{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T02:50:57Z","timestamp":1768531857553,"version":"3.49.0"},"reference-count":35,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T00:00:00Z","timestamp":1509494400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T00:00:00Z","timestamp":1509494400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"vor","delay-in-days":1461,"URL":"http:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100003329","name":"MINECO","doi-asserted-by":"publisher","award":["TEC2012-37832-C02-01"],"award-info":[{"award-number":["TEC2012-37832-C02-01"]}],"id":[{"id":"10.13039\/501100003329","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003593","name":"CNPq","doi-asserted-by":"publisher","award":["407851\/2012-7"],"award-info":[{"award-number":["407851\/2012-7"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003593","name":"CNPq","doi-asserted-by":"publisher","award":["314017\/2013-5"],"award-info":[{"award-number":["314017\/2013-5"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004586","name":"FAPERJ","doi-asserted-by":"publisher","award":["213969"],"award-info":[{"award-number":["213969"]}],"id":[{"id":"10.13039\/501100004586","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004586","name":"FAPERJ","doi-asserted-by":"publisher","award":["214411"],"award-info":[{"award-number":["214411"]}],"id":[{"id":"10.13039\/501100004586","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Applied Logic"],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1016\/j.jal.2016.11.015","type":"journal-article","created":{"date-parts":[[2016,11,11]],"date-time":"2016-11-11T13:15:41Z","timestamp":1478870141000},"page":"71-84","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":11,"special_numbering":"PA","title":["On the combination of support vector machines and segmentation algorithms for anomaly detection: A petroleum industry comparative study"],"prefix":"10.1016","volume":"24","author":[{"given":"Luis","family":"Mart\u00ed","sequence":"first","affiliation":[]},{"given":"Nayat","family":"Sanchez-Pi","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 Manuel","family":"Molina L\u00f3pez","sequence":"additional","affiliation":[]},{"given":"Ana Cristina","family":"Bicharra Garcia","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jal.2016.11.015_br0160","series-title":"First SIAM Conference on Data Mining","article-title":"Detecting novel network intrusions using Bayes estimators","author":"Barbara","year":"2001"},{"key":"10.1016\/j.jal.2016.11.015_br0180","series-title":"Proceedings of the 2006 SIAM International Conference on Data Mining","first-page":"372","article-title":"Segmentation and dimensionality reduction","author":"Bingham","year":"2006"},{"key":"10.1016\/j.jal.2016.11.015_br0220","series-title":"Proceedings of the Thirteenth Annual Symposium on Computational Geometry","first-page":"454","article-title":"Time-series similarity problems and well-separated geometric sets","author":"Bollob\u00e1s","year":"1997"},{"issue":"04","key":"10.1016\/j.jal.2016.11.015_br0030","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1142\/S0129065711002833","article-title":"Hybrid neural intelligent system to predict business failure in small-to-medium-size enterprises","volume":"21","author":"Borrajo","year":"2011","journal-title":"Int. J. Neural Syst."},{"key":"10.1016\/j.jal.2016.11.015_br0120","series-title":"Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data","first-page":"93","article-title":"LOF: identifying density-based local outliers","author":"Breunig","year":"2000"},{"key":"10.1016\/j.jal.2016.11.015_br0050","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.neucom.2013.01.055","article-title":"A bio-inspired knowledge system for improving combined cycle plant control tuning","volume":"126","author":"Calvo-Rolle","year":"2014","journal-title":"Neurocomputing"},{"key":"10.1016\/j.jal.2016.11.015_br0320","series-title":"Graphical Methods for Data Analysis","author":"Chambers","year":"1983"},{"issue":"3","key":"10.1016\/j.jal.2016.11.015_br0100","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/1541880.1541882","article-title":"Anomaly detection: a survey","volume":"41","author":"Chandola","year":"2009","journal-title":"ACM Comput. Surv."},{"issue":"1","key":"10.1016\/j.jal.2016.11.015_br0330","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1162\/089120104773633402","article-title":"The Kappa statistic: a second look","volume":"30","author":"Di Eugenio","year":"2004","journal-title":"Comput. Linguist."},{"key":"10.1016\/j.jal.2016.11.015_br0010","series-title":"Applications of Data Mining in Computer Security","first-page":"77","article-title":"A geometric framework for unsupervised anomaly detection","author":"Eskin","year":"2002"},{"key":"10.1016\/j.jal.2016.11.015_br0150","series-title":"Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining","first-page":"401","article-title":"An approach to spacecraft anomaly detection problem using kernel feature space","author":"Fujimaki","year":"2005"},{"issue":"1","key":"10.1016\/j.jal.2016.11.015_br0110","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/00401706.1969.10490657","article-title":"Procedures for detecting outlying observations in samples","volume":"11","author":"Grubbs","year":"1969","journal-title":"Technometrics"},{"key":"10.1016\/j.jal.2016.11.015_br0200","series-title":"Artificial Intelligence in Medicine","first-page":"271","article-title":"Knowledge-based event detection in complex time series data","author":"Hunter","year":"1999"},{"key":"10.1016\/j.jal.2016.11.015_br0230","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1115\/1.3662552","article-title":"A new approach to linear filtering and prediction problems","volume":"82","author":"Kalman","year":"1960","journal-title":"J. Basic Eng."},{"key":"10.1016\/j.jal.2016.11.015_br0060","series-title":"Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"550","article-title":"Finding surprising patterns in a time series database in linear time and space","author":"Keogh","year":"2002"},{"key":"10.1016\/j.jal.2016.11.015_br0020","series-title":"Proceedings of the 2002 International Conference on Control Applications, vol. 1","first-page":"221","article-title":"The use of novelty detection techniques for monitoring high-integrity plant","author":"King","year":"2002"},{"key":"10.1016\/j.jal.2016.11.015_br0190","series-title":"Proceedings of the 2007 SIAM International Conference on Data Mining","article-title":"A better alternative to piecewise linear time series segmentation","author":"Lemire","year":"2007"},{"key":"10.1016\/j.jal.2016.11.015_br0300","series-title":"Scalable Multi-objective Optimization","author":"Mart\u00ed","year":"2011"},{"key":"10.1016\/j.jal.2016.11.015_br0270","series-title":"Hybrid Artificial Intelligence Systems: 9th International Conference (HAIS 2014)","first-page":"697","article-title":"YASA: yet another time series segmentation algorithm for anomaly detection in big data problems","author":"Mart\u00ed","year":"2014"},{"issue":"2","key":"10.1016\/j.jal.2016.11.015_br0070","doi-asserted-by":"crossref","first-page":"2774","DOI":"10.3390\/s150202774","article-title":"Anomaly detection based on sensor data in petroleum industry applications","volume":"15","author":"Mart\u00ed","year":"2015","journal-title":"Sensors"},{"key":"10.1016\/j.jal.2016.11.015_br0240","article-title":"Stochastic Models, Estimation, and Control","volume":"vol. 141","author":"Maybeck","year":"1979"},{"issue":"2","key":"10.1016\/j.jal.2016.11.015_br0350","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/BF02295996","article-title":"Note on the sampling error of the difference between correlated proportions or percentages","volume":"12","author":"McNemar","year":"1947","journal-title":"Psychometrika"},{"issue":"3","key":"10.1016\/j.jal.2016.11.015_br0280","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1016\/0893-6080(95)00120-4","article-title":"Network constraints and multi-objective optimization for one-class classification","volume":"9","author":"Moya","year":"1996","journal-title":"Neural Netw."},{"key":"10.1016\/j.jal.2016.11.015_br0310","first-page":"333","article-title":"Outline of a theory of statistical estimation based on the classical theory of probability","volume":"236","author":"Neyman","year":"1937","journal-title":"Philos. Trans. R. Soc. A"},{"key":"10.1016\/j.jal.2016.11.015_br0130","series-title":"Proceedings of the 19th International Conference on Data Engineering (ICDE'03)","first-page":"315","article-title":"LOCI: fast outlier detection using the local correlation integral","author":"Papadimitriou","year":"2003"},{"issue":"9","key":"10.1016\/j.jal.2016.11.015_br0090","doi-asserted-by":"crossref","first-page":"1184","DOI":"10.1109\/TPAMI.2002.1033211","article-title":"Constructing boosting algorithms from SVMs: an application to one-class classification","volume":"24","author":"Ratsch","year":"2002","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.jal.2016.11.015_br0140","first-page":"109","article-title":"Sensitivity of PCA for traffic anomaly detection","volume":"vol. 35","author":"Ringberg","year":"2007"},{"key":"10.1016\/j.jal.2016.11.015_br0170","first-page":"1169","article-title":"Outlier detection with one-class kernel Fisher discriminants","volume":"vol. 17","author":"Roth","year":"2005"},{"issue":"3","key":"10.1016\/j.jal.2016.11.015_br0340","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1023\/A:1009752403260","article-title":"On comparing classifiers: pitfalls to avoid and a recommended approach","volume":"1","author":"Salzberg","year":"1997","journal-title":"Data Min. Knowl. Discov."},{"key":"10.1016\/j.jal.2016.11.015_br0080","series-title":"Highlights of Practical Applications of Heterogeneous Multi-Agent Systems. The PAAMS Collection: PAAMS 2014 International Workshops","first-page":"202","article-title":"High-level information fusion for risk and accidents prevention in pervasive oil industry environments","author":"Sanchez-Pi","year":"2014"},{"key":"10.1016\/j.jal.2016.11.015_br0290","series-title":"NIPS Conference","first-page":"582","article-title":"Support vector method for novelty detection","volume":"vol. 12","author":"Sch\u00f6lkopf","year":"1999"},{"key":"10.1016\/j.jal.2016.11.015_br0260","series-title":"2008 International Conference on Computer Science and Software Engineering","first-page":"154","article-title":"A Kalman filter based approach for outlier detection in sensor networks","author":"Shuai","year":"2008"},{"key":"10.1016\/j.jal.2016.11.015_br0250","series-title":"2007 IEEE\/RSJ International Conference on Intelligent Robots and Systems","first-page":"1514","article-title":"A Kalman filter for robust outlier detection","author":"Ting","year":"2007"},{"key":"10.1016\/j.jal.2016.11.015_br0210","series-title":"Proc. Workshop on Clustering High Dimensionality Data and Its Applications","article-title":"A wavelet-based anytime algorithm for k-means clustering of time series","author":"Vlachos","year":"2003"},{"key":"10.1016\/j.jal.2016.11.015_br0040","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.inffus.2013.04.006","article-title":"A survey of multiple classifier systems as hybrid systems","volume":"16","author":"Wo\u017aniak","year":"2014","journal-title":"Inf. Fusion"}],"container-title":["Journal of Applied Logic"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570868316300696?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570868316300696?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T23:31:29Z","timestamp":1761607889000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1570868316300696"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":35,"alternative-id":["S1570868316300696"],"URL":"https:\/\/doi.org\/10.1016\/j.jal.2016.11.015","relation":{},"ISSN":["1570-8683"],"issn-type":[{"value":"1570-8683","type":"print"}],"subject":[],"published":{"date-parts":[[2017,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"On the combination of support vector machines and segmentation algorithms for anomaly detection: A petroleum industry comparative study","name":"articletitle","label":"Article Title"},{"value":"Journal of Applied Logic","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jal.2016.11.015","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2016 Elsevier B.V.","name":"copyright","label":"Copyright"}]}}