{"@context":{"@vocab":"https://cir.nii.ac.jp/schema/1.0/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/","foaf":"http://xmlns.com/foaf/0.1/","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","datacite":"https://schema.datacite.org/meta/kernel-4/","ndl":"http://ndl.go.jp/dcndl/terms/","jpcoar":"https://github.com/JPCOAR/schema/blob/master/2.0/"},"@id":"https://cir.nii.ac.jp/crid/1520853833156031360.json","@type":"Article","productIdentifier":[{"identifier":{"@type":"NDL_BIB_ID","@value":"7794921"}},{"identifier":{"@type":"URI","@value":"http://id.ndl.go.jp/bib/7794921"}},{"identifier":{"@type":"URI","@value":"https://ndlsearch.ndl.go.jp/books/R000000004-I7794921"}},{"identifier":{"@type":"NAID","@value":"110004669939"}}],"dc:title":[{"@value":"ネットワークデータを用いた分散システムにおける異常検出"},{"@language":"ja-Kana","@value":"ネットワーク データ オ モチイタ ブンサン システム ニ オケル イジョウ ケンシュツ"}],"dcterms:alternative":[{"@value":"ネットワークデータを用いた分散システムにおける異常検出"},{"@value":"データ工学論文特集"},{"@language":"ja-Kana","@value":"データ コウガク ロンブン トクシュウ"}],"dc:language":"ja","creator":[{"@id":"https://cir.nii.ac.jp/crid/1420001326236267008","@type":"Researcher","personIdentifier":[{"@type":"KAKEN_RESEARCHERS","@value":"80545583"},{"@type":"NRID","@value":"1000080545583"},{"@type":"ORCID","@value":"0000-0002-2770-0184"},{"@type":"CINII_AUTHOR_ID","@value":"DA15170263"},{"@type":"URI","@value":"https://ci.nii.ac.jp/author/DA15170263#entity"},{"@type":"URI","@value":"https://viaf.org/viaf/NII%7CDA15170263"},{"@type":"NRID","@value":"9000004378536"},{"@type":"NRID","@value":"9000398156818"},{"@type":"NRID","@value":"9000375921496"},{"@type":"NRID","@value":"9000287221152"},{"@type":"NRID","@value":"9000017506162"},{"@type":"NRID","@value":"9000340446807"},{"@type":"NRID","@value":"9000010231379"},{"@type":"NRID","@value":"9000403582150"},{"@type":"NRID","@value":"9000021930433"},{"@type":"NRID","@value":"9000254841236"},{"@type":"NRID","@value":"9000273397550"},{"@type":"NRID","@value":"9000329897469"},{"@type":"NRID","@value":"9000384340613"},{"@type":"NRID","@value":"9000296683437"},{"@type":"NRID","@value":"9000360589232"},{"@type":"NRID","@value":"9000240076536"},{"@type":"NRID","@value":"9000024941463"},{"@type":"NRID","@value":"9000018528036"},{"@type":"NRID","@value":"9000021477854"},{"@type":"NRID","@value":"9000016493301"},{"@type":"NRID","@value":"9000403582313"},{"@type":"NRID","@value":"9000403582134"},{"@type":"NRID","@value":"9000296673823"},{"@type":"NRID","@value":"9000249501557"},{"@type":"NRID","@value":"9000340446320"},{"@type":"NRID","@value":"9000296677012"},{"@type":"NRID","@value":"9000249495619"},{"@type":"NRID","@value":"9000002161481"},{"@type":"NRID","@value":"9000403582153"},{"@type":"NRID","@value":"9000398606631"},{"@type":"NRID","@value":"9000296683493"},{"@type":"NRID","@value":"9000248233907"},{"@type":"RESEARCHMAP","@value":"https://researchmap.jp/Hisashi_Kashima"}],"foaf:name":[{"@value":"鹿島 久嗣"}]},{"@id":"https://cir.nii.ac.jp/crid/1582824501803668352","@type":"Researcher","personIdentifier":[{"@type":"NRID","@value":"9000006081091"}],"foaf:name":[{"@value":"津村 直史"}]},{"@id":"https://cir.nii.ac.jp/crid/1582824501803668354","@type":"Researcher","foaf:name":[{"@value":"井手 剛"}]}],"publication":{"publicationIdentifier":[{"@type":"NDL_BIB_ID","@value":"000007854957"},{"@type":"ISSN","@value":"18804535"},{"@type":"LISSN","@value":"18804535"},{"@type":"NCID","@value":"AA12099634"}],"prism:publicationName":[{"@value":"電子情報通信学会論文誌. D, 情報・システム = The IEICE transactions on information and systems / 電子情報通信学会 編"}],"dc:publisher":[{"@value":"東京 : 電子情報通信学会情報・システムソサイエティ"}],"prism:publicationDate":"2006-02","prism:volume":"89","prism:number":"2","prism:startingPage":"183","prism:endingPage":"198"},"url":[{"@id":"http://id.ndl.go.jp/bib/7794921"},{"@id":"https://ndlsearch.ndl.go.jp/books/R000000004-I7794921"}],"foaf:topic":[{"@id":"https://cir.nii.ac.jp/all?q=%E7%95%B0%E5%B8%B8%E6%A4%9C%E5%87%BA","dc:title":"異常検出"},{"@id":"https://cir.nii.ac.jp/all?q=%E3%83%8D%E3%83%83%E3%83%88%E3%83%AF%E3%83%BC%E3%82%AF%E3%83%87%E3%83%BC%E3%82%BF","dc:title":"ネットワークデータ"},{"@id":"https://cir.nii.ac.jp/all?q=%E5%88%86%E6%95%A3%E3%82%B7%E3%82%B9%E3%83%86%E3%83%A0","dc:title":"分散システム"},{"@id":"https://cir.nii.ac.jp/all?q=EM%E3%82%A2%E3%83%AB%E3%82%B4%E3%83%AA%E3%82%BA%E3%83%A0","dc:title":"EMアルゴリズム"}],"relatedProduct":[{"@id":"https://cir.nii.ac.jp/crid/1360574094296207488","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@value":"Anomaly detection in IP networks"}]},{"@id":"https://cir.nii.ac.jp/crid/1361981468599495680","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@value":"On-line EM Algorithm for the Normalized Gaussian Network"}]},{"@id":"https://cir.nii.ac.jp/crid/1363670320014679936","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@value":"High speed and robust event correlation"}]},{"@id":"https://cir.nii.ac.jp/crid/1364233268496608128","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@value":"On-Line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms"}]},{"@id":"https://cir.nii.ac.jp/crid/1570572700267659648","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"A unifying frame-work for detecting outliers and change points from non-stationary time series data"}]},{"@id":"https://cir.nii.ac.jp/crid/1570854175244366976","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Optimizing probe selection for fault localization"}]},{"@id":"https://cir.nii.ac.jp/crid/1570854175244370176","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"A signal analysis of network traffic anomalies"}]},{"@id":"https://cir.nii.ac.jp/crid/1570854175244371328","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Integrated event management : Event correlation using dependency graphs"}]},{"@id":"https://cir.nii.ac.jp/crid/1571417125197788544","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Discovering dynamic dependencies in enterprise environments for problem determination"}]},{"@id":"https://cir.nii.ac.jp/crid/1571417125197790848","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Probability, statistics, and queuing theory with computer science applications"}]},{"@id":"https://cir.nii.ac.jp/crid/1571417125197793024","@type":"Article","relationType":["cites"]},{"@id":"https://cir.nii.ac.jp/crid/1571980075151213184","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Managing application services over service provider networks : Architecture and dependency analysis"}]},{"@id":"https://cir.nii.ac.jp/crid/1571980076643106048","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"An alarm correlation and fault identification schema based on OSI managed object classes"}]},{"@id":"https://cir.nii.ac.jp/crid/1571980076660530944","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Detecting SYN flooding attacks"}]},{"@id":"https://cir.nii.ac.jp/crid/1572543024926326272","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Mining event data for actionable patterns"}]},{"@id":"https://cir.nii.ac.jp/crid/1572543026627097472","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Baselining network traffic and online faults detection"}]},{"@id":"https://cir.nii.ac.jp/crid/1572824500081342464","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Maximum likelihood from incomplete data via EM algorithm"}]},{"@id":"https://cir.nii.ac.jp/crid/1572824500081343744","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Pinpoint : Problem determination in large, dynamic internet services"}]},{"@id":"https://cir.nii.ac.jp/crid/1573105975058052992","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Systems management : Application response measurement"}]},{"@id":"https://cir.nii.ac.jp/crid/1573105975058054016","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Trade3"}]},{"@id":"https://cir.nii.ac.jp/crid/1573105975643669760","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Adaptive algorithms for managing a distributed data processing workload"}]},{"@id":"https://cir.nii.ac.jp/crid/1573387450034764160","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Eigenspace-based anomaly detection in computer systems"}]},{"@id":"https://cir.nii.ac.jp/crid/1573387450034767616","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Eventminer : An integrated mining tool for scalable analysis of event data"}]},{"@id":"https://cir.nii.ac.jp/crid/1573668925011476864","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"New approach for automated generation of service dependency models"}]},{"@id":"https://cir.nii.ac.jp/crid/1573950401464888576","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Mining sequential patterns"}]},{"@id":"https://cir.nii.ac.jp/crid/1574231874964896896","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Mining association rules between sets of items in large databases"}]},{"@id":"https://cir.nii.ac.jp/crid/1574231874964899072","@type":"Article","relationType":["cites"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Approaches to building self healing systems using dependency analysis"}]}],"dataSourceIdentifier":[{"@type":"NDL_SEARCH","@value":"oai:ndlsearch.ndl.go.jp:R000000004-I7794921"},{"@type":"CIA","@value":"110004669939"}]}