{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:56:22Z","timestamp":1725558982313},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540259992"},{"type":"electronic","value":"9783540320630"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11427995_49","type":"book-chapter","created":{"date-parts":[[2010,7,13]],"date-time":"2010-07-13T23:27:06Z","timestamp":1279063626000},"page":"498-504","source":"Crossref","is-referenced-by-count":1,"title":["Intrusion Detection System Using Sequence and Set Preserving Metric"],"prefix":"10.1007","author":[{"given":"Pradeep","family":"Kumar","sequence":"first","affiliation":[]},{"given":"M. Venkateswara","family":"Rao","sequence":"additional","affiliation":[]},{"given":"P. Radha","family":"Krishna","sequence":"additional","affiliation":[]},{"given":"Raju S.","family":"Bapi","sequence":"additional","affiliation":[]},{"given":"Arijit","family":"Laha","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"49_CR1","volume-title":"Intrusion Detection","author":"R. Bace","year":"2000","unstructured":"Bace, R.: Intrusion Detection. Macmillan Technical Publishing, Basingstoke (2000)"},{"key":"49_CR2","doi-asserted-by":"crossref","unstructured":"Base, R., Mell, P.: NIST special publication on intrusion detection system. NIST, pp. 800\u2013831 (2001)","DOI":"10.6028\/NIST.SP.800-31"},{"key":"49_CR3","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A Sense of self for UNIX process. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 120\u2013128 (1996)"},{"key":"49_CR4","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","volume":"6","author":"S.A. Hofmeyr","year":"1996","unstructured":"Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion Detection Using Sequences of System calls. Journal of Computer Security\u00a06, 151\u2013180 (1996)","journal-title":"Journal of Computer Security"},{"key":"49_CR5","unstructured":"Kumar, S., Sppafford, E.H.: A pattern matching model for misuse intrusion detection. In: 17th National Computer Security Conference, pp. 11\u201321 (1994)"},{"key":"49_CR6","unstructured":"Lee, W., Stolfo, S.J.: Data mining approaches for intrusion detection. In: Proceedings of the 7th USENIX Security Symposium (1998)"},{"issue":"7","key":"49_CR7","first-page":"707","volume":"10","author":"L.I. Levenshtein","year":"1966","unstructured":"Levenshtein, L.I.: Binary codes capable of correcting deletions, insertions, and reversals. Soviet Physics\u2013Doklady\u00a010(7), 707\u2013710 (1966)","journal-title":"Soviet Physics\u2013Doklady"},{"key":"49_CR8","unstructured":"Liao, Y., Vemuri, V.R.: Using Text Categorization Techniques for Intrusion Detection. In: Proceedings USENIX Security, pp. 51\u201359 (2002)"},{"key":"49_CR9","unstructured":"Rawat, S., Pujari, A.K., Gulati, V.P., Vemuri Rao, V.: Intrusion Detection using Text Processing Techniques with a Binary-Weighted Cosine Metric. International Journal of Information Security (2004)"},{"key":"49_CR10","volume-title":"Machine learning","author":"T.M. Mitchell","year":"1997","unstructured":"Mitchell, T.M.: Machine learning. Mc Graw Hill, New York (1997)"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11427995_49.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,31]],"date-time":"2021-10-31T10:32:55Z","timestamp":1635676375000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11427995_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540259992","9783540320630"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11427995_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}