{"id":"https://openalex.org/W2986071342","doi":"https://doi.org/10.1109/cybersa.2019.8899398","title":"Online Anomaly Detection of Time Series at Scale","display_name":"Online Anomaly Detection of Time Series at Scale","publication_year":2019,"publication_date":"2019-06-01","ids":{"openalex":"https://openalex.org/W2986071342","doi":"https://doi.org/10.1109/cybersa.2019.8899398","mag":"2986071342"},"language":"en","primary_location":{"id":"doi:10.1109/cybersa.2019.8899398","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cybersa.2019.8899398","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101709309","display_name":"Andrew Mason","orcid":"https://orcid.org/0000-0001-9848-6595"},"institutions":[{"id":"https://openalex.org/I82284825","display_name":"Cranfield University","ror":"https://ror.org/05cncd958","country_code":"GB","type":"education","lineage":["https://openalex.org/I82284825"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Andrew Mason","raw_affiliation_strings":["SATM, Cranfield University, Cranfield, UK"],"affiliations":[{"raw_affiliation_string":"SATM, Cranfield University, Cranfield, UK","institution_ids":["https://openalex.org/I82284825"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087731729","display_name":"Yifan Zhao","orcid":"https://orcid.org/0000-0003-2383-5724"},"institutions":[{"id":"https://openalex.org/I82284825","display_name":"Cranfield University","ror":"https://ror.org/05cncd958","country_code":"GB","type":"education","lineage":["https://openalex.org/I82284825"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Yifan Zhao","raw_affiliation_strings":["SATM, Cranfield University, Cranfield, UK"],"affiliations":[{"raw_affiliation_string":"SATM, Cranfield University, Cranfield, UK","institution_ids":["https://openalex.org/I82284825"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020000412","display_name":"Hongmei He","orcid":"https://orcid.org/0000-0002-6653-8298"},"institutions":[{"id":"https://openalex.org/I82284825","display_name":"Cranfield University","ror":"https://ror.org/05cncd958","country_code":"GB","type":"education","lineage":["https://openalex.org/I82284825"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Hongmei He","raw_affiliation_strings":["SATM, Cranfield University, Cranfield, UK"],"affiliations":[{"raw_affiliation_string":"SATM, Cranfield University, Cranfield, UK","institution_ids":["https://openalex.org/I82284825"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031849524","display_name":"Raymon Gompelman","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Raymon Gompelman","raw_affiliation_strings":["iDirect, Cranfield, UK"],"affiliations":[{"raw_affiliation_string":"iDirect, Cranfield, UK","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067492133","display_name":"Srikanth Mandava","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Srikanth Mandava","raw_affiliation_strings":["iDirect, Cranfield, UK"],"affiliations":[{"raw_affiliation_string":"iDirect, Cranfield, UK","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101709309"],"corresponding_institution_ids":["https://openalex.org/I82284825"],"apc_list":null,"apc_paid":null,"fwci":0.5601,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.75717098,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"6","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12205","display_name":"Time Series Analysis and Forecasting","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.827896237373352},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7381637692451477},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6160237789154053},{"id":"https://openalex.org/keywords/time-series","display_name":"Time series","score":0.5856659412384033},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.519601047039032},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4575771987438202},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.4559505581855774},{"id":"https://openalex.org/keywords/series","display_name":"Series (stratigraphy)","score":0.43257901072502136},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.39673492312431335},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32344019412994385},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.19956883788108826},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1063065230846405}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.827896237373352},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7381637692451477},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6160237789154053},{"id":"https://openalex.org/C151406439","wikidata":"https://www.wikidata.org/wiki/Q186588","display_name":"Time series","level":2,"score":0.5856659412384033},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.519601047039032},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4575771987438202},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.4559505581855774},{"id":"https://openalex.org/C143724316","wikidata":"https://www.wikidata.org/wiki/Q312468","display_name":"Series (stratigraphy)","level":2,"score":0.43257901072502136},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.39673492312431335},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32344019412994385},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.19956883788108826},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1063065230846405},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cybersa.2019.8899398","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cybersa.2019.8899398","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1536447791","https://openalex.org/W1547333707","https://openalex.org/W1970655212","https://openalex.org/W2008501408","https://openalex.org/W2020820745","https://openalex.org/W2048665112","https://openalex.org/W2095345875","https://openalex.org/W2095713606","https://openalex.org/W2111619626","https://openalex.org/W2118374803","https://openalex.org/W2122280061","https://openalex.org/W2122646361","https://openalex.org/W2143082178","https://openalex.org/W2296719434","https://openalex.org/W2331052961","https://openalex.org/W2334165873","https://openalex.org/W2524620548","https://openalex.org/W2562836854","https://openalex.org/W2585533358","https://openalex.org/W2624959351","https://openalex.org/W2734811990","https://openalex.org/W2753802340","https://openalex.org/W2760451156","https://openalex.org/W2765505779","https://openalex.org/W2792264521","https://openalex.org/W2794778778","https://openalex.org/W2805772682","https://openalex.org/W2895922049","https://openalex.org/W2963716433","https://openalex.org/W3015894552","https://openalex.org/W6632102171","https://openalex.org/W6632795786","https://openalex.org/W6677829549","https://openalex.org/W6730713231","https://openalex.org/W6755492238"],"related_works":["https://openalex.org/W4392337488","https://openalex.org/W2102271161","https://openalex.org/W4244478748","https://openalex.org/W4313425421","https://openalex.org/W4388714791","https://openalex.org/W2361883455","https://openalex.org/W2025540157","https://openalex.org/W2622688551","https://openalex.org/W1550175370","https://openalex.org/W1990205660"],"abstract_inverted_index":{"Cyber":[0],"breaches":[1],"can":[2],"result":[3],"in":[4,49,62,97],"disruption":[5],"to":[6,102],"business":[7],"operations,":[8],"reputation":[9],"damage":[10],"as":[11,13],"well":[12],"directly":[14],"affecting":[15],"the":[16,20,115],"financial":[17],"stability":[18],"of":[19,64],"targeted":[21],"corporations,":[22],"with":[23],"potential":[24],"impacts":[25],"on":[26,58,77,80,114],"future":[27],"profits":[28],"and":[29,41,66,69,84,100,110,118],"stock":[30],"values.":[31],"Automatic":[32],"network-stream":[33],"monitoring":[34],"becomes":[35],"necessary":[36],"for":[37,74,95],"cyber":[38],"situation":[39],"awareness,":[40],"time-series":[42,59],"anomaly":[43],"detection":[44],"plays":[45],"an":[46],"important":[47],"role":[48],"network":[50],"stream":[51],"monitoring.":[52],"This":[53],"study":[54],"surveyed":[55],"recent":[56],"research":[57],"analysis":[60,76,108],"methods":[61],"respect":[63],"parametric":[65],"non-parametric":[67],"techniques,":[68,109],"popular":[70],"machine":[71],"learning":[72],"platforms":[73],"data":[75,79,107,116],"streaming":[78],"both":[81,98],"single":[82],"server":[83],"cloud":[85],"computing":[86,111],"environments.":[87],"We":[88],"believe":[89],"it":[90],"provides":[91],"a":[92],"good":[93],"reference":[94],"researchers":[96],"academia":[99],"industry":[101],"select":[103],"suitable":[104],"(time":[105],"series)":[106],"platforms,":[112],"dependent":[113],"scale":[117],"real-time":[119],"requirements.":[120]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
