{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T01:40:11Z","timestamp":1737078011712,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540007166"},{"type":"electronic","value":"9783540365525"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36552-4_8","type":"book-chapter","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T23:22:37Z","timestamp":1181172157000},"page":"107-117","source":"Crossref","is-referenced-by-count":2,"title":["A Risk-Sensitive Intrusion Detection Model"],"prefix":"10.1007","author":[{"given":"Hai","family":"Jin","sequence":"first","affiliation":[]},{"given":"Jianhua","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zongfen","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,3,14]]},"reference":[{"issue":"3","key":"8_CR1","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1145\/357830.357849","volume":"3","author":"S. Axelsson","year":"2000","unstructured":"S. Axelsson, \u201cThe base-rate fallacy and the dificulty of intrusion detection\u201d, ACM Trans. on Information and System Security, 3(3), 2000, pp.186\u2013205114","journal-title":"ACM Trans. on Information and System Security"},{"key":"8_CR2","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1007\/978-1-4757-1727-3","volume-title":"Statistical decision theory: foundations, concepts, and methods","author":"J.O. Berger","year":"1980","unstructured":"J.O. Berger, Statistical decision theory: foundations, concepts, and methods, New York, Springer, 1980, pp.94\u201396 109"},{"key":"8_CR3","unstructured":"S.M. Bridges and Rayford B. Vaughn, \u201cFuzzy data mining and genetic algorithms applied to intrusion detection\u201d, Proc. of the Twenty-third National Information Systems Security Conference, Baltimore, MD, October 2000 108"},{"issue":"4","key":"8_CR4","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1109\/3468.935044","volume":"31","author":"R.K. Cunningham","year":"2001","unstructured":"R.K. Cunningham, R.P. Lippmann, and S.E. Webster, \u201cDetecting and displaying novel computer attacks with macroscope\u201d, IEEE Trans. on Systems, Man, and Cybernetics-Part A: Systems and Humans, vol.31, No.4, July 2001, pp.275\u2013281 108","journal-title":"IEEE Trans. on Systems, Man, and Cybernetics-Part A: Systems and Humans"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"J.E. Dickerson and J.A. Dickerson, \u201cFuzzy network profiling for intrusion detection\u201d, Proc. of 19th International Conference of the North American, Fuzzy Information Processing Society, 2000, NAFIPS, pp.301\u2013306107","DOI":"10.1109\/NAFIPS.2000.877441"},{"key":"8_CR6","unstructured":"E. Eskin, \u201cAnomaly Detection over Noisy Data using Learned Probability Distributions\u201d, Proc. of ICML00, Palo Alto, CA: July, 2000 111"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"G. Florez, S. M. Bridges, and R.B. Vaughn, \u201cAn improved algorithm for fuzzy data mining for intrusion detection\u201d, Proc. of NAFIPS, Annual Meeting of the North American, Fuzzy Information Processing Society, 2002, pp.457\u2013462 107","DOI":"10.1109\/NAFIPS.2002.1018103"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"S. Forrest, S.A. Hofmeyr, A. Somayaji, and T.A. Longsta., \u201cA sense of self for unix processes\u201d, Proc. IEEE Symposium on Security and Privacy, Los Alamitos, CA, 1996, pp.120\u2013128 108, 109, 112, 113","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"8_CR9","unstructured":"A. Ghosh and A. Schwartzbard, \u201cA study in using neural networks for anomaly and misuse detection\u201d, Proc. of the Eighth USENIX seurity Symposium, 1999 107"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"J. John E. Gaffney and J.W. Ulvila, \u201cEvaluation of intrusion detectors: a decision theory approach\u201d, IEEE Symposium on Security and Privacy, 2001, pp.50\u201361 114","DOI":"10.1109\/SECPRI.2001.924287"},{"key":"8_CR11","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","volume":"6","author":"S. A. Hofmeyr","year":"1998","unstructured":"S. A. Hofmeyr, S. Forrest, and A. Somayaji, \u201cIntrusion detection using sequences of system calls\u201d, Journal of Computer Security, 6, 1998, pp.151\u2013180 108","journal-title":"Journal of Computer Security"},{"issue":"10","key":"8_CR12","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/262793.262811","volume":"40","author":"S. Forrest","year":"1997","unstructured":"S. Forrest, S. Hofmeyr, and A. Somayaji \u201cComputer immunology\u201d, Communications of the ACM, 1997, vol.40, No.10, pp.88\u201396","journal-title":"Communications of the ACM"},{"key":"8_CR13","unstructured":"T. Lane and C. E. Brodley, \u201cSequence matching and learning in anomaly detection for computer security\u201d, Proc. of the AAAI-97 Workshop on AI Approaches to Fraud Detection and Risk Management, 1997, pp.43\u201349, Menlo Park, CA: AAAI Press 108, 111"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"T. Lane and C. E. Brodley, \u201cTemporal sequence learning and data reduction for anomaly detection\u201d, Proc. of the Fifth ACM Conference on Computer and Communications Security, 1998, pp.150\u2013158 108","DOI":"10.1145\/288090.288122"},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1145\/322510.322526","volume":"2","author":"T. Lane","year":"1999","unstructured":"T. Lane and C. E. Brodley, \u201cTemporal sequence learning and data reduction for anomaly detection\u201d, ACM Trans. on Information and System Security, 2, 1999, pp.295\u2013331 108","journal-title":"ACM Trans. on Information and System Security"},{"key":"8_CR16","unstructured":"L. Portnoy, E. Eskin and S. J. Stolfo, \u201cIntrusion detection with unlabeled data using clustering\u201d, Proc. of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001), Philadelphia, PA: November 5\u20138, 2001"},{"key":"8_CR17","unstructured":"W. Lee, W. Fan, M. Miller, S. Stolfo, and E. Zadok, \u201cToward Cost-Sensitive Modeling for Intrusion Detection and Response\u201d, to appear in Journal of Computer Security, 2001"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"R.P. Lippman, D. J. Fried, I. Graf, J. W. Haines, K.R. Kendall, D. McCllung, D. Weber, S.E. Webster, D. Wyschogrod, R.K. Cunningham, and M.A. Zissman, \u201cEvaluating Intrusion Detection Systems: The 1998 DARPA Off-line Intrusion Detection Evaluation\u201d, Proc. of DARPA Information Survivability Conference and Exposition, Jan 25\u201327, 2000, vol.2, pp.12\u201326 115","DOI":"10.1109\/DISCEX.2000.821506"},{"key":"8_CR19","unstructured":"W. Lee and S. Stolfo, \u201cData Mining Approaches for Intrusion Detection\u201d, Proc. of the Seventh USENIX Security Symposium (SECURITY\u2019 98), San Antonio, TX, January 1998 107"},{"key":"8_CR20","unstructured":"W. Lee, S. Stolfo, and P. Chan, \u201cLearning Patterns from Unix Process Execution Traces for Intrusion Detection\u201d, Proc. of AAAI Workshop: AI Approaches to Fraud Detection and Risk Management, July 1997 107"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"J. Marin, D. Ragsdale, and J. Surdu, \u201cA hybrid approach to the profile creation and intrusion detection\u201d, Proc. of DARPA Information Survivability Conference & Exposition II, 2001. DISCEX\u2019 01. Proc. vol.1, 2001, pp.69\u201376 108","DOI":"10.1109\/DISCEX.2001.932193"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Y. Okazaki, I. Sato, and S. Goto, \u201cA new Intrusion detection method based on process profiling\u201d, Proc. of the 2002 Symposium on Applications and the Internet (SAINT\u201902) 108, 109","DOI":"10.1109\/SAINT.2002.994455"},{"key":"8_CR23","unstructured":"S. L. Scott, \u201cA Bayesian paradigm for designing intrusion detection systems\u201d, to appear in Computational Statistics and Data Analysis, 2002 108"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"C. Warrender, S. Forrest, and B. Pearlmutter, \u201cDetecting intrusions using system calls: Alternative data models\u201d, Proc. IEEE Symposium on Security and Privacy, 1999, pp.133\u2013145 108","DOI":"10.1109\/SECPRI.1999.766910"},{"issue":"4","key":"8_CR25","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1109\/3468.935043","volume":"31","author":"N. Ye","year":"2001","unstructured":"N. Ye, X. Li, Q. Chen, S.M. Emran, and M. Xu, \u201cProbabilistic techniques for intrusion detection based on computer audit data\u201d, IEEE Trans. on Systems, Man, and Cybernetics-Part A: Systems and Humans, vol.31, No.4, July 2001, pp.266\u2013274 107, 108","journal-title":"IEEE Trans. on Systems, Man, and Cybernetics-Part A: Systems and Humans"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2014 ICISC 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36552-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T01:10:28Z","timestamp":1737076228000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36552-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540007166","9783540365525"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/3-540-36552-4_8","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}