{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:54:07Z","timestamp":1740099247548,"version":"3.37.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030045029"},{"type":"electronic","value":"9783030045036"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-04503-6_12","type":"book-chapter","created":{"date-parts":[[2018,12,11]],"date-time":"2018-12-11T00:38:10Z","timestamp":1544488690000},"page":"137-141","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Rapid Anomaly Detection Using Integrated Prudence Analysis (IPA)"],"prefix":"10.1007","author":[{"given":"Omaru","family":"Maruatona","sequence":"first","affiliation":[]},{"given":"Peter","family":"Vamplew","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Dazeley","sequence":"additional","affiliation":[]},{"given":"Paul A.","family":"Watters","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,21]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Maruatona, O., Vamplew, P., Dazeley, R., Watters, P.A.: Evaluating accuracy in prudence analysis for cyber security. In: Proceedings of the 24th International Conference on Neural Information Processing (ICONIP) (2017)","DOI":"10.1007\/978-3-319-70139-4_41"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Maruatona, O.O., Vamplew, P., Dazeley, R.: RM and RDM: a preliminary evaluation of two prudent RDR techniques. In: The Pacific Rim Knowledge Acquisition Workshop, Kuching, pp. 188\u2013194 (2012)","DOI":"10.1007\/978-3-642-32541-0_16"},{"key":"12_CR3","unstructured":"Dazeley, R., Kang, B.: The viability of prudence analysis. In: The Pacific Rim Knowledge Acquisition Workshop, Hanoi, pp. 107\u2013121 (2008)"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Prayote, A., Compton, P.: Detecting anomalies and intruders. In: International Conference on Artificial Intelligence 2006, Hobart, pp. 1084\u20131088 (2006)","DOI":"10.1007\/11941439_127"},{"key":"12_CR5","unstructured":"Prayote, A.: Knowledge based anomaly detection. PhD Thesis, University of New South Wales (2007)"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Dazeley, R., Kang, B.: Rated MCRDR: finding non-linear relationships between classifications in MCRDR. In: 3rd International Conference on Hybrid Intelligent Systems, pp 499\u2013508. IOS Press, Melbourne (2003)","DOI":"10.1007\/978-3-540-24581-0_21"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Lee, S.J., Watters, P.A.: Cyber budget optimization through security event clustering. In: Proceedings of the 7th IEEE International CYBER Conference, Hawaii, HI (2017)","DOI":"10.1109\/CYBER.2017.8446586"},{"issue":"2","key":"12_CR8","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1080\/10345329.2015.12036042","volume":"27","author":"J Prichard","year":"2015","unstructured":"Prichard, J., Watters, P.A., Krone, T., Spiranovic, C., Cockburn, H.: Social media sentiment analysis: a new empirical tool for assessing public opinion on crime? Curr. Issues Crim. Justice 27(2), 217\u2013236 (2015)","journal-title":"Curr. Issues Crim. Justice"},{"key":"12_CR9","first-page":"44","volume":"9","author":"S Suriadi","year":"2017","unstructured":"Suriadi, S., Susnjak, T., Ponder-Sutton, A., Watters, P.A., Schumacher, C.: Using data-driven and process mining techniques for identifying and characterizing problem gamblers. Complex Syst. Inf. Model. Q. 9, 44\u201366 (2017)","journal-title":"Complex Syst. Inf. Model. Q."},{"key":"12_CR10","unstructured":"UCI: UCI machine learning repository. http:\/\/archive.ics.uci.edu\/ml\/index.html (2012)"},{"key":"12_CR11","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1023\/B:AIRE.0000045502.10941.a9","volume":"22","author":"VJ Hodge","year":"2004","unstructured":"Hodge, V.J., Austin, J.: A survey of outlier detection methodologies. Artif. Intell. Rev. 22, 85\u2013126 (2004)","journal-title":"Artif. Intell. Rev."}],"container-title":["Lecture Notes in Computer Science","Trends and Applications in Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-04503-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T00:27:14Z","timestamp":1573086434000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-04503-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030045029","9783030045036"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-04503-6_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"PAKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pakdd2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/mamsap.it.deakin.edu.au\/pakdd18\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}