{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:11:49Z","timestamp":1725567109943},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540280637"},{"type":"electronic","value":"9783540316749"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11533962_9","type":"book-chapter","created":{"date-parts":[[2010,9,26]],"date-time":"2010-09-26T14:02:10Z","timestamp":1285509730000},"page":"83-97","source":"Crossref","is-referenced-by-count":0,"title":["On the Role of Information Compaction to Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Fernando","family":"God\u00ednez","sequence":"first","affiliation":[]},{"given":"Dieter","family":"Hutter","sequence":"additional","affiliation":[]},{"given":"Ra\u00fal","family":"Monroy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","first-page":"133","volume-title":"Proceedings of the 1999 IEEE Symposium on Security and Privacy","author":"C. Warrender","year":"1999","unstructured":"Warrender, C., Forrest, S., Pearlmutter, B.: Detecting Intrusions Using System Calls: Alternative Data Models. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp. 133\u2013145. IEEE Computer Society Press, Los Alamitos (1999)"},{"key":"9_CR2","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/S0031-3203(02)00026-2","volume":"36","author":"D. Yeung","year":"2003","unstructured":"Yeung, D., Ding, Y.: Host-Based Intrusion Detection Using Dynamic and Static Behavioral Models. Pattern Recognition\u00a036, 229\u2013243 (2003)","journal-title":"Pattern Recognition"},{"key":"9_CR3","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-540-24681-7_10","volume-title":"Advances in Web Intelligence","author":"F. God\u00ednez","year":"2004","unstructured":"God\u00ednez, F., Hutter, D., Monroy, R.: Attribute Reduction for Effective Intrusion Detection. In: Favela, J., Menasalvas, E., Ch\u00e1vez, E. (eds.) AWIC 2004. LNCS (LNAI), vol.\u00a03034, pp. 74\u201383. Springer, Heidelberg (2004)"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-540-31815-6_9","volume-title":"Information Security Applications","author":"F. God\u00ednez","year":"2005","unstructured":"God\u00ednez, F., Hutter, D., Monroy, R.: Service discrimination and audit file reduction for effective intrusion detection. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol.\u00a03325, pp. 99\u2013113. Springer, Heidelberg (2005)"},{"key":"9_CR5","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1109\/SECPRI.1996.502675","volume-title":"Proceedings of the 1996 IEEE Symposium on Security and Privacy","author":"S. Forrest","year":"1996","unstructured":"Forrest, S., Hofmeyr, S., Somayaji, A., Longstaff, T.: A Sense of Self for Unix Processes. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, Los Alamitos, CA, pp. 120\u2013128. IEEE Computer Society Press, Los Alamitos (1996)"},{"key":"9_CR6","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1109\/12.980003","volume":"51","author":"R.A. Maxion","year":"2002","unstructured":"Maxion, R.A., Tan, K.M.C.: Anomaly Detection in Embedded Systems. IEEE Transactions on Computers\u00a051, 108\u2013120 (2002)","journal-title":"IEEE Transactions on Computers"},{"key":"9_CR7","first-page":"623","volume-title":"Proceedings of the 1st International Conference on Dependable Systems and Networks","author":"R.A. Maxion","year":"2000","unstructured":"Maxion, R.A., Tan, K.M.C.: Benchmarking Anomaly-Based Detection Systems. In: Proceedings of the 1st International Conference on Dependable Systems and Networks, pp. 623\u2013630. IEEE Computer Society Press, Los Alamitos (2000)"},{"key":"9_CR8","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1145\/366173.366197","volume-title":"Proceedings of the 2000 Workshop on New Security Paradigms","author":"C. Marceau","year":"2000","unstructured":"Marceau, C.: Characterizing the Behavior of a Program Using Multiple-Length Ngrams. In: Proceedings of the 2000 Workshop on New Security Paradigms, pp. 101\u2013110. ACM Press, New York (2000)"},{"key":"9_CR9","unstructured":"Wespi, A., Dacier, M., Debar, H.: An Intrusion-Detection System Based on the Teiresias Pattern-Discovery Algorithm. In: Gattiker, U.E., Pedersen, P., Petersen, K. (eds.) Proceceedings of EICAR 1999 (1999)"},{"key":"9_CR10","volume-title":"Proc. of DARPA Information Survivability Conference and Exposition","author":"J.A. Marin","year":"2001","unstructured":"Marin, J.A., Ragsdale, D., Surdu, J.: A Hybrid Approach to Profile Creation and Intrusion Detection. In: Proc. of DARPA Information Survivability Conference and Exposition, IEEE Computer Society, Los Alamitos (2001)"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1145\/322510.322526","volume":"2","author":"T. Lane","year":"1999","unstructured":"Lane, T., Brodley, C.E.: Temporal Sequence Learning and Data Reduction for Anomaly Detection. ACM Transactions on Information and System Security\u00a02, 295\u2013331 (1999)","journal-title":"ACM Transactions on Information and System Security"},{"key":"9_CR12","first-page":"519","volume-title":"Proceedings of the 17th International Conference on Machine Learning","author":"T. Lane","year":"2000","unstructured":"Lane, T., Brodley, C.E.: Data Reduction Techniques for Instance-Based Learning from Human\/Computer Interface Data. In: Proceedings of the 17th International Conference on Machine Learning, pp. 519\u2013526. Morgan Kaufmann, San Francisco (2000)"},{"key":"9_CR13","unstructured":"Knop, M.W., Schopf, J.M., Dinda, P.A.: Windows Performance Monitoring and Data Reduction Using WatchTower and Argus. Technical Report NWU-CS-01-6, Department of Computer Science, Northwestern University (2001)"},{"key":"9_CR14","volume-title":"Methods in Multivariate Analysis","author":"A. Rencher","year":"1995","unstructured":"Rencher, A.: Methods in Multivariate Analysis. Wiley & Sons, New York (1995)"},{"key":"9_CR15","doi-asserted-by":"publisher","first-page":"1501","DOI":"10.1006\/jmbi.1994.1104","volume":"235","author":"A. Krogh","year":"1994","unstructured":"Krogh, A., Brown, M., Mian, I.S., Sj\u00f6lander, K., Haussler, D.: Hidden Markov Models in Computational Biology: Applications to Protein Modeling. Journal Molecular Biology\u00a0235, 1501\u20131531 (1994)","journal-title":"Journal Molecular Biology"},{"key":"9_CR16","first-page":"95","volume":"12","author":"R. Hughey","year":"1996","unstructured":"Hughey, R., Krogh, A.: Hidden Markov Models for Sequence Analysis: Extension and Analysis of Basic Method. Comp. Appl. BioSci.\u00a012, 95\u2013108 (1996)","journal-title":"Comp. Appl. BioSci."},{"key":"9_CR17","unstructured":"Young, S., Evermann, G., Kershaw, D., Moore, G., Odell, J., Ollason, D., Povey, D., Valtchev, V., Woodland, P.: The HTK Book for HTK Version 3.2. Cambridge University Engineering Department (2002)"},{"key":"9_CR18","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1049\/el:20020467","volume":"38","author":"Y. Qiao","year":"2002","unstructured":"Qiao, Y., Xin, X., Bin, Y., Ge, S.: Anomaly Intrusion Detection Method Based on HMM. Electronic Letters\u00a038, 663\u2013664 (2002)","journal-title":"Electronic Letters"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Wagner, D., Soto, P.: Mimicry Attacks on Host Based Intrusion Detection Systems. In: Proceedings of the Ninth ACM Conference on Computer and Communications Security, Washington, DC, USA, ACM, pp. 255\u2013265 (2002)","DOI":"10.1145\/586110.586145"}],"container-title":["Lecture Notes in Computer Science","Advanced Distributed Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11533962_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T18:46:45Z","timestamp":1558291605000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11533962_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540280637","9783540316749"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11533962_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}