{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T12:25:05Z","timestamp":1725625505172},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0915782IIS-0438909"],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["CNS-0915782IIS-0438909"],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,3,22]]},"DOI":"10.1145\/1739041.1739076","type":"proceedings-article","created":{"date-parts":[[2010,3,16]],"date-time":"2010-03-16T19:27:05Z","timestamp":1268767625000},"page":"275-286","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Splash"],"prefix":"10.1145","author":[{"given":"Lujun","family":"Fang","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, MI"}]},{"given":"Kristen","family":"LeFevre","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI"}]}],"member":"320","published-online":{"date-parts":[[2010,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"http:\/\/www.hhs.gov\/ocr\/hipaa\/. http:\/\/www.hhs.gov\/ocr\/hipaa\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Data mining extensions (DMX) reference. SQL Server 2005 Books Online. http:\/\/technet.microsoft.com. Data mining extensions (DMX) reference. SQL Server 2005 Books Online. http:\/\/technet.microsoft.com."},{"key":"e_1_3_2_1_3_1","unstructured":"Db2 intelligent miner. http:\/\/www-01.ibm.com\/software\/data\/iminer\/. Db2 intelligent miner. http:\/\/www-01.ibm.com\/software\/data\/iminer\/."},{"key":"e_1_3_2_1_4_1","unstructured":"http:\/\/www.snort.org. Retrieved July 16 2008. http:\/\/www.snort.org. Retrieved July 16 2008."},{"key":"e_1_3_2_1_5_1","unstructured":"An introduction to computer security: The NIST handbook. NIST Special Publication 800--12. An introduction to computer security: The NIST handbook. NIST Special Publication 800--12."},{"key":"e_1_3_2_1_6_1","unstructured":"Kdd cup 1999 dataset. http:\/\/archive.ics.uci.edu\/ml\/databases\/kddcup99\/kddcup99.html. Kdd cup 1999 dataset. http:\/\/archive.ics.uci.edu\/ml\/databases\/kddcup99\/kddcup99.html."},{"key":"e_1_3_2_1_7_1","unstructured":"Matlab: The language of technical computing. http:\/\/www.mathworks.com\/products\/matlab\/. Matlab: The language of technical computing. http:\/\/www.mathworks.com\/products\/matlab\/."},{"key":"e_1_3_2_1_8_1","unstructured":"Postgresql. http:\/\/www.postgresql.org\/. Postgresql. http:\/\/www.postgresql.org\/."},{"key":"e_1_3_2_1_9_1","unstructured":"The r project for statistical computing. http:\/\/www.r-project.org\/. The r project for statistical computing. http:\/\/www.r-project.org\/."},{"key":"e_1_3_2_1_10_1","unstructured":"Result of kdd cup 1999 contest. http:\/\/www-cse.ucsd.edu\/elkan\/clresults.html. Result of kdd cup 1999 contest. http:\/\/www-cse.ucsd.edu\/elkan\/clresults.html."},{"key":"e_1_3_2_1_11_1","unstructured":"Sas: Business intelligence software. http:\/\/www.sas.com. Sas: Business intelligence software. http:\/\/www.sas.com."},{"key":"e_1_3_2_1_12_1","unstructured":"Stata. http:\/\/www.stata.com. Stata. http:\/\/www.stata.com."},{"key":"e_1_3_2_1_13_1","unstructured":"Weka 3: Data mining software in java. http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/. Weka 3: Data mining software in java. http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/."},{"key":"e_1_3_2_1_14_1","volume-title":"Personal communication","author":"University of Michigan Health System Compliance Office.","year":"2008","unstructured":"University of Michigan Health System Compliance Office. Personal communication , 2008 . University of Michigan Health System Compliance Office. Personal communication, 2008."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1287369.1287383"},{"key":"e_1_3_2_1_16_1","volume-title":"VLDB","author":"Agrawal R.","year":"1994","unstructured":"R. Agrawal and R. Srikant . Fast algorithms for mining association rules . In VLDB , 1994 . R. Agrawal and R. Srikant. Fast algorithms for mining association rules. In VLDB, 1994."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/312129.312224"},{"key":"e_1_3_2_1_18_1","volume-title":"The Los Angeles Times","author":"Cart J.","year":"2009","unstructured":"J. Cart . Kaiser fires staffers who snooped into suleman's files . The Los Angeles Times , March 31 2009 . J. Cart. Kaiser fires staffers who snooped into suleman's files. The Los Angeles Times, March 31 2009."},{"key":"e_1_3_2_1_19_1","volume-title":"VLDB","author":"Chen B.","year":"2005","unstructured":"B. Chen , L. Chen , Y. Lin , and R. Ramakrishnan . Prediction cubes . In VLDB , 2005 . B. Chen, L. Chen, Y. Lin, and R. Ramakrishnan. Prediction cubes. In VLDB, 2005."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687553.1687576"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1986.10010"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142483"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/129888.129894"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of NSF Workshop on Next Generation Data Mining","author":"Dokas P.","year":"2002","unstructured":"P. Dokas , L. Ertoz , V. Kumar , A. Lazarevic , J. Srivastava , and P. Tan . Data mining for network intrusion detection . In Proceedings of NSF Workshop on Next Generation Data Mining , 2002 . P. Dokas, L. Ertoz, V. Kumar, A. Lazarevic, J. Srivastava, and P. Tan. Data mining for network intrusion detection. In Proceedings of NSF Workshop on Next Generation Data Mining, 2002."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009700419189"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1947337.1947356"},{"key":"e_1_3_2_1_27_1","volume-title":"VLDB","author":"Gehrke J.","year":"1998","unstructured":"J. Gehrke , R. Ramakrishnan , and V. Ganti . Rainforest - a framework for fast decision tree construction of large dataset . In VLDB , 1998 . J. Gehrke, R. Ramakrishnan, and V. Ganti. Rainforest - a framework for fast decision tree construction of large dataset. In VLDB, 1998."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009726021843"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/233269.233333"},{"key":"e_1_3_2_1_30_1","volume-title":"IDEAS","author":"Hu Y.","year":"2003","unstructured":"Y. Hu and B. Panda . Identification of malicious transactions in database systems . In IDEAS , 2003 . Y. Hu and B. Panda. Identification of malicious transactions in database systems. In IDEAS, 2003."},{"key":"e_1_3_2_1_31_1","volume-title":"VLDB","author":"Hua M.","year":"2007","unstructured":"M. Hua , J. Pei , A. Fu , X. Lin , and H. Leung . Efficiently answering top-k typicality queries . In VLDB , 2007 . M. Hua, J. Pei, A. Fu, X. Lin, and H. Leung. Efficiently answering top-k typicality queries. In VLDB, 2007."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/223784.223841"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-007-0051-4"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948144"},{"key":"e_1_3_2_1_35_1","volume-title":"AAAI Workshop on AI Methods in Fraud and Risk Management","author":"Lee W.","year":"1997","unstructured":"W. Lee and S. Stolfo . Learning patterns from unix process execution traces for intrusion detection . In AAAI Workshop on AI Methods in Fraud and Risk Management , 1997 . W. Lee and S. Stolfo. Learning patterns from unix process execution traces for intrusion detection. In AAAI Workshop on AI Methods in Fraud and Risk Management, 1997."},{"key":"e_1_3_2_1_36_1","volume-title":"USENIX Security Symposium","author":"Lee W.","year":"1998","unstructured":"W. Lee and S. Stolfo . Data mining approaches for intrusion detection . In USENIX Security Symposium , 1998 . W. Lee and S. Stolfo. Data mining approaches for intrusion detection. In USENIX Security Symposium, 1998."},{"key":"e_1_3_2_1_37_1","volume-title":"IEEE Symposium on Security and Privacy","author":"Lee W.","year":"1999","unstructured":"W. Lee , S. Stolfo , and K. Mok . A data mining framework for building intrusion detection models . In IEEE Symposium on Security and Privacy , 1999 . W. Lee, S. Stolfo, and K. Mok. A data mining framework for building intrusion detection models. In IEEE Symposium on Security and Privacy, 1999."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687643"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150531"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/645484.656381"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247599"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.69"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.001"},{"key":"e_1_3_2_1_44_1","volume-title":"VLDB","author":"Poosala Y.","year":"1997","unstructured":"Y. Poosala and Y. Ioannidis . Selectivity estimation without the attribute value independence assumption . In VLDB , 1997 . Y. Poosala and Y. Ioannidis. Selectivity estimation without the attribute value independence assumption. In VLDB, 1997."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/276304.276335"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/502585.502650"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535706_16"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.4"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/11506881_8"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59140-051-6"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2006.7"},{"key":"e_1_3_2_1_53_1","volume-title":"CIDR","author":"Zhang Y.","year":"2009","unstructured":"Y. Zhang , H. Herodotou , and J. Yang . Riot: I\/o-efficient numerical computing without sql . In CIDR , 2009 . Y. Zhang, H. Herodotou, and J. Yang. Riot: I\/o-efficient numerical computing without sql. In CIDR, 2009."}],"event":{"name":"EDBT\/ICDT '10: EDBT\/ICDT '10 joint conference","acronym":"EDBT\/ICDT '10","location":"Lausanne Switzerland"},"container-title":["Proceedings of the 13th International Conference on Extending Database Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1739041.1739076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T06:04:28Z","timestamp":1673589868000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1739041.1739076"}},"subtitle":["ad-hoc querying of data and statistical models"],"short-title":[],"issued":{"date-parts":[[2010,3,22]]},"references-count":53,"alternative-id":["10.1145\/1739041.1739076","10.1145\/1739041"],"URL":"https:\/\/doi.org\/10.1145\/1739041.1739076","relation":{},"subject":[],"published":{"date-parts":[[2010,3,22]]},"assertion":[{"value":"2010-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}