{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:49:30Z","timestamp":1725544170533},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540332060"},{"type":"electronic","value":"9783540332077"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11731139_69","type":"book-chapter","created":{"date-parts":[[2006,3,9]],"date-time":"2006-03-09T04:03:44Z","timestamp":1141877024000},"page":"594-602","source":"Crossref","is-referenced-by-count":5,"title":["Construction of Finite Automata for Intrusion Detection from System Call Sequences by Genetic Algorithms"],"prefix":"10.1007","author":[{"given":"Kyubum","family":"Wee","sequence":"first","affiliation":[]},{"given":"Sinjae","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"69_CR1","unstructured":"Belz, A., Eskikaya, B.: A Genetic algorithm for Finite Automata Induction with an Application to Phonotactics. In: Proceedings of the European Summer School in Logic, Language, and Information Workshop on Automated Acquisition of Syntax and Parsing, pp. 9\u201317 (1998)"},{"key":"69_CR2","doi-asserted-by":"crossref","unstructured":"Debar, H., Becker, M., Siboni, D.: A Neural Network Component for an Intrusion Detection System. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 240\u2013250 (1992)","DOI":"10.1109\/RISP.1992.213257"},{"key":"69_CR3","doi-asserted-by":"crossref","unstructured":"Denning, D.: An Intrusion Detection Model. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 119\u2013131 (1986)","DOI":"10.1109\/SP.1986.10010"},{"key":"69_CR4","doi-asserted-by":"crossref","unstructured":"Forrest, S., Hofmeyr, S., Somayaji, A., Longstaff, T.: A Sense of Self for Unix Processes. In: IEEE Symposium on Security and Privacy, pp. 120\u2013128 (1996)","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"69_CR5","doi-asserted-by":"publisher","first-page":"151","DOI":"10.3233\/JCS-980109","volume":"6","author":"S. Hofmeyr","year":"1998","unstructured":"Hofmeyr, S., Forrest, S., Somayaji, A.: Intrusion Detection using Sequence of System Calls. Journal of Computer Security\u00a06, 151\u2013180 (1998)","journal-title":"Journal of Computer Security"},{"key":"69_CR6","doi-asserted-by":"crossref","unstructured":"Javitz, H., Valdes, A.: The SRI IDES Statistical Anomaly Detector. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA (1991)","DOI":"10.1109\/RISP.1991.130799"},{"issue":"5","key":"69_CR7","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/52.605929","volume":"14","author":"A. Kosoresow","year":"1997","unstructured":"Kosoresow, A.: Intrusion Detection via System Call Traces. IEEE Software\u00a014(5), 35\u201342 (1997)","journal-title":"IEEE Software"},{"key":"69_CR8","doi-asserted-by":"crossref","unstructured":"Lankewicz, L., Benard, M.: Real Time Anomaly Detection using a Nonparametric Pattern Recognition Approach. In: Proceedings of the Seventh Annual Computer Security Applications Conference, San Antonio, TX (1991)","DOI":"10.1109\/CSAC.1991.213016"},{"key":"69_CR9","doi-asserted-by":"crossref","unstructured":"Lunt, T., Tamaru, A., Gilham, F.: IDES: A Progress Report. In: Proceedings of the Sixth Annual Computer Security Applications Conference, Tucson, AZ (1990)","DOI":"10.1109\/CSAC.1990.143786"},{"key":"69_CR10","volume-title":"First International Workshop on the Recent Advances in Intrusion Detection","author":"L. Me","year":"1998","unstructured":"Me, L.: GASSATA: A Genetic Algorithm as an Alternative Tool or Security Audit Trails Analysis. In: First International Workshop on the Recent Advances in Intrusion Detection, Louvain-la-Neuve, Belgium (1998)"},{"key":"69_CR11","doi-asserted-by":"crossref","unstructured":"Sekar, R., Bendre, M.: A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors. In: Proceeding of the 2001 IEEE Symposium on Security and Privacy, pp. 144\u2013155 (2001)","DOI":"10.1109\/SECPRI.2001.924295"},{"key":"69_CR12","doi-asserted-by":"crossref","unstructured":"Smaha, S.: Haystack: An Intrusion Detection System. In: Proceedings of the Fourth IEEE Aerospace Computer Security Applications Conference, Orlando, FL (1988)","DOI":"10.1109\/ACSAC.1988.113412"},{"key":"69_CR13","doi-asserted-by":"crossref","unstructured":"Wagner, D.: Intrusion Detection via Static Analysis. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, pp. 156\u2013159 (2001)","DOI":"10.1109\/SECPRI.2001.924296"},{"key":"69_CR14","doi-asserted-by":"crossref","unstructured":"Warrender, C., Forrest, S., Pearlmutter, B.: Detecting Intrusions using System Calls: Alternative Data Models. In: Proceedings of the 20th IEEE Symposium on Security and Privacy (1999)","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"69_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/978-3-540-45215-7_17","volume-title":"Computer Network Security","author":"K. Wee","year":"2003","unstructured":"Wee, K., Moon, B.: Automatic Generation of Finite Automata for Detecting Intrusions using System Call Sequences. In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. LNCS, vol.\u00a02776, pp. 206\u2013216. Springer, Heidelberg (2003)"},{"key":"69_CR16","unstructured":"http:\/\/www.cs.unm.edu\/~immsec\/systemcalls.htm"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11731139_69.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:52:01Z","timestamp":1619506321000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11731139_69"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540332060","9783540332077"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11731139_69","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}