{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:41:23Z","timestamp":1725550883360},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540305064"},{"type":"electronic","value":"9783540324201"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11590316_30","type":"book-chapter","created":{"date-parts":[[2005,12,6]],"date-time":"2005-12-06T15:18:20Z","timestamp":1133882300000},"page":"222-228","source":"Crossref","is-referenced-by-count":3,"title":["Effective Intrusion Type Identification with Edit Distance for HMM-Based Anomaly Detection System"],"prefix":"10.1007","author":[{"given":"Ja-Min","family":"Koo","sequence":"first","affiliation":[]},{"given":"Sung-Bae","family":"Cho","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"30_CR1","first-page":"212","volume":"13","author":"D. Denning","year":"1987","unstructured":"Denning, D.: An intrusion-detection model. IEEE Trans. on Software Engineering\u00a013(2), 212\u2013232 (1987)","journal-title":"IEEE Trans. on Software Engineering"},{"key":"30_CR2","doi-asserted-by":"publisher","first-page":"1202","DOI":"10.1016\/S0140-3664(00)00364-9","volume":"24","author":"B. Balajinath","year":"2001","unstructured":"Balajinath, B., Raghavan, S.V.: Intrusion detection through learning behavior model. Computer Communications\u00a024, 1202\u20131212 (2001)","journal-title":"Computer Communications"},{"key":"30_CR3","doi-asserted-by":"crossref","unstructured":"Vaccaro, H.S., Liepins, G.E.: Detection of anomalous computer session activity. In: Proc. of IEEE Symp. on Research Security and Privacy, pp. 280\u2013289 (1989)","DOI":"10.1109\/SECPRI.1989.36302"},{"key":"30_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-540-24591-9_8","volume-title":"Information Security Applications","author":"J.-M. Koo","year":"2004","unstructured":"Koo, J.-M., Cho, S.-B.: Viterbi algorithm for intrusion type identification in anomaly detection system. In: Chae, K.-J., Yung, M. (eds.) WISA 2003. LNCS, vol.\u00a02908, pp. 97\u2013110. Springer, Heidelberg (2004)"},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Warrender, C., Forrest, S., Pearlmutter, B.: Detecting intrusion using calls: Alternative data models. In: Proc. of IEEE Symp. on Security and Privacy, May 1999, pp. 133\u2013145 (1999)","DOI":"10.1109\/SECPRI.1999.766910"},{"issue":"1","key":"30_CR6","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/S0167-4048(03)00112-3","volume":"22","author":"S.-B. Cho","year":"2003","unstructured":"Cho, S.-B., Park, H.-J.: Efficient anomaly detection by modeling privilege flows using hidden Markov model. Computers & Security\u00a022(1), 45\u201355 (2003)","journal-title":"Computers & Security"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Machine Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11590316_30.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:49:46Z","timestamp":1619506186000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11590316_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540305064","9783540324201"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/11590316_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}