{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:03:10Z","timestamp":1725552190106},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540307068"},{"type":"electronic","value":"9783540324225"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11593980_19","type":"book-chapter","created":{"date-parts":[[2005,11,3]],"date-time":"2005-11-03T07:40:20Z","timestamp":1131003620000},"page":"251-262","source":"Crossref","is-referenced-by-count":14,"title":["Episode Based Masquerade Detection"],"prefix":"10.1007","author":[{"given":"Subrat Kumar","family":"Dash","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Krupa Sagar","family":"Reddy","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Arun K.","family":"Pujari","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Chinchani, R., Muthukrishnan, A., Chandrasekaran, M., Upadhyaya, S.: RACOON: Rapidly generating user command data for anomaly detection from customizable templates. In: 20th Annual Computer Security Applications Conference (ACSAC), Tucson, AZ (December 2004)","DOI":"10.1109\/CSAC.2004.28"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Cohen, P., Heeringa, B., Adams, N.M.: An unsupervised algorithm for segmenting categorical timeseries into episodes. In: Proceedings of the ESF Exploratory Workshop on Pattern Detection and Discovery, London, UK, pp. 49\u201362 (September 2002)","DOI":"10.1007\/3-540-45728-3_5"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Coull, S., Branch, J., Szymanski, B., Breimer, E.: Intrusion detection: A bioinformatics approach. In: 19th Annual Computer Security Applications Conference, Las Vegas, Nevada, December 8-12 (2003)","DOI":"10.1109\/CSAC.2003.1254307"},{"key":"19_CR4","unstructured":"Davison, B.D., Hirsh, H.: Predicting sequences of user actions. Predicting the Future: AI Approaches to Time-Series Problems. AAAI Technical Report WS-98-07. AAAI Press, Menlo Park (1998)"},{"key":"19_CR5","unstructured":"Greenberg, S.: Using Unix: Collected traces of 168 users. Technical Report 88\/333\/45, Department of Computer Science, University of Calgary, Canada (1988)"},{"key":"19_CR6","unstructured":"Killhourhy, K.S., Maxion, R.A.: Investigating a possible flaw in a masquerade detection system. Technical Report CS-TR: 869, School of Computing Science, University of Newcastle (2004)"},{"key":"19_CR7","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.cose.2004.08.007","volume":"24","author":"H.-S. Kim","year":"2005","unstructured":"Kim, H.-S., Cha, S.-D.: Empirical evaluation of SVM-based masquerade detection using UNIX commands. Computers & Security\u00a024, 160\u2013168 (2005)","journal-title":"Computers & Security"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Lane, T., Brodley, C.E.: Temporal Sequence Learning and Data Reduction for Anomaly Detection. In: Proceedings of the Fifth ACM Conference on Computer and Communications Security, San Francisco, California, pp. 150\u2013158, November 3-5 (1998)","DOI":"10.1145\/288090.288122"},{"issue":"1","key":"19_CR9","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1109\/TR.2004.824828","volume":"53","author":"R.A. Maxion","year":"2004","unstructured":"Maxion, R.A., Townsend, T.N.: Masquerade detection augmented with error analysis. IEEE Transactions on Reliability\u00a053(1), 124\u2013147 (2004)","journal-title":"IEEE Transactions on Reliability"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Maxion, R.A., Townsend, T.N.: Masquerade detection using truncated command lines. In: Proceedings of the International Conference on Dependable Systems and Networks (DSN 2002), Washington, D.C., pp. 219\u2013228 (June 23-26 2002)","DOI":"10.1109\/DSN.2002.1028903"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Maxion, R.A.: Masquerade detection using enriched command lines. In: International Conference on Dependable Systems and Networks (DSN 2003), San Francisco, CA, USA (June 2003)","DOI":"10.1109\/DSN.2003.1209911"},{"key":"19_CR12","unstructured":"McCallum, A., Nigam, K.: A comparison of event models for Naive-Bayes text classification. In: AAAI 1998 Workshop on Learning for Text Categorization, Madison, Wisconsin (1998)"},{"issue":"1","key":"19_CR13","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1214\/ss\/998929476","volume":"16","author":"M. Schonlau","year":"2001","unstructured":"Schonlau, M., DuMouchel, W., Ju, W., Karr, A.F., Theus, M., Vardi, Y.: Computer intrusion: Detecting masquerades. Statistical Science\u00a016(1), 58\u201374 (2001)","journal-title":"Statistical Science"},{"issue":"1-2","key":"19_CR14","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/S0020-0190(00)00122-8","volume":"76","author":"M. Schonlau","year":"2000","unstructured":"Schonlau, M., Theus, M.: Detecting masqueraders in intrusion detection based on unpopular commands. Information Processing Letters\u00a076(1-2), 33\u201338 (2000)","journal-title":"Information Processing Letters"},{"key":"19_CR15","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1145\/321796.321811","volume":"21","author":"R.A. Wagner","year":"1974","unstructured":"Wagner, R.A., Fisher, M.J.: The string-to-string correction problem. Journal of the ACM\u00a021, 168\u2013173 (1974)","journal-title":"Journal of the ACM"},{"key":"19_CR16","unstructured":"Wang, K., Stolfo, S.J.: One-class training for masquerade detection. In: 3rd ICDM Workshop on Data Mining for Computer Security (DMSEC), Florida (November 2003)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11593980_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:51:58Z","timestamp":1619506318000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11593980_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540307068","9783540324225"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11593980_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}