{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T04:10:17Z","timestamp":1736568617776,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540464846"},{"type":"electronic","value":"9783540464853"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11893295_21","type":"book-chapter","created":{"date-parts":[[2006,10,2]],"date-time":"2006-10-02T16:23:21Z","timestamp":1159806201000},"page":"184-191","source":"Crossref","is-referenced-by-count":2,"title":["High-Order Markov Kernels for Network Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Shengfeng","family":"Tian","sequence":"first","affiliation":[]},{"given":"Chuanhuan","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Shaomin","family":"Mu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","volume":"6","author":"S. Forrest","year":"1998","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A.: Intrusion detection using sequences of system calls. Journal of Computer Security\u00a06, 151\u2013180 (1998)","journal-title":"Journal of Computer Security"},{"key":"21_CR2","first-page":"50","volume-title":"AAAI Workshop on AI Approaches to Fraud Detection and Risk Management","author":"W. Lee","year":"1997","unstructured":"Lee, W., Stolfo, S.J., Chan, P.K.: Learning patterns from UNIX process execution traces for intrusion detection. In: AAAI Workshop on AI Approaches to Fraud Detection and Risk Management, pp. 50\u201356. AAAI Press, Menlo Park (1997)"},{"key":"21_CR3","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/S0031-3203(02)00026-2","volume":"36","author":"D. Yeung","year":"2003","unstructured":"Yeung, D., Ding, Y.: Host-based intrusion detection using dynamic and static behavioral models. Pattern Recognition\u00a036, 229\u2013243 (2003)","journal-title":"Pattern Recognition"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Sekar, R., Bendre, M., Dhurjati, D., Bollineni, P.: A fast automation-based method for detecting anomalous program behaviors. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 144\u2013155 (2001)","DOI":"10.1109\/SECPRI.2001.924295"},{"key":"21_CR5","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/j.cose.2004.01.016","volume":"23","author":"L. Feng","year":"2004","unstructured":"Feng, L., Guan, X., Guo, S., Gao, Y., Liu, P.: Predicting the intrusion intentions by observing system call sequences. Computers & Security\u00a023, 241\u2013252 (2004)","journal-title":"Computers & Security"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Warrender, S., Forrest, S., Pearlmutter, B.: Detecting intrusions using system calls: Alternative data models. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 133\u2013145 (1999)","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"21_CR7","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1198\/10618600152628068","volume":"10","author":"W. Ju","year":"2001","unstructured":"Ju, W., Vardi, Y.: A hybrid high-order Markov chain model for computer intrusion detection. Journal of Computational and Graphical Statistics\u00a010, 277\u2013295 (2001)","journal-title":"Journal of Computational and Graphical Statistics"},{"key":"21_CR8","volume-title":"An Introduction to Support Vector machines","author":"N. Cristianini","year":"2000","unstructured":"Cristianini, N., Shawe-Taylor, J.: An Introduction to Support Vector machines. Cambridge University Press, Cambridge (2000)"},{"key":"21_CR9","unstructured":"Leslie, C., Eskin, E., Noble, W.S.: The spectrum kernel: a string kernel for SVM protein classification. In: Proceedings of the pacific biocomputing Symposium, vol.\u00a07, pp. 566\u2013575 (2002)"},{"key":"21_CR10","volume-title":"Proceedings of Neural Information Processing Systems 15","author":"C. Leslie","year":"2002","unstructured":"Leslie, C., Eskin, E., Weston, J., Noble, W.S.: Mismatch string kernels for SVM protein classification. In: Becker, S., Thrun, S., Obermayer, K. (eds.) Proceedings of Neural Information Processing Systems 15, MIT Press, Cambridge (2002)"},{"key":"21_CR11","volume-title":"Proceedings of Neural Information Processing Systems 15","author":"S.V.N. Vishwanathan","year":"2002","unstructured":"Vishwanathan, S.V.N., Smola, A.J.: Fast kernels for string and tree matching. In: Becker, S., Thrun, S., Obermayer, K. (eds.) Proceedings of Neural Information Processing Systems 15, MIT Press, Cambridge (2002)"},{"key":"21_CR12","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1162\/153244302760200687","volume":"2","author":"H. Lodhi","year":"2002","unstructured":"Lodhi, H., Saunders, C., Shawe-Taylor, C., Cristianini, N., Watkins, C.: Text classification using string kernels. Journal of Machine Learning Research\u00a02, 419\u2013444 (2002)","journal-title":"Journal of Machine Learning Research"},{"key":"21_CR13","unstructured":"Sch\u00f6lkopf, B., Platt, B.J.C., Shawe-Taylor, J., Smola, A.J.: Estimating the support of a high-dimensional distribution. Technical report MSR-TR-99-87, Microsoft Research (1999)"},{"issue":"4","key":"21_CR14","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1109\/3468.935043","volume":"31","author":"N. Ye","year":"2001","unstructured":"Ye, N., Li, X., Chen, Q., Emran, S.M., Xu, M.: Probabilistic techniques for intrusion detection based on computer audit data. IEEE Trans. On Systems, Man, and Cybernetics \u2013 Part A: Systems and Humans\u00a031(4), 266\u2013274 (2001)","journal-title":"IEEE Trans. On Systems, Man, and Cybernetics \u2013 Part A: Systems and Humans"},{"issue":"3","key":"21_CR15","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1214\/ss\/1042727943","volume":"17","author":"A. Berchtold","year":"2002","unstructured":"Berchtold, A., Raftery, E.: The mixture transition distribution model for high-order Markov chains and non-Gaussian time series. Statistical Science\u00a017(3), 328\u2013356 (2002)","journal-title":"Statistical Science"}],"container-title":["Lecture Notes in Computer Science","Neural Information Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11893295_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T02:45:17Z","timestamp":1736563517000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11893295_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540464846","9783540464853"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/11893295_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}