{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T05:25:57Z","timestamp":1736227557407,"version":"3.32.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T00:00:00Z","timestamp":1568678400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of King Saud University - Computer and Information Sciences"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1016\/j.jksuci.2019.09.009","type":"journal-article","created":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T05:49:57Z","timestamp":1569304197000},"page":"1446-1454","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"title":["Parallel graph-based anomaly detection technique for sequential data"],"prefix":"10.1007","volume":"34","author":[{"given":"Ahmed","family":"Farag","sequence":"first","affiliation":[]},{"given":"Hatem","family":"Abdelkader","sequence":"additional","affiliation":[]},{"given":"Rashed","family":"Salem","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"volume":"vol. 11","year":"1980","author":"Hawkins","key":"10.1016\/j.jksuci.2019.09.009_b0005"},{"issue":"3","key":"10.1016\/j.jksuci.2019.09.009_b0010","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/1541880.1541882","article-title":"Anomaly detection: a survey","volume":"41","author":"Chandola","year":"2009","journal-title":"ACM Comput. Surveys"},{"issue":"2","key":"10.1016\/j.jksuci.2019.09.009_b0015","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TSE.1987.232894","article-title":"An intrusion-detection model","author":"Denning","year":"1987","journal-title":"IEEE Trans. Software Eng."},{"key":"10.1016\/j.jksuci.2019.09.009_b0020","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/j.procs.2015.04.191","article-title":"Intrusion detection system (ids): anomaly detection using outlier detection approach","volume":"48","author":"Jabez","year":"2015","journal-title":"Proc. Comput. Sci."},{"key":"10.1016\/j.jksuci.2019.09.009_b0025","series-title":"Information and Communication Technology (ICoICT), 2014 2nd International Conference on","first-page":"7","article-title":"Anomaly detection on intrusion detection system using clique partitioning","author":"Nastaiinullah","year":"2014"},{"issue":"1","key":"10.1016\/j.jksuci.2019.09.009_b0030","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/TDSC.2007.70228","article-title":"Credit card fraud detection using hidden markov model","volume":"5","author":"Srivastava","year":"2008","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"2015","key":"10.1016\/j.jksuci.2019.09.009_b0035","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.dss.2015.04.013","article-title":"Apate: a novel approach for automated credit card transaction fraud detection using network-based extensions","volume":"75","author":"Van Vlasselaer","year":"2015","journal-title":"Decis. Support Syst."},{"year":"2017","series-title":"Outlier Detection in Graphs and Networks","author":"Aggarwal","key":"10.1016\/j.jksuci.2019.09.009_b0040"},{"issue":"3","key":"10.1016\/j.jksuci.2019.09.009_b0045","doi-asserted-by":"crossref","first-page":"626","DOI":"10.1007\/s10618-014-0365-y","article-title":"Graph based anomaly detection and description: a survey","volume":"29","author":"Akoglu","year":"2015","journal-title":"Data Min. Knowl. Discov."},{"key":"10.1016\/j.jksuci.2019.09.009_b0050","unstructured":"Mishra, N., Blick, D., Guha, S., Schrijvers, O.J., 2017. Outlier detection for streaming data. uS Patent App. 14\/990,175."},{"issue":"3","key":"10.1016\/j.jksuci.2019.09.009_b0055","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1093\/biostatistics\/kxl029","article-title":"Cancer outlier differential gene expression detection","volume":"8","author":"Wu","year":"2006","journal-title":"Biostatistics"},{"key":"10.1016\/j.jksuci.2019.09.009_b0060","unstructured":"Cortez, P., Morais, A.d.J.R., 2007. A data mining approach to predict forest fires using meteorological data."},{"key":"10.1016\/j.jksuci.2019.09.009_b0065","series-title":"Proceedings of the 11th ACM International Symposium on Advances in Geographic Information Systems","first-page":"49","article-title":"Detecting region outliers in meteorological data","author":"Zhao","year":"2003"},{"issue":"11","key":"10.1016\/j.jksuci.2019.09.009_b0070","doi-asserted-by":"crossref","first-page":"3639","DOI":"10.1109\/TIE.2009.2027926","article-title":"Classification of energy consumption in buildings with outlier detection","volume":"57","author":"Li","year":"2010","journal-title":"IEEE Trans. Ind. Electron."},{"issue":"1","key":"10.1016\/j.jksuci.2019.09.009_b0075","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.enbuild.2006.03.033","article-title":"Using intelligent data analysis to detect abnormal energy consumption in buildings","volume":"39","author":"Seem","year":"2007","journal-title":"Energy Build."},{"key":"10.1016\/j.jksuci.2019.09.009_b0080","series-title":"Power Systems Conference and Exposition, 2009. PSCE\u201909. IEEE\/PES","first-page":"1","article-title":"Identification and detection of electricity customer behaviour irregularities","author":"Nizar","year":"2009"},{"issue":"4","key":"10.1016\/j.jksuci.2019.09.009_b0085","doi-asserted-by":"crossref","first-page":"3966","DOI":"10.3390\/rs70403966","article-title":"Global and local real-time anomaly detectors for hyperspectral remote sensing imagery","volume":"7","author":"Zhao","year":"2015","journal-title":"Remote Sens."},{"key":"10.1016\/j.jksuci.2019.09.009_b0090","first-page":"94","article-title":"Outlier detection algorithms in data mining","volume":"vol. 1","author":"Xi","year":"2008"},{"issue":"4","key":"10.1016\/j.jksuci.2019.09.009_b0095","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1023\/A:1024974810270","article-title":"Outlier detection algorithms in data mining systems","volume":"29","author":"Petrovskiy","year":"2003","journal-title":"Programm. Comput. Software"},{"issue":"2","key":"10.1016\/j.jksuci.2019.09.009_b0100","doi-asserted-by":"crossref","first-page":"1169","DOI":"10.1016\/j.eswa.2009.06.008","article-title":"A comparison of outlier detection algorithms for its data","volume":"37","author":"Chen","year":"2010","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.jksuci.2019.09.009_b0105","series-title":"International Conference on Artificial Intelligence and Computational Intelligence","first-page":"380","article-title":"A survey of outlier detection methodologies and their applications","author":"Niu","year":"2011"},{"issue":"2","key":"10.1016\/j.jksuci.2019.09.009_b0110","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1023\/B:AIRE.0000045502.10941.a9","article-title":"A survey of outlier detection methodologies","volume":"22","author":"Hodge","year":"2004","journal-title":"Artif. Intell. Rev."},{"key":"10.1016\/j.jksuci.2019.09.009_b0115","series-title":"International Workshop on Machine Learning and Data Mining in Pattern Recognition","first-page":"440","article-title":"A comparative study of outlier detection algorithms","author":"Isaksson","year":"2009"},{"key":"10.1016\/j.jksuci.2019.09.009_b0120","series-title":"Computer, Communication and Control (IC4), 2015 International Conference on","first-page":"1","article-title":"Analysis and evaluation of outlier detection algorithms in data streams","author":"Shukla","year":"2015"},{"key":"10.1016\/j.jksuci.2019.09.009_b0125","article-title":"Outlier detection techniques","volume":"10","author":"Kriegel","year":"2010","journal-title":"Tutorial at KDD"},{"issue":"4","key":"10.1016\/j.jksuci.2019.09.009_b0130","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/s101150200013","article-title":"Findout: finding outliers in very large datasets","volume":"4","author":"Yu","year":"2002","journal-title":"Knowl. Inf. Syst."},{"key":"10.1016\/j.jksuci.2019.09.009_b0135","series-title":"Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"371","article-title":"Detecting graph-based spatial outliers: algorithms and applications (a summary of results)","author":"Shekhar","year":"2001"},{"issue":"3","key":"10.1016\/j.jksuci.2019.09.009_b0140","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/s10489-005-4610-3","article-title":"Learning states and rules for detecting anomalies in time series","volume":"23","author":"Salvador","year":"2005","journal-title":"Appl. Intell."},{"issue":"10","key":"10.1016\/j.jksuci.2019.09.009_b0145","first-page":"1","article-title":"Outlier removal clustering through minimum spanning tree","volume":"31","author":"Karthikeyan","year":"2011","journal-title":"Int. J. Comput. Appl."},{"issue":"2014","key":"10.1016\/j.jksuci.2019.09.009_b0150","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.knosys.2014.02.008","article-title":"Graph-based approach for outlier detection in sequential data and its application on stock market and weather data","volume":"61","author":"Rahmani","year":"2014","journal-title":"Knowl.-Based Syst."},{"issue":"6","key":"10.1016\/j.jksuci.2019.09.009_b0155","doi-asserted-by":"crossref","first-page":"1389","DOI":"10.1002\/j.1538-7305.1957.tb01515.x","article-title":"Shortest connection networks and some generalizations","volume":"36","author":"Prim","year":"1957","journal-title":"Bell Syst. Tech. J."},{"issue":"1","key":"10.1016\/j.jksuci.2019.09.009_b0160","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1090\/S0002-9939-1956-0078686-7","article-title":"On the shortest spanning subtree of a graph and the traveling salesman problem","volume":"7","author":"Kruskal","year":"1956","journal-title":"Proc. Am. Math. Soc."},{"key":"10.1016\/j.jksuci.2019.09.009_b0165","unstructured":"Boravka, O., 1926. O jist\u00e9m probl\u00e9mu minim\u00e1ln\u00edm."}],"container-title":["Journal of King Saud University - Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S131915781930847X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S131915781930847X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T17:23:20Z","timestamp":1736184200000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S131915781930847X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["S131915781930847X"],"URL":"https:\/\/doi.org\/10.1016\/j.jksuci.2019.09.009","relation":{},"ISSN":["1319-1578"],"issn-type":[{"type":"print","value":"1319-1578"}],"subject":[],"published":{"date-parts":[[2022,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Parallel graph-based anomaly detection technique for sequential data","name":"articletitle","label":"Article Title"},{"value":"Journal of King Saud University - Computer and Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jksuci.2019.09.009","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2019 The Authors. Published by King Saud University.","name":"copyright","label":"Copyright"}]}}