{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:11:22Z","timestamp":1772039482237,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540346401","type":"print"},{"value":"9783540346425","type":"electronic"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11766155_30","type":"book-chapter","created":{"date-parts":[[2006,5,31]],"date-time":"2006-05-31T19:35:00Z","timestamp":1149104100000},"page":"423-435","source":"Crossref","is-referenced-by-count":3,"title":["On the Use of Word Networks to Mimicry Attack Detection"],"prefix":"10.1007","author":[{"given":"Fernando","family":"God\u00ednez","sequence":"first","affiliation":[]},{"given":"Dieter","family":"Hutter","sequence":"additional","affiliation":[]},{"given":"Ra\u00fal","family":"Monroy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1145\/586110.586145","volume-title":"Proceedings of the Ninth ACM Conference on Computer and Communications Security","author":"D. Wagner","year":"2002","unstructured":"Wagner, D., Soto, P.: Mimicry Attacks on Host Based Intrusion Detection Systems. In: Proceedings of the Ninth ACM Conference on Computer and Communications Security, Washington, DC, USA, pp. 255\u2013265. ACM, New York (2002)"},{"key":"30_CR2","unstructured":"Young, S., Evermann, G., Kershaw, D., Moore, G., Odell, J., Ollason, D., Povey, D., Valtchev, V., Woodland, P.: The HTK Book for HTK Version 3.2, Cambridge University Engineering Department (2002)"},{"key":"30_CR3","doi-asserted-by":"crossref","first-page":"431","DOI":"10.7551\/mitpress\/3007.003.0017","volume-title":"Finite-State Language Processing","author":"F. Pereira","year":"1997","unstructured":"Pereira, F., Riley, M.: Speech Recognition by Composition of Weighted Finite Automata. In: Roche, E., Schabes, Y. (eds.) Finite-State Language Processing, pp. 431\u2013453. MIT press, Cambridge (1997)"},{"key":"30_CR4","unstructured":"Brown, M.: RNA Modeling Using Stochastic Context-Free Grammars. PhD thesis, University of California, Santa Cruz (1999)"},{"key":"30_CR5","unstructured":"Manning, C.D., Sch\u00fctze, H.: Foundations of Statistical Natural Language Processing. MIT Press, Massachusets Institute of Technology, Cambridge, Massachusets 02142 (1999)"},{"key":"30_CR6","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"L.R. Rabiner","year":"1989","unstructured":"Rabiner, L.R.: A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition. Proceedings of the IEEE\u00a077, 257\u2013286 (1989)","journal-title":"Proceedings of the IEEE"},{"key":"30_CR7","first-page":"133","volume-title":"Proceedings of the 1999 IEEE Symposium on Security and Privacy","author":"C. Warrender","year":"1999","unstructured":"Warrender, C., Forrest, S., Pearlmutter, B.: Detecting Intrusions Using System Calls: Alternative Data Models. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp. 133\u2013145. IEEE Computer Society Press, Los Alamitos (1999)"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Tan, K.M.C., Maxion, R.A.: Why 6? Defining the Operational Limits of STIDE, an Anomaly-Based Intrusion Detector. In: Proceedings of IEEE Symposium on Security & Privacy, pp. 188\u2013201 (2002)","DOI":"10.1109\/SECPRI.2002.1004371"},{"key":"30_CR9","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1049\/el:20020467","volume":"38","author":"Y. Qiao","year":"2002","unstructured":"Qiao, Y., Xin, X., Bin, Y., Ge, S.: Anomaly Intrusion Detection Method Based on HMM. Electronic Letters\u00a038, 663\u2013664 (2002)","journal-title":"Electronic Letters"},{"key":"30_CR10","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/S0031-3203(02)00026-2","volume":"36","author":"D. Yeung","year":"2003","unstructured":"Yeung, D., Ding, Y.: Host-Based Intrusion Detection Using Dynamic and Static Behavioral Models. Pattern Recognition\u00a036, 229\u2013243 (2003)","journal-title":"Pattern Recognition"},{"key":"30_CR11","unstructured":"Kendall, K.: A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems. Master\u2019s thesis, Massachusetts Institute of Technology (1998)"},{"key":"30_CR12","unstructured":"Lippman, R.P., Cunningham, R.K., Fried, D.J., Graf, I., Kendall, K.R., Webster, S.E., Zissman, M.A.: Results of the DARPA 1998 Offline Intrusion Detection Evaluation. In: RAID 1999 Conference (1999) (slides presentation)"},{"key":"30_CR13","unstructured":"Giffin, J., Jha, S., Miller, B.: Efficient Context-Sensitive Intrusion Detection. In: Proceedings of the 11th Annual Network and Distributed Systems Security Symposium (NDSS), San Diego, California, The Internet Society (2004)"},{"key":"30_CR14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1214\/ss\/998929472","volume":"16","author":"M. Schonlau","year":"2001","unstructured":"Schonlau, M., DuMouchel, W., Ju, W., Karr, A., Theus, M., Vardi, Y.: Computer Intrusion: Detecting Masquerades. Statistical Science\u00a016, 1\u201317 (2001) (to appear)","journal-title":"Statistical Science"},{"key":"30_CR15","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/DSN.2002.1028903","volume-title":"Proceedings of the International Conference on Dependable Systems & Networks","author":"R. Maxion","year":"2002","unstructured":"Maxion, R., Townsend, T.: Masquerade Detection Using Truncated Command Lines. In: Proceedings of the International Conference on Dependable Systems & Networks, Washington, DC, pp. 219\u2013228. IEEE, Los Alamitos (2002)"},{"key":"30_CR16","unstructured":"Scott, C., Joel, B., Boleslaw, S., Eric, B.: Intrusion Detection: A Bioinformatics Approach. In: Proceeding of the 19th Annual Computer Security Applications Conference, Las Vegas, Nevada, pp. 24\u201333 (2003)"},{"key":"30_CR17","first-page":"424","volume-title":"Proceedings of the 5th IEEE System, Man and Cybernetics Information Assurance Workshop","author":"S. Boleslaw","year":"2004","unstructured":"Boleslaw, S., Yongqiang, Z.: Recursive Data Mining for Masquerade Detection and Author Identification. In: Proceedings of the 5th IEEE System, Man and Cybernetics Information Assurance Workshop, West Point, NY, pp. 424\u2013431. IEEE, Los Alamitos (2004)"}],"container-title":["Lecture Notes in Computer Science","Emerging Trends in Information and Communication Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11766155_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T04:27:15Z","timestamp":1736396835000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11766155_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540346401","9783540346425"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11766155_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}