{"id":"https://openalex.org/W2063114706","doi":"https://doi.org/10.1145/2452376.2452395","title":"Anomaly management using complex event processing","display_name":"Anomaly management using complex event processing","publication_year":2013,"publication_date":"2013-03-18","ids":{"openalex":"https://openalex.org/W2063114706","doi":"https://doi.org/10.1145/2452376.2452395","mag":"2063114706"},"language":"en","primary_location":{"id":"doi:10.1145/2452376.2452395","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2452376.2452395","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th International Conference on Extending Database Technology","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049783844","display_name":"Bastian Ho\u00dfbach","orcid":null},"institutions":[{"id":"https://openalex.org/I161103922","display_name":"Philipps University of Marburg","ror":"https://ror.org/01rdrb571","country_code":"DE","type":"education","lineage":["https://openalex.org/I161103922"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Bastian Ho\u00dfbach","raw_affiliation_strings":["University of Marburg, Germany","University of Marburg, Germany#TAB#"],"affiliations":[{"raw_affiliation_string":"University of Marburg, Germany","institution_ids":["https://openalex.org/I161103922"]},{"raw_affiliation_string":"University of Marburg, Germany#TAB#","institution_ids":["https://openalex.org/I161103922"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062564511","display_name":"Bernhard Seeger","orcid":"https://orcid.org/0000-0002-9362-153X"},"institutions":[{"id":"https://openalex.org/I161103922","display_name":"Philipps University of Marburg","ror":"https://ror.org/01rdrb571","country_code":"DE","type":"education","lineage":["https://openalex.org/I161103922"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Bernhard Seeger","raw_affiliation_strings":["University of Marburg, Germany","University of Marburg, Germany#TAB#"],"affiliations":[{"raw_affiliation_string":"University of Marburg, Germany","institution_ids":["https://openalex.org/I161103922"]},{"raw_affiliation_string":"University of Marburg, Germany#TAB#","institution_ids":["https://openalex.org/I161103922"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5049783844"],"corresponding_institution_ids":["https://openalex.org/I161103922"],"apc_list":null,"apc_paid":null,"fwci":6.7326,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.96550397,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"149","last_page":"154"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12205","display_name":"Time Series Analysis and Forecasting","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7160871624946594},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.697771430015564},{"id":"https://openalex.org/keywords/complex-event-processing","display_name":"Complex event processing","score":0.6035838723182678},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.4760141968727112},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.4540470838546753},{"id":"https://openalex.org/keywords/power-consumption","display_name":"Power consumption","score":0.41812625527381897},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.40682631731033325},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3454896807670593},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.291435182094574},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.18882742524147034}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7160871624946594},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.697771430015564},{"id":"https://openalex.org/C123606473","wikidata":"https://www.wikidata.org/wiki/Q907918","display_name":"Complex event processing","level":3,"score":0.6035838723182678},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.4760141968727112},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.4540470838546753},{"id":"https://openalex.org/C2984118289","wikidata":"https://www.wikidata.org/wiki/Q29954","display_name":"Power consumption","level":3,"score":0.41812625527381897},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.40682631731033325},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3454896807670593},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.291435182094574},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.18882742524147034},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2452376.2452395","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2452376.2452395","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th International Conference on Extending Database Technology","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G4614123314","display_name":null,"funder_award_id":"01BY1206A","funder_id":"https://openalex.org/F4320321114","funder_display_name":"Bundesministerium f\u00fcr Bildung und Forschung"}],"funders":[{"id":"https://openalex.org/F4320321114","display_name":"Bundesministerium f\u00fcr Bildung und Forschung","ror":"https://ror.org/04pz7b180"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W4175336","https://openalex.org/W11145103","https://openalex.org/W52138592","https://openalex.org/W1594961664","https://openalex.org/W1982799284","https://openalex.org/W1996185014","https://openalex.org/W2013861609","https://openalex.org/W2015103810","https://openalex.org/W2045478235","https://openalex.org/W2047264990","https://openalex.org/W2051324197","https://openalex.org/W2063388849","https://openalex.org/W2071090852","https://openalex.org/W2117366235","https://openalex.org/W2122646361","https://openalex.org/W2125693462","https://openalex.org/W2129088288","https://openalex.org/W2143357067","https://openalex.org/W2143792095","https://openalex.org/W2151415632","https://openalex.org/W2156972533","https://openalex.org/W2157022252","https://openalex.org/W2336438753","https://openalex.org/W4251114856","https://openalex.org/W6600486470","https://openalex.org/W6662043480","https://openalex.org/W7007751138"],"related_works":["https://openalex.org/W2375382787","https://openalex.org/W3196249020","https://openalex.org/W4231909692","https://openalex.org/W2751878509","https://openalex.org/W2034493809","https://openalex.org/W3203535982","https://openalex.org/W2390960427","https://openalex.org/W1995325588","https://openalex.org/W2763504183","https://openalex.org/W2577572394"],"abstract_inverted_index":{"During":[0],"the":[1,31,69,97,100,106,119],"last":[2],"decade,":[3],"complex":[4],"event":[5],"processing":[6],"(CEP)":[7],"has":[8],"emerged":[9],"as":[10],"a":[11,76,81],"technological":[12],"foundation":[13],"for":[14,38],"many":[15],"time-critical":[16],"monitoring":[17,49],"applications.":[18],"CEP":[19,35,71,93,131],"is":[20,73],"powerful,":[21],"effective,":[22],"easy":[23],"to":[24,62,111,115,142],"use":[25],"and":[26,50,79,103,124,140],"low":[27],"in":[28,53,118],"costs":[29],"at":[30],"same":[32],"time.":[33],"Common":[34],"applications":[36,137],"are":[37,59],"example":[39],"stock-market":[40],"analysis,":[41],"detection":[42,83,107],"of":[43,68,92,99],"fraudulent":[44],"credit":[45],"card":[46],"use,":[47],"traffic":[48],"consumption":[51],"forecasting":[52],"power":[54],"grids.":[55],"Many":[56],"application":[57,148],"domains":[58],"still":[60],"hard":[61],"target":[63],"by":[64,75,80,95,104],"CEP,":[65],"because":[66],"state":[67],"art":[70],"technology":[72,94],"characterized":[74],"static":[77],"behavior":[78,98],"signature-based":[82],"paradigm.":[84],"In":[85],"this":[86],"paper,":[87],"we":[88],"motivate":[89],"substantial":[90],"improvements":[91],"making":[96],"infrastructure":[101,120,132],"dynamic":[102,130],"switching":[105],"paradigm":[108],"from":[109],"signatures":[110],"anomalies.":[112],"This":[113],"leads":[114],"multiple":[116],"changes":[117],"that":[121],"raise":[122],"interesting":[123],"challenging":[125],"research":[126],"questions.":[127],"The":[128],"resulting":[129],"not":[133],"only":[134],"makes":[135],"existing":[136],"more":[138],"powerful":[139],"easier":[141],"maintain":[143],"but":[144],"also":[145],"enables":[146],"novel":[147],"domains.":[149]},"counts_by_year":[{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":6},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
