{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T04:51:04Z","timestamp":1771563064341,"version":"3.50.1"},"reference-count":83,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7,1]]},"abstract":"<p>Analytics has emerged as an important area of study as it avoids further incidents or risks after the events have occurred; this is done by analysing computer events and making further statistics. The purpose of this survey is to gain knowledge for the authors\u2019 own event knowledge database which will consist of how unusual events work and how they are related to other events. The algorithms mentioned in this paper have been used to build their future development, resulting in a knowledge database designed to be similar to an internet browser engine where it can search events and their relationships. The research and algorithms have helped the authors to decide on the technology they will be using for the knowledge database.<\/p>","DOI":"10.4018\/jdcf.2012070103","type":"journal-article","created":{"date-parts":[[2012,10,22]],"date-time":"2012-10-22T16:08:01Z","timestamp":1350922081000},"page":"33-46","source":"Crossref","is-referenced-by-count":6,"title":["A Comprehensive Survey of Event Analytics"],"prefix":"10.4018","volume":"4","author":[{"given":"T.","family":"Gidwani","sequence":"first","affiliation":[{"name":"AUT University, New Zealand"}]},{"given":"M. J.","family":"Argano","sequence":"additional","affiliation":[{"name":"AUT University, New Zealand"}]},{"given":"W.","family":"Yan","sequence":"additional","affiliation":[{"name":"AUT University, New Zealand"}]},{"given":"F.","family":"Issa","sequence":"additional","affiliation":[{"name":"AUT University, New Zealand"}]}],"member":"2432","reference":[{"key":"jdcf.2012070103-0","doi-asserted-by":"crossref","unstructured":"Abbott, J., Bell, J., Clark, A., Vel, O. D., & Mohay, G. (2006). Automated recognition of event scenarios for digital forensics. In Proceedings of the ACM Symposium on Applied Computing (pp. 293-300).","DOI":"10.1145\/1141277.1141346"},{"issue":"1","key":"jdcf.2012070103-1","first-page":"118","article-title":"Systematic digital forensic investigation model.","volume":"5","author":"A.Agarwal","year":"2009","journal-title":"International Journal of Computer Science and Security"},{"key":"jdcf.2012070103-2","unstructured":"Bates, M. (2009). An architecture to support storage and retrieval of events. In Proceedings of the IFIP International Conference on Distributed Systems Platforms and Open Distributed (pp. 443-458)."},{"key":"jdcf.2012070103-3","doi-asserted-by":"crossref","unstructured":"Bell, C. R. (2007). Event monitoring comes of age: 'Predict and prevent' as well as 'find and fix.' In Proceedings of the IET International Conference on Railway Condition Monitoring (pp. 44-47).","DOI":"10.1049\/ic:20060041"},{"key":"jdcf.2012070103-4","author":"C.Biblin","year":"2006","journal-title":"From regulatory policies to event monitoring rules: Towards model driven compliance automation (Research Report No. RZ 3662)"},{"key":"jdcf.2012070103-5","doi-asserted-by":"crossref","unstructured":"Blauensteiner, P., Kampel, M., Musik, C., & Vogtenhuber, S. (2010). A socio-technical approach for event detection in security critical infrastructure. In Proceedings of the International Workshop on Socially Intelligent Surveillance and Monitoring in conjunction with IEEE International Conference on Computer Vision and Pattern Recognition, San Francisco, CA (pp. 23-30).","DOI":"10.1109\/CVPRW.2010.5543164"},{"key":"jdcf.2012070103-6","doi-asserted-by":"crossref","unstructured":"Bolderheij, F., Absil, F. G., & Genderen, P. V. (2005). A risk-based object-oriented approach to sensor management. In Proceedings of the 8th International Conference on Information Fusion (pp. 598-605).","DOI":"10.1109\/ICIF.2005.1591909"},{"key":"jdcf.2012070103-7","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2009.06.008"},{"key":"jdcf.2012070103-8","doi-asserted-by":"crossref","unstructured":"Bouhats, F., Marebati, M., & Mokhatr, H. (2007). Mobile event monitoring protocol for wireless sensor networks. In Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops (pp. 864-869).","DOI":"10.1109\/AINAW.2007.254"},{"key":"jdcf.2012070103-9","unstructured":"Bradley, T. (2012). Introduction to intrusion detection systems (IDS). Retrieved from http:\/\/netsecurity.about.com\/cs\/hackertools\/a\/aa030504.htm"},{"key":"jdcf.2012070103-10","author":"B.Carrier","year":"2005","journal-title":"File system forensic analysis"},{"key":"jdcf.2012070103-11","doi-asserted-by":"crossref","unstructured":"Chen, D., Tao, Z., & Ma, G. (2008). Application of wireless sensor networks for monitoring emergency events. In Proceedings of the 5th IEEE Conference on Sensors (pp. 518-521).","DOI":"10.1109\/WiCom.2008.929"},{"key":"jdcf.2012070103-12","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2010.25"},{"key":"jdcf.2012070103-13","unstructured":"Claisse, S., Morel, M., & Ormsby, W. B. (2010). Enhanced SISMARIS. In Proceedings of the International Waterside Security Conference (pp. 1-5)."},{"key":"jdcf.2012070103-14","doi-asserted-by":"crossref","unstructured":"Dadashi, N., Stedmon, A., & Pridmore, T. (2009). Automatic components of integrated CCTV surveillance systems: Functionality, accuracy and confidence. In Proceedings of the 6th IEEE International Conference on Advanced Video and Signal Based Surveillance, Genova, Italy (pp. 376-381).","DOI":"10.1109\/AVSS.2009.47"},{"key":"jdcf.2012070103-15","unstructured":"Danciu, V. A., & Slayer, M. (2011). A monitoring architecture supporting service management data composition. In Proceedings of the 12th Annual Workshop of HP OpenView University Association (pp. 393-396)."},{"key":"jdcf.2012070103-16","unstructured":"Demers, A., Gehrke, J., Panda, B., Riedewald, M., Sharma, V., & White, W. (2007). Cayuga: A general purpose event monitoring system. In Proceedings of the ACM SIGMOD International Conference on Management of Data (pp. 1100-1102)."},{"key":"jdcf.2012070103-17","doi-asserted-by":"crossref","unstructured":"Garibotto, G. (2009). Video surveillance and biometric technology application. In Proceedings of the 6th IEEE International Conference on Advanced Video and Signal Based Surveillance, Genova, Italy.","DOI":"10.1109\/AVSS.2009.111"},{"key":"jdcf.2012070103-18","doi-asserted-by":"crossref","unstructured":"Gonzalez, R. (2007). Enhancing video surveillance with audio events. In Proceedings of the 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications (pp. 61-66).","DOI":"10.1109\/DICTA.2007.4426776"},{"key":"jdcf.2012070103-19","doi-asserted-by":"crossref","unstructured":"Guennoun, M., Khattak, S., Kapralos, B., & El-Khatib, K. (2008). Augmented reality-based audio \/ visual surveillance system. In Proceedings of the IEEE International Workshop on Haptic Audio visual Environments and Games (pp. 70-74).","DOI":"10.1109\/HAVE.2008.4685301"},{"key":"jdcf.2012070103-20","doi-asserted-by":"crossref","unstructured":"Hameed, A. S., & Abdullah, A. (2008). An intergrated web \/ mobile remote surveillance system. In Proceedings of the International Conference on Computer and Communication Engineering, Kuala Lumpur, Malaysia (pp. 386-392).","DOI":"10.1109\/ICCCE.2008.4580633"},{"key":"jdcf.2012070103-21","doi-asserted-by":"crossref","unstructured":"Hannemann, J., Donohue, K., & Dietz, H. (2007). Cluster based computing infrastructure for wide area multi modal surveillance networks. In Proceedings of the IEEE International Symposium on Circuits and Systems (pp. 2070-2073).","DOI":"10.1109\/ISCAS.2008.4541856"},{"key":"jdcf.2012070103-22","doi-asserted-by":"crossref","unstructured":"He, Z., Liu, Y., & Zhang, M. (2010). A CUSUM chart for monitoring an attribute event. In Proceedings of the International Conference on E-Business and E-Government (pp. 2607-2610).","DOI":"10.1109\/ICEE.2010.659"},{"key":"jdcf.2012070103-23","doi-asserted-by":"crossref","unstructured":"Herath, A., Herath, S., Samarsinghe, P., & Herath, J. (2005). Computer forensics, information security and law: A case study. In Proceedings of the 1st International Workshop on Systematic Approaches to Digital Forensic Engineering (pp. 135-141).","DOI":"10.1109\/SADFE.2005.7"},{"key":"jdcf.2012070103-24","doi-asserted-by":"crossref","unstructured":"Hershey, P., Charles, B., & Silio, J. (2009). System engineering approach for event monitoring and analysis in high speed enterprise communications systems. In Proceedings of the 3rd Annual IEEE Systems Conference (pp. 344-349).","DOI":"10.1109\/SYSTEMS.2009.4815824"},{"key":"jdcf.2012070103-25","unstructured":"Jaeger, R. (2008). Host intrusion detection systems and network intrusion detection systems (HIDS\/NIDS). Retrieved from http:\/\/searchsecurity.techtarget.com\/definition\/HIDS-NIDS"},{"key":"jdcf.2012070103-26","unstructured":"Juan, L., Wang, H.-X., Han, R.-F., & Jing, X.-P. (2009). Construction and application of network security defense model. In Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing."},{"key":"jdcf.2012070103-27","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2004.01.027"},{"key":"jdcf.2012070103-28","doi-asserted-by":"crossref","unstructured":"Kieran, D., & Yan, W. (2010). A framework for an event driven video surveillance system. In Proceedings of the 7th IEEE International Conference on Advanced Video and Signal Based Surveillance (pp. 97-102).","DOI":"10.1109\/AVSS.2010.57"},{"key":"jdcf.2012070103-29","doi-asserted-by":"crossref","unstructured":"Kim, K., & Subbaraman, C. (1997) A supervisor-based semi-centralized network surveillance scheme and the fault detection latency bound. In Proceedings of the 6th Symposium on Reliable Distributed Systems (pp. 146-155).","DOI":"10.1109\/RELDIS.1997.632810"},{"key":"jdcf.2012070103-30","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2006.1603388"},{"key":"jdcf.2012070103-31","doi-asserted-by":"crossref","unstructured":"Ko, T. (2008). A survey on behaviour analysis in video surveillance for homeland security applications. In Proceedings of the 37th IEEE Applied Imagery Pattern Recognition Workshop (pp. 1-8).","DOI":"10.1109\/AIPR.2008.4906450"},{"key":"jdcf.2012070103-32","unstructured":"Kolos, S., & Scholtes, I. (2005). Event monitoring design (Tech. Rep.). Retrieved from http:\/\/www.syssoft.uni-trier.de\/~scholtes\/blog\/wp-content\/design.pdf"},{"key":"jdcf.2012070103-33","unstructured":"Koschel, A., & Astrova, I. (2008). Event monitoring web services for heterogeneous information systems. In Proceedings of the World Academy of Science, Engineering and Technology (pp. 50-52)."},{"key":"jdcf.2012070103-34","doi-asserted-by":"crossref","unstructured":"Kosta, Y. P., Dalal, U. D., & Jah, R. K. (2010). Security comparison of wired and wireless network with firewall and virtual private network (VPN). In Proceedings of the International Conference on Recent Trends in Information, Telecommunication and Computing (pp. 281-283).","DOI":"10.1109\/ITC.2010.75"},{"key":"jdcf.2012070103-35","unstructured":"Leitner, P., Michlmayr, A., Roseberg, F., & Dustar, S. (2008). Monitoring, prediction and prevention of SLA violations in composite services. In Proceedings of the IEEE International Conference on Web Services (pp. 369-376)."},{"key":"jdcf.2012070103-36","doi-asserted-by":"crossref","unstructured":"Leu, J.-S., Lin, W.-H., & Tzeng, H.-J. (2009). Design and implementation of an OSGI-centic remote mobile surveillance system. In Proceedings of the IEEE International Conference on Systems, Man and Cybernetics (pp. 2498-2502).","DOI":"10.1109\/ICSMC.2009.5346343"},{"key":"jdcf.2012070103-37","unstructured":"Leu, J.-S., Lin, W.-H., Yu, M.-C., & Tzeng, H.-J. (2011). Recognition assisted dynamic surveillance system based on OSGI and OpenCV. In Proceedings of the 13th International Conference on Advanced Communication Technology (pp. 83-87)."},{"key":"jdcf.2012070103-38","doi-asserted-by":"crossref","unstructured":"Liang, L., Yang, X., Zhang, L., Gao, D., & Zhang, H. (2011). Issues for event monitoring in event driven wireless sensor networks. In Proceedings of the 7th International Conference on Wireless Communications, Networking and Mobile Computing (pp. 1-4).","DOI":"10.1109\/wicom.2011.6040345"},{"key":"jdcf.2012070103-39","doi-asserted-by":"crossref","unstructured":"Liang, Y., Wang, H.-Q., & Lai, J.-B. (2007). Quantification of network security situational awareness based on evolutionary neural network. In Proceedings of the International Conference on Machine Learning and Cybernetics (pp. 367-3272).","DOI":"10.1109\/ICMLC.2007.4370711"},{"key":"jdcf.2012070103-40","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2009.2017074"},{"key":"jdcf.2012070103-41","unstructured":"Lokaiczyk, R., & Goertz, M. (2008). Extending low level context events by data aggregation. In Proceedings of the I-Know Conference, Graz, Austria."},{"key":"jdcf.2012070103-42","doi-asserted-by":"crossref","unstructured":"Maeshima, K. (2007). CDF event monitoring system and operation. In Proceedings of the 15th IEEE-NPSS Real-Time Conference (pp. 1-7).","DOI":"10.1109\/RTC.2007.4382737"},{"key":"jdcf.2012070103-43","unstructured":"Maimour, M., Pham, C., & Hoang, D. (2007). A congestion control framework for handling video surveillance traffics on WSN. In Proceedings of the International Conference on Computational Science and Engineering (pp. 943-948)."},{"key":"jdcf.2012070103-44","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.153"},{"key":"jdcf.2012070103-45","unstructured":"Marrington, A. A., Mohay, G., Clark, A., & Morarji, H. (2007). Event-based computer profiling for the forensic reconstruction of computer activity. In Proceedings of the Asia Pacific Information Technology Security Conference, Gold Coast, Queensland, Australia."},{"key":"jdcf.2012070103-46","doi-asserted-by":"crossref","unstructured":"Martynov, D., Roman, J., Vaidya, S., & Fu, H. (2007). Design and implementation of an intrusion detection system for wireless sensor networks. In Proceedings of the IEEE International Conference on Electro\/Information Technology (pp. 507-512).","DOI":"10.1109\/EIT.2007.4374444"},{"key":"jdcf.2012070103-47","unstructured":"Merkel, A., Bellosa, F., & Weissel, A. (2005). Event driven thermal management in SMP systems. In Proceedings of the 2nd Workshop on Temperature-Aware Computer Systems, Madison, WI."},{"key":"jdcf.2012070103-48","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2010.85"},{"key":"jdcf.2012070103-49","doi-asserted-by":"crossref","unstructured":"Mobgraber, J., Reinert, F., & Vagts, H. (2010). An architecture for a task-oriented surveillance system. In Proceedings of the 5th International Conference on Systems (pp. 146-151).","DOI":"10.1109\/ICONS.2010.32"},{"key":"jdcf.2012070103-50","unstructured":"Monari, E., Voth, S., & Kroschel, K. (2005). An object and task oriented architecture for automated video surveillance in distributed sensor networks. In Proceedings of the 5th IEEE International Conference on Advanced Video and Signal Based Surveillance (pp. 339-346)."},{"key":"jdcf.2012070103-51","doi-asserted-by":"crossref","unstructured":"Nagarajan, V., & Gupta, R. (2009). ECMon: Exposing cache events for monitoring. In Proceedings of the 36th Annual International Symposium on Computer Architecture (pp. 349-360).","DOI":"10.1145\/1555815.1555798"},{"key":"jdcf.2012070103-52","unstructured":"Nicolai, C. R. K. (2010). Secure digital chains of evidence. In Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering, Oakland, CA."},{"key":"jdcf.2012070103-53","doi-asserted-by":"crossref","unstructured":"Oh, S., Hoogs, A., Perera, A., Cuntoor, N., Chen, C.-C., & Lee, J.-T. \u2026Desai, M. (2011). A large-scale benchmark dataset for event recognition in surveillance video. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.","DOI":"10.1109\/CVPR.2011.5995586"},{"key":"jdcf.2012070103-54","doi-asserted-by":"crossref","unstructured":"Paschke, A., Bichler, M., & Dietrich, J. (2005). ContractLog: An approach to rule based monitoring and execution of service level agreements. In Proceedings of the International Conference on Rules and Rule Markup Languages for the Semantic Web (pp. 209-217).","DOI":"10.1007\/11580072_19"},{"key":"jdcf.2012070103-55","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.1003"},{"key":"jdcf.2012070103-56","doi-asserted-by":"crossref","unstructured":"Raty, T., Oikarinen, J., Nieminen, M., & Lindholm, M. (2008). Sensor data collection of the single location surveillance point system. In Proceedings of the 7th IEEE\/ACIS International Conference on Computer and Information Science (pp. 382-387).","DOI":"10.1109\/ICIS.2008.30"},{"key":"jdcf.2012070103-57","unstructured":"Robert, J., & Stramm, Y. M. (2009). A network-centric approach to enhanced national airspace. In Proceedings of the IEEE Aerospace Conference (pp. 1-11)."},{"key":"jdcf.2012070103-58","doi-asserted-by":"crossref","unstructured":"Saini, M. K., Atrey, P. K., Emmanuel, S., & Kankankhalli, M. S. (2010). Functionality delegation in distributed surveillance systems. In Proceedings of the 7th IEEE International Conference on Advanced Video and Signal Based Surveillance (pp. 72-79).","DOI":"10.1109\/AVSS.2010.58"},{"key":"jdcf.2012070103-59","doi-asserted-by":"crossref","unstructured":"Sandford, P. J., Parish, D. J., & Sandford, J. M. (2006). Detecting security threats in the network core using data mining techniques. In Proceedings of the 10th IEEE\/IFIP Conference on Network Operations and Management Symposium.","DOI":"10.1109\/NOMS.2006.1687640"},{"key":"jdcf.2012070103-60","unstructured":"Schatten, S. (2007). Concepts and models for typing events for event based systems. In Proceedings of the International Conference on Distributed Event-based Systems (pp. 62-70)."},{"key":"jdcf.2012070103-61","doi-asserted-by":"crossref","unstructured":"Speidel, U., Eimann, R., & Brownlee, N. (2007). Detecting network events via T-entropy. In Proceedings of the 6th International Conference on Information, Communications & Signal Processing (pp. 1-5).","DOI":"10.1109\/ICICS.2007.4449642"},{"key":"jdcf.2012070103-62","unstructured":"Srinivas, K. S., & Monrose, F. (2010). Trail of bytes: Efficient support for forensic analysis. In Proceedings of the 17th ACM Conference on Computer and Communications Security (pp. 50-60)."},{"key":"jdcf.2012070103-63","doi-asserted-by":"crossref","unstructured":"Stahlberg, P., Miklau, G., & Levine, B. N. (2007). Threats to privacy in the forensic analysis of database systems. In Proceedings of the ACM SIGMOD International Conference on Management of Data (pp. 91-102).","DOI":"10.1145\/1247480.1247492"},{"key":"jdcf.2012070103-64","doi-asserted-by":"crossref","unstructured":"Stoumpos, V., Deligiannakis, A., Kotidis, Y., & Delis, A. (2008). Processing event monitoring queries in sensor networks. In Proceedings of the 24th IEEE International Conference on Data Engineering (pp. 1436-1438).","DOI":"10.1109\/ICDE.2008.4497581"},{"key":"jdcf.2012070103-65","unstructured":"Tang, M., & Fidge, C. (2010). Reconstruction of falsified computer logs for digital forensics investigations. In Proceedings of the 8th Australasian Information Security Conference, Brisbane, Queensland, Australia."},{"key":"jdcf.2012070103-66","doi-asserted-by":"crossref","unstructured":"Tang, Y., Al-Shaer, E., & Zhang, B. (2007). Toward globally optiman event monitoring and aggregation for large-scale overlay networks. In Proceedings of the IFIP\/IEEE International Symposium on Integrated Network Management (pp. 236-245).","DOI":"10.1109\/INM.2007.374788"},{"key":"jdcf.2012070103-67","doi-asserted-by":"crossref","unstructured":"Tripathi, A. R., Kulkarni, D., Talkad, H., Koka, M., & Karanth, S. (2007). Autonomic configuration and recovery in a mobile agent-based distributed event - Monitoring system. Journal of Software -Practice & Experience, 37(5), 493-522.","DOI":"10.1002\/spe.777"},{"key":"jdcf.2012070103-68","doi-asserted-by":"crossref","unstructured":"Tseng, Y.-C., Wang, Y.-C., Cheng, K.-Y., & Hsieh, Y.-Y. (2007) iMouse: An intergrated mobile surveillance and wireless sensor system. In Proceedings of the 8th ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (pp. 178-181).","DOI":"10.1145\/1089444.1089475"},{"key":"jdcf.2012070103-69","doi-asserted-by":"crossref","unstructured":"Vaculin, R., & Sycara, K. (2007). Specifying and monitoring composite events for semantic web services. In Proceedings of the 5th European Conference on Web Services (pp. 87-96).","DOI":"10.1109\/ECOWS.2007.29"},{"key":"jdcf.2012070103-70","doi-asserted-by":"crossref","unstructured":"Vezzani, R., & Cucchiara, R. (2010). Event driven software architecture for multi-camera and distributed surveillance research systems. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops (pp. 1-8).","DOI":"10.1109\/CVPRW.2010.5543825"},{"key":"jdcf.2012070103-71","unstructured":"Wagner, F. (2007). Awareness service based on event logs. In Proceedings of the 2nd Workshop on Intelligent and Knowledge oriented Technologies, Ko\u0161ice, Slovakia (pp. 106-109)."},{"key":"jdcf.2012070103-72","doi-asserted-by":"crossref","unstructured":"Walzer, K., Breddin, T., & Groch, M. (2008). Relative temporal constraints in the rate algorithm for complex event detection. In Proceedings of the 2nd International Conference on Distributed Event-based Systems (pp. 147-155).","DOI":"10.1145\/1385989.1386008"},{"key":"jdcf.2012070103-73","doi-asserted-by":"crossref","unstructured":"Wang, Q., Liu, Y., Li, M., & Mei, H. (2007). An online monitoring approach for web service requirements. IEEE Transactions on Services Computing archive, 2(4), 338-351.","DOI":"10.1109\/TSC.2009.22"},{"key":"jdcf.2012070103-74","doi-asserted-by":"crossref","unstructured":"Wang, Y., Vuran, M. C., & Goddard, S. (2011). Analysis of event detection delay in wireless sensor neworks. In Proceedings of the 30th IEEE International Conference on Computer Communications (pp. 1296-1304).","DOI":"10.1109\/INFCOM.2011.5934912"},{"key":"jdcf.2012070103-75","unstructured":"Woda, M., & Walkowaik, T. (2007). Multi agent event monitoring system, multi agent event monitoring system. In Proceedings of the 3rd International Conference on Information Technology."},{"key":"jdcf.2012070103-76","doi-asserted-by":"crossref","unstructured":"Wonnemann, C., Accorsi, R., & Muller, G. (2009). On information flow forensics in business application scenarios. In Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference (pp. 324-328).","DOI":"10.1109\/COMPSAC.2009.154"},{"key":"jdcf.2012070103-77","unstructured":"Wu, C. (2010). The problems in campus network information security and its solutions. In Proceedings of the 2nd International Conference on Industrial and Information Systems (pp. 261-264)."},{"key":"jdcf.2012070103-78","doi-asserted-by":"crossref","unstructured":"Wu, E., Diao, Y., & Rizvi, S. (2006). High performance complex event processing over streams. In Proceedings of the ACM International Conference on Management of Data (pp. 407-418).","DOI":"10.1145\/1142473.1142520"},{"key":"jdcf.2012070103-79","unstructured":"Wu, K., Ding, T., & He, J. (2011). The research of intrusion detection technology based on heuristic analysis. In Proceedings of the 6th IEEE Joint International Information Technology and Artificial Intelligence Conference (pp. 164-166)."},{"key":"jdcf.2012070103-80","doi-asserted-by":"crossref","unstructured":"Xu, L.-Q., & Anjulan, A. (2009). Relating 'pace' to activity changes in mono- and multi- camera surveillance videos. In Proceedings of the 6th IEEE International Conference on Advanced Video and Signal Based Surveillance (pp. 104-109).","DOI":"10.1109\/AVSS.2009.81"},{"key":"jdcf.2012070103-81","doi-asserted-by":"crossref","unstructured":"Zeng, L., Lei, H., & Chang, H. (2007). Monitoring the QoS for web services. In Proceedings of the 5th International Conference on Service-Oriented Computing (pp. 132-144).","DOI":"10.1007\/978-3-540-74974-5_11"},{"key":"jdcf.2012070103-82","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-374633-7.00021-5"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=72323","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T21:34:32Z","timestamp":1744925672000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jdcf.2012070103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2012,7,1]]},"references-count":83,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,7]]}},"URL":"https:\/\/doi.org\/10.4018\/jdcf.2012070103","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,7,1]]}}}