{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:51:50Z","timestamp":1725472310227},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540490265"},{"type":"electronic","value":"9783540490586"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11925231_59","type":"book-chapter","created":{"date-parts":[[2006,11,6]],"date-time":"2006-11-06T14:48:34Z","timestamp":1162824514000},"page":"622-631","source":"Crossref","is-referenced-by-count":12,"title":["Hybrid Method for Detecting Masqueraders Using Session Folding and Hidden Markov Models"],"prefix":"10.1007","author":[{"given":"Rom\u00e1n","family":"Posadas","sequence":"first","affiliation":[]},{"given":"Carlos","family":"Mex-Perera","sequence":"additional","affiliation":[]},{"given":"Ra\u00fal","family":"Monroy","sequence":"additional","affiliation":[]},{"given":"Juan","family":"Nolazco-Flores","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"59_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1214\/ss\/998929472","volume":"16","author":"M. Schonlau","year":"2001","unstructured":"Schonlau, M., DuMouchel, W., Ju, W., Karr, A., Theus, M., Vardi, Y.: Computer Intrusion: Detecting Masquerades. Statistical Science\u00a016, 1\u201317 (2001)","journal-title":"Statistical Science"},{"key":"59_CR2","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/S0020-0190(00)00122-8","volume":"76","author":"M. Schonlau","year":"2000","unstructured":"Schonlau, M., Theus, M.: Detecting masquerades in intrusion detection based on unpopular commands. Information Processing Letters\u00a076, 33\u201338 (2000)","journal-title":"Information Processing Letters"},{"key":"59_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/11506881_9","volume-title":"Intrusion and Malware Detection and Vulnerability Assessment","author":"M. Latendresse","year":"2005","unstructured":"Latendresse, M.: Masquerade detection via customized grammars. In: Julisch, K., Kr\u00fcgel, C. (eds.) DIMVA 2005. LNCS, vol.\u00a03548, pp. 141\u2013159. Springer, Heidelberg (2005)"},{"key":"59_CR4","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1613\/jair.374","volume":"7","author":"C.G. Nevill-Manning","year":"1997","unstructured":"Nevill-Manning, C.G., Witten, I.H.: Identifying hierarchical structure in sequences: a linear-time algorithm. Journal of Artificial Intelligence Research, JAIR\u00a07, 67\u201382 (1997)","journal-title":"Journal of Artificial Intelligence Research, JAIR"},{"key":"59_CR5","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MASSP.1986.1165342","volume":"3","author":"L.R. Rabiner","year":"1986","unstructured":"Rabiner, L.R., Juang, B.H.: An introduction to Hidden Markov Models. IEEE ASSP Magazine\u00a03, 4\u201316 (1986)","journal-title":"IEEE ASSP Magazine"},{"key":"59_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/11507840_30","volume-title":"Financial Cryptography and Data Security","author":"F. God\u00ednez","year":"2005","unstructured":"God\u00ednez, F., Hutter, D., Monroy, R.: Audit File Reduction Using N-Gram Models (Work in Progress). In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol.\u00a03570, pp. 336\u2013340. Springer, Heidelberg (2005)"},{"key":"59_CR7","unstructured":"Schonlau, M.: Masquerading used data (Matthias Schonlau\u2019s home page), http:\/\/www.schonlau.net"}],"container-title":["Lecture Notes in Computer Science","MICAI 2006: Advances in Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11925231_59","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T11:38:42Z","timestamp":1628077122000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11925231_59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540490265","9783540490586"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/11925231_59","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}