{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:23:01Z","timestamp":1725560581111},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540281023"},{"type":"electronic","value":"9783540318682"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11534310_87","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T09:48:30Z","timestamp":1127814510000},"page":"826-835","source":"Crossref","is-referenced-by-count":1,"title":["Applying Mining Fuzzy Association Rules to Intrusion Detection Based on Sequences of System Calls"],"prefix":"10.1007","author":[{"given":"Guiling","family":"Zhang","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"87_CR1","unstructured":"Lee, W., Stolfo, S.: Data Mining Approaches for Intrusion Detection. In: Proc. The Seventh USENIX Security Symposium (January 1998)"},{"key":"87_CR2","unstructured":"Liu, Z., Florez, G., Bridges, S.M.: A Comparison Of Input Representations In Neural Networks: A Case Study in Intrusion Detection. In: International Joint Conference on Neural Networks (IJCNN), Honolulu, Hawaii (2002)"},{"key":"87_CR3","unstructured":"Liu, Z., Bridges, S.M., Vaughn, R.B.: Classification of Anomalous Traces of Privileged and Parallel Programs by Neural Networks. In: Proceeding of the 12th IEEE International Conference on Fuzzy Systems (2003)"},{"key":"87_CR4","unstructured":"Agrawal, R., Srikant, R.: Fast Algorithms for Mining Association Rules. In: 20th International Conference on Very Large Databases, Santiago, Chile (September 1994)"},{"issue":"1","key":"87_CR5","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/273244.273257","volume":"27","author":"Chan Man Kuok","year":"1998","unstructured":"Kuok, C., Fu, A., Wong, M.: Mining Fuzzy Association Rules in Databases. SIGMOD Record\u00a017(1), 41\u201346","journal-title":"ACM SIGMOD Record"},{"key":"87_CR6","doi-asserted-by":"crossref","unstructured":"Srinkant, R., Agrawal, R.: Mining Quangtitative Association Rules in Large Relation Tables. In: SIGMOD (1996)","DOI":"10.1145\/233269.233311"},{"key":"87_CR7","doi-asserted-by":"crossref","unstructured":"Dickerson, J.E., Juslin, J., Loulousoula, O., Dickerson, J.A.: Fuzzy Intrusion Detection. In: IFSA World Congress and 20th North American Fuzzy information Processing Society (NAFIPS) International Conference (2001)","DOI":"10.1109\/NAFIPS.2001.943772"},{"key":"87_CR8","volume-title":"Proceedings of the 10th IEEE international workshop on future trends of distributed Computing System (FTDCS 2004)","author":"J. Hai","year":"2004","unstructured":"Hai, J., Jianhua, S., Hao, C., Zongfen, H.: A Fuzzy Data Mining Based Intrusion Detection Model. In: Proceedings of the 10th IEEE international workshop on future trends of distributed Computing System (FTDCS 2004). IEEE, Los Alamitos (2004)"},{"key":"87_CR9","volume-title":"An Improved Algorithm for Fuzzy Data Mining for Intrusion Detection","author":"G. Florez","year":"2002","unstructured":"Florez, G., Bridge, S.M., Vaughn, R.B.: An Improved Algorithm for Fuzzy Data Mining for Intrusion Detection. IEEE, Los Alamitos (2002)"},{"key":"87_CR10","volume-title":"Proceedings of the 1996 IEEE Symposium on Security and Privacy","author":"S. Forrest","year":"1996","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A Sense of Self for UNIX Processes. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos (1996)"},{"issue":"4","key":"87_CR11","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/604264.604269","volume":"30","author":"J.B.D. Cabrera","year":"2001","unstructured":"Cabrera, J.B.D., Lewis, L., Mehra, R.K.: Detection and Classification of Intrusions Using System Calls. SIGMOD RECORD\u00a030(4), 25\u201334 (2001)","journal-title":"SIGMOD RECORD"},{"key":"87_CR12","doi-asserted-by":"crossref","unstructured":"Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion Detection Using Sequences of System Calls. Journal of Computer Security (1998)","DOI":"10.3233\/JCS-980109"},{"key":"87_CR13","volume-title":"Detecting Intrusions Using System Calls: alternative data models","author":"C. Warrender","year":"1999","unstructured":"Warrender, C., Forrest, S., Pearlmutter, B.: Detecting Intrusions Using System Calls: alternative data models. IEEE Computer Society, Los Alamitos (1999)"},{"key":"87_CR14","unstructured":"Ming, X., Chun, C., Jing, Y.: Anomaly Detection Based on Sytem Call Classification. Journal of Software, China (2004)"},{"key":"87_CR15","unstructured":"Lee, W., Stolfo, S., Chan, P.: Learning Patterns from UNIX Process Execution Traces from Intrusion Detection. In: AAAI Workshop: AI Approaches to Fraud Detection and Risk Management (July 1997)"},{"issue":"15","key":"87_CR16","doi-asserted-by":"crossref","first-page":"1356","DOI":"10.1016\/S0140-3664(02)00037-3","volume":"25","author":"Theuns Verwoerd","year":"2002","unstructured":"Verwoerd, T., Hunt, R.: Intrusion Detection Techniques and Approaches. Computer Communications\u00a025(15) (September 15, 2002)","journal-title":"Computer Communications"},{"key":"87_CR17","doi-asserted-by":"crossref","unstructured":"Michael, C.C.: Finding the Vocabulary of Program Behavior Data for Anomaly Detection. In: Proceeding of DARPA Information Survivability Conference and Exposition, vol.\u00a01 (2003)","DOI":"10.1109\/DISCEX.2003.1194881"}],"container-title":["Lecture Notes in Computer Science","Networking and Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11534310_87.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T15:10:44Z","timestamp":1605625844000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11534310_87"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540281023","9783540318682"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11534310_87","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}