{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T09:14:04Z","timestamp":1725786844996},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10,25]]},"DOI":"10.1109\/vizsec.2015.7312770","type":"proceedings-article","created":{"date-parts":[[2015,11,2]],"date-time":"2015-11-02T23:00:01Z","timestamp":1446505201000},"page":"1-8","source":"Crossref","is-referenced-by-count":9,"title":["Discovery of rating fraud with real-time streaming visual analytics"],"prefix":"10.1109","author":[{"given":"Kodzo","family":"Webga","sequence":"first","affiliation":[]},{"given":"Aidong","family":"Lu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2320733"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2012.6375887"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WISE.2000.882411"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2012.89"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2013.227"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2307\/2687269"},{"key":"ref15","article-title":"Data Visualization Via Collaborative Filtering","author":"kermarrec","year":"2012","journal-title":"Research Report"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2014.89"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2012.148"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1007\/978-3-540-92892-8_46","article-title":"Personalized news video recommendation","author":"luo","year":"2009","journal-title":"Advances in Multimedia Modeling"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-2456-3_7"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972795.83"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557010"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807305"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2013.254"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1057\/ivs.2009.18"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/sec.324"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.laa.2005.07.021"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1108\/17440081311316361"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/VAST.2012.6400552"},{"year":"0","key":"ref2"},{"key":"ref9","first-page":"65","article-title":"Nstreamaware: real-time visual analytics for data streams to enhance situational awareness","author":"fischer","year":"2014","journal-title":"ACM"},{"year":"0","key":"ref1"},{"journal-title":"Pro WCF Practical Microsoft SOA Implementation","year":"2011","author":"pathak","key":"ref20"},{"journal-title":"Movielens 100k Movie rating dataset","year":"0","author":"research","key":"ref22"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1145\/2554850.2555151","article-title":"Jr. Spectral analysis and text processing over the computer science literature: Patterns and discoveries","author":"quille","year":"2014","journal-title":"Proceedings of the 29th Annual ACM Symposium on Applied Computing SAC'14"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2207243.2207252"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2011.144"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339662"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/2671491.2671492","article-title":"Visualization evaluation for cyber security: Trends and future directions","author":"staheli","year":"2014","journal-title":"Proceedings of the Eleventh Workshop on Visualization for Cyber Security VizSec'14"}],"event":{"name":"2015 IEEE Symposium on Visualization for Cyber Security (VizSec)","start":{"date-parts":[[2015,10,25]]},"location":"Chicago, IL, USA","end":{"date-parts":[[2015,10,25]]}},"container-title":["2015 IEEE Symposium on Visualization for Cyber Security (VizSec)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7310645\/7312757\/07312770.pdf?arnumber=7312770","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,25]],"date-time":"2022-05-25T01:13:03Z","timestamp":1653441183000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7312770\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,25]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/vizsec.2015.7312770","relation":{},"subject":[],"published":{"date-parts":[[2015,10,25]]}}}