austrian Research Promotion Agency","award":["914101"],"award-info":[{"award-number":["914101"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,22]]},"DOI":"10.1145\/3708778.3708796","type":"proceedings-article","created":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T12:02:06Z","timestamp":1738929726000},"page":"125-132","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Alert Flood Reduction in Large-Scale Control Systems - A Hybrid Pattern Mining-based Approach"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1706-6319","authenticated-orcid":false,"given":"Johannes","family":"Sch\u00f6nb\u00f6ck","sequence":"first","affiliation":[{"name":"University of Applied Sciences Upper Austria, Hagenberg, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7895-3165","authenticated-orcid":false,"given":"Wieland","family":"Schwinger","sequence":"additional","affiliation":[{"name":"Johannes Kepler University, Linz, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4778-8435","authenticated-orcid":false,"given":"Elisabeth","family":"Kapsammer","sequence":"additional","affiliation":[{"name":"Johannes Kepler University, Linz, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6739-0272","authenticated-orcid":false,"given":"Werner","family":"Retschitzegger","sequence":"additional","affiliation":[{"name":"Johannes Kepler University, Linz, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-6519-2127","authenticated-orcid":false,"given":"Birgit","family":"Pr\u00f6ll","sequence":"additional","affiliation":[{"name":"Johannes Kepler University, Linz, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-0298-4252","authenticated-orcid":false,"given":"Herbert","family":"Zaunmair","sequence":"additional","affiliation":[{"name":"Johannes Kepler University, Linz, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7193-6685","authenticated-orcid":false,"given":"Alexander","family":"H\u00f6bart","sequence":"additional","affiliation":[{"name":"Johannes Kepler University, Linz, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-6596-7089","authenticated-orcid":false,"given":"David","family":"Graf","sequence":"additional","affiliation":[{"name":"team Technology Management GmbH, Vienna, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-2474-6015","authenticated-orcid":false,"given":"Marianne","family":"Lechner","sequence":"additional","affiliation":[{"name":"University of Arts, Linz, Austria"}]}],"member":"320","published-online":{"date-parts":[[2025,2,7]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/170035.170072"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2005.1557421"},{"key":"e_1_3_3_1_4_2","unstructured":"ANSI\/ISA. 2009. Standard for the Management of Alarm Systems for the Process Industries. (2009)."},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","unstructured":"F. Antonello. 2022. A novelty-based MOEA for identifying functional dep. in complex infrastructures. Environment Systems & Decisions 42 2 (2022) 177\u2013188.","DOI":"10.1007\/s10669-021-09841-z"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"F. Antonello and P. Baraldi. 2021. A novel association rule mining method for the identification of rare functional dependencies in complex technical infrastructures from alarm data. Expert Systems with Applications 170 (2021) 114560.","DOI":"10.1016\/j.eswa.2021.114560"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"F. Antonello P. Baraldi E. Zio and L. Serio. 2022. A niching augmented evolutionary algorithm for the identification of functional dep. in complex technical infrastructures from alarm data. IEEE Systems Journal 16 4 (2022) 5777\u20135786.","DOI":"10.1109\/JSYST.2022.3146014"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"crossref","unstructured":"F. Antonello P. Baraldi E. Zio and L. Serio. 2022. A novel metric to evaluate the association rules for identification of functional dep. in complex technical infrastructures. Environment Systems and Decisions 42 3 (2022) 436\u2013449.","DOI":"10.1007\/s10669-022-09857-z"},{"key":"e_1_3_3_1_9_2","first-page":"3242","volume-title":"Proc. of the 32nd European Safety and Reliability Conf., 2022","author":"Briwa H.","year":"2022","unstructured":"H. Briwa. 2022. Alarm Management for Human Performance. Are We Getting Better?. In Proc. of the 32nd European Safety and Reliability Conf., 2022. 3242\u20133251."},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"V. Chahar S. Katoch and S. Chauhan. 2021. A Review on Genetic Algorithm: Past Present and Future. Multimedia Tools & Applications 80 (02 2021).","DOI":"10.1007\/s11042-020-10139-6"},{"key":"e_1_3_3_1_11_2","volume-title":"Proc. of the 24th Int. Conf. on Emerging Technologies & Factory Automation","author":"&\u00a0J\u00f8rgensen T. D.\u00a0Kirchh\u00fcbel","year":"2019","unstructured":"T. D.\u00a0Kirchh\u00fcbel &\u00a0J\u00f8rgensen. 2019. Generating Diagnostic Bayesian Networks from Qualitative Causal Models. In Proc. of the 24th Int. Conf. on Emerging Technologies & Factory Automation. IEEE."},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45356-3_83"},{"key":"e_1_3_3_1_13_2","first-page":"303","volume-title":"Proc. of the 13th Inf. Conf. on Contemporary Computing","author":"Dixit A.","year":"2021","unstructured":"A. Dixit and S. Jain. 2021. Effect of stationarity on traditional ML models. In Proc. of the 13th Inf. Conf. on Contemporary Computing (Noida, India). ACM, 303\u2013308."},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"G. D\u00f6rg\u0151. 2021. Quality vs. quantity of alarm messages - How to measure the performance of an alarm system. Chemical Engineering Research 173 (2021).","DOI":"10.1016\/j.cherd.2021.06.022"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"G. D\u00f6rg\u0151 and J. Abonyi. 2018. Sequence Mining Based Alarm Suppression. IEEE Access 6 (01 2018) 15365\u201315379.","DOI":"10.1109\/ACCESS.2018.2797247"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"crossref","unstructured":"M. Endsley. 2016. From Here to Autonomy: Lessons Learned From Human\u2013Automation Research. Human Factors 59 (12 2016).","DOI":"10.1177\/0018720816681350"},{"key":"e_1_3_3_1_17_2","unstructured":"J. Etesami and N. Kiyavash. 2016. Measuring Causal Relationships in Dynamical Systems through Recovery of Functional Dependencies. IEEE Transactions on Signal & Information Processing over Networks (12 2016) 1\u201310."},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"crossref","unstructured":"P. Goel A. Datta and S. Mannan. 2017. Industrial alarm systems: Challenges and opportunities. Journal of Loss Prevention in the Process Industries 50 (09 2017).","DOI":"10.1016\/j.jlp.2017.09.001"},{"key":"e_1_3_3_1_19_2","first-page":"1","volume-title":"Proc. of the IEEE Int. Conf. on IoT and Intelligence System (IoTaIS)","author":"Graf D.","year":"2019","unstructured":"D. Graf, E. Kapsammer, W. Retschitzegger, W. Schwinger, and N. Baumgartner. 2019. Cutting a Path Through the IoT Ontology Jungle \u2013 a Meta Survey. In Proc. of the IEEE Int. Conf. on IoT and Intelligence System (IoTaIS). IEEE, 1\u20137."},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-10986-7_46"},{"key":"e_1_3_3_1_21_2","first-page":"237","volume-title":"Int. Conf. on Management of Digital Eco-Systems (MEDES)","author":"Graf D.","year":"2019","unstructured":"D. Graf, W. Schwinger, E. Kapsammer, W. Retschitzegger, B. Pr\u00f6ll, and N. Baumgartner. 2019. Towards Operational Technology Monitoring in ITS. In Int. Conf. on Management of Digital Eco-Systems (MEDES). ACM, 237\u2013241."},{"key":"e_1_3_3_1_22_2","first-page":"405","volume-title":"World Conference on Information Systems and Technologies","author":"Graf D.","year":"2021","unstructured":"D. Graf, W. Schwinger, W. Retschitzegger, E. Kapsammer, and N. Baumgartner. 2021. Event-Driven Ontology Population-from Research to Practice in CIs. In World Conference on Information Systems and Technologies. Springer, 405\u2013415."},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-04819-7_26"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2024.896"},{"key":"e_1_3_3_1_25_2","first-page":"344","volume-title":"Proc. of Int. Conf. on IT & Systems (ICITS)","author":"Graf D.","year":"2022","unstructured":"D. Graf, L. Spitzl, M. Steiner, W. Schwinger, W. Retschitzegger, E. Kapsammer, and B. Pr\u00f6ll. 2022b. Semantic-driven Mining of Functional Dependencies in Large-scale SoS. In Proc. of Int. Conf. on IT & Systems (ICITS). Springer, 344\u2013355."},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"crossref","unstructured":"Y. Hao L. Jia E. Zio Y. Wang and Z. He. 2023. A multi-objective optimization model for identifying groups of critical elements in a high-speed train. Reliability Engineering & System Safety 235 (2023) 109220.","DOI":"10.1016\/j.ress.2023.109220"},{"key":"e_1_3_3_1_27_2","unstructured":"DATEX II. 2023. EU standard for traffic data exchange www.datex2.eu. (2023)."},{"key":"e_1_3_3_1_28_2","unstructured":"ISO\/IEC. 2023. ISO\/IEC 21838-3:2023 Top-level ontology (TLO) Standard Part 3: Descriptive ontology for linguistic and cognitive engineering (DOLCE). (2023)."},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"crossref","unstructured":"D. Kirchh\u00fcbel M. Lind and O. Ravn. 2019. Toward Comprehensive Decision Support Using Multilevel Flow Modeling. IFAC-PapersOnLine 52 11 (2019) 31\u201336.","DOI":"10.1016\/j.ifacol.2019.09.114"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"crossref","unstructured":"M. Klemettinen H. Mannila and H. Toivonen. 1999. Interactive exploration of interesting findings in the Telecommunication Network Alarm Sequence Analyzer (TASA). Information and SW Technology 41 9 (1999) 557\u2013567.","DOI":"10.1016\/S0950-5849(99)00019-1"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"crossref","unstructured":"B. Li J. Li K. Tang and X. Yao. 2015. Many-Objective Evolutionary Algorithms: A Survey. ACM Comput. Surv. 48 1 Article 13 (sep 2015) 35\u00a0pages.","DOI":"10.1145\/2792984"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"crossref","unstructured":"M. Lozonavu. 2017. Relation discovery of mobile network alarms with sequential pattern mining. Int. Conf. on Comp. Networking & Communic. (2017) 363\u2013367.","DOI":"10.1109\/ICCNC.2017.7876155"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"crossref","unstructured":"Matthieu Lucke Moncef Chioua Chriss Grimholt Martin Hollender and Nina\u00a0F. Thornhill. 2019. Advances in alarm data analysis with a practical application to online alarm flood classification. Journal of Process Control 79 (2019) 56\u201371.","DOI":"10.1016\/j.jprocont.2019.04.010"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"crossref","unstructured":"Luna. 2015. An evolutionary algorithm for the discovery of rare class association rules in learning mgmt. systems. Applied Intelligence 42 (2015) 501\u2013513.","DOI":"10.1007\/s10489-014-0603-4"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"crossref","unstructured":"Faizan M. Ijaz A. and A. Basit. 2023. A review on effective alarm management systems for industrial process control: Barriers and opportunities. Int. Journal of Critical Infrastructure Protection 41 (03 2023) 100599.","DOI":"10.1016\/j.ijcip.2023.100599"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"crossref","unstructured":"M. Mahdi K. Hosny and I. Elhenawy. 2022. FR-Tree: A novel rare association rule for big data problem. Expert Systems with Applications 187 (2022) 115898.","DOI":"10.1016\/j.eswa.2021.115898"},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"crossref","unstructured":"R. Mamunur K. Joarder H. Mehedi and S. Shahriar. 2020. A survey on behavioral pattern mining from sensor data in IoT. IEEE Access 8 (2020) 33318\u201333341.","DOI":"10.1109\/ACCESS.2020.2974035"},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"crossref","unstructured":"A. Messager G. Parisis I. Kiss R. Harper Ph. Tee and L. Berthouze. 2019. Inferring Functional Connectivity From Time-Series of Events in Large Scale Networks. IEEE Transactions on Network and Service Mgmt. 16(3) (2019) 857\u2013870.","DOI":"10.1109\/TNSM.2019.2932896"},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"crossref","unstructured":"C. Nielsen P. Larsen J. Fitzgerald J. Woodcock and J. Peleska. 2015. Systems of Systems Engineering. Comput. Surveys 48 (09 2015) 1\u201341.","DOI":"10.1145\/2794381"},{"key":"e_1_3_3_1_40_2","unstructured":"IEEE Task\u00a0Force on Process\u00a0Mining. 2023. IEEE Standard for eXtensible Event Stream (XES) for Achieving Interoperability in Event Logs\/Streams. (2023)."},{"key":"e_1_3_3_1_41_2","first-page":"2007","volume-title":"IEEE Congress on evolutionary computation (CEC)","author":"Padillo F.","year":"2017","unstructured":"F. Padillo and S Luna, J.M. &\u00a0Ventura. 2017. An evolutionary algo. for mining rare association rules. In IEEE Congress on evolutionary computation (CEC). 2007\u201314."},{"key":"e_1_3_3_1_42_2","doi-asserted-by":"crossref","unstructured":"S. Puuska. 2017. Nationwide CI monitoring using a common operating picture framework. Int. Journal of CI Protection 20 (12 2017).","DOI":"10.1016\/j.ijcip.2017.11.005"},{"key":"e_1_3_3_1_43_2","doi-asserted-by":"crossref","unstructured":"S. Rebello H. Yu and L. Ma. 2018. An integrated approach for system functional reliability assessment using Dynamic Bayesian Network and Hidden Markov Model. Reliability Engineering & System Safety 180 (07 2018).","DOI":"10.1016\/j.ress.2018.07.002"},{"key":"e_1_3_3_1_44_2","doi-asserted-by":"crossref","unstructured":"Sriparna Roy\u00a0Ghatak and Parimal Sannigrahi Surajit &\u00a0Acharjee. 2019. MOEA for Strategic Incorporation of Solar Energy Source Battery Storage and DSTATCOM in a Smart Grid Environment. IEEE Systems Journal 13 3 (2019) 3038\u20133049.","DOI":"10.1109\/JSYST.2018.2875177"},{"key":"e_1_3_3_1_45_2","doi-asserted-by":"crossref","unstructured":"S. Salah G. Maci\u00e1-Fern\u00e1ndez and J. D\u00edaz-Verdejo. 2013. A model-based survey of alert correlation techniques. Computer Networks 57 5 (2013) 1289\u20131317.","DOI":"10.1016\/j.comnet.2012.10.022"},{"key":"e_1_3_3_1_46_2","doi-asserted-by":"crossref","unstructured":"D. Schuster S. van Zelst and W. van\u00a0der Aalst. 2022. Utilizing Domain Knowledge in Data-driven Process Discovery: A Review. Computers in Industry 137 (5 2022).","DOI":"10.1016\/j.compind.2022.103612"},{"key":"e_1_3_3_1_47_2","doi-asserted-by":"crossref","unstructured":"A. Seyed and Mohammad\u00a0H. Roohi. 2022. A review of alarm RCA in process industries. Chemical Engineering Research & Design 188 (12 2022) 846\u2013860.","DOI":"10.1016\/j.cherd.2022.10.041"},{"key":"e_1_3_3_1_48_2","doi-asserted-by":"crossref","unstructured":"R. Simonson. 2022. Impact of alarm management & automation on abnormal ops.: A human-in-the-loop simul. study. Applied Ergonomics 100 (04 2022) 103670.","DOI":"10.1016\/j.apergo.2021.103670"},{"key":"e_1_3_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCT.2015.69"},{"key":"e_1_3_3_1_50_2","doi-asserted-by":"crossref","unstructured":"Y. Wan F. Yang N. Lui H. Xu and H. Ye. 2012. Statistical RCA of novel faults based on digraph models. Chemical Engineering Research 91 (01 2012).","DOI":"10.1016\/j.cherd.2012.06.010"},{"key":"e_1_3_3_1_51_2","doi-asserted-by":"crossref","unstructured":"C. Wang J.and\u00a0He Y. Liu and G. Tian. 2017. Efficient Alarm Behavior Analytics for Telecom Networks. Information Sciences 402 (03 2017) 1\u201314.","DOI":"10.1016\/j.ins.2017.03.020"},{"key":"e_1_3_3_1_52_2","unstructured":"J. Wang F. Yang and T. Chen. 2015. An Overview of Industrial Alarm Systems. IEEE Transactions on Automation Science & Engineering 13 (09 2015) 1\u201317."},{"key":"e_1_3_3_1_53_2","doi-asserted-by":"crossref","unstructured":"J. Wen and B. Gabrys. 2022. Toward Digital Twin Oriented Modeling of Complex Networked Systems and Their Dynamics. IEEE Access 10 (2022) 66886\u201366923.","DOI":"10.1109\/ACCESS.2022.3184801"},{"key":"e_1_3_3_1_54_2","first-page":"10","volume-title":"18th Int. Conf. on Network & Service Mgmt.","author":"Winchester G.","year":"2022","unstructured":"G. Winchester. 2022. Accelerating Causal Inference Based RCA Using Prior Knowledge From FCs. In 18th Int. Conf. on Network & Service Mgmt.IEEE, 10\u201318."},{"key":"e_1_3_3_1_55_2","doi-asserted-by":"crossref","unstructured":"Enrico Zio. 2016. Critical Infrastructures Vulnerability and Risk Analysis. European Journal for Security Research 1 (10 2016).","DOI":"10.1007\/s41125-016-0004-2"}],"event":{"name":"CIIS 2024: 2024 The 7th International Conference on Computational Intelligence and Intelligent Systems","location":"Nagoya Japan","acronym":"CIIS 2024"},"container-title":["Proceedings of the 2024 7th International Conference on Computational Intelligence and Intelligent Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708778.3708796","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3708778.3708796","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:58Z","timestamp":1750295938000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708778.3708796"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,22]]},"references-count":54,"alternative-id":["10.1145\/3708778.3708796","10.1145\/3708778"],"URL":"https:\/\/doi.org\/10.1145\/3708778.3708796","relation":{},"subject":[],"published":{"date-parts":[[2024,11,22]]},"assertion":[{"value":"2025-02-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}