{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,13]],"date-time":"2025-04-13T04:55:39Z","timestamp":1744520139997},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540410850"},{"type":"electronic","value":"9783540399452"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-39945-3_2","type":"book-chapter","created":{"date-parts":[[2007,4,14]],"date-time":"2007-04-14T02:38:33Z","timestamp":1176518313000},"page":"17-27","source":"Crossref","is-referenced-by-count":5,"title":["A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential Intrusions"],"prefix":"10.1007","author":[{"given":"Josu\u00e9","family":"Kuri","sequence":"first","affiliation":[]},{"given":"Gonzalo","family":"Navarro","sequence":"additional","affiliation":[]},{"given":"Ludovic","family":"M\u00e9","sequence":"additional","affiliation":[]},{"given":"Laurent","family":"Heye","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2000,11,11]]},"reference":[{"key":"2_CR1","volume-title":"Technical report","author":"J. P. Anderson","year":"1980","unstructured":"J. P. Anderson. Computer security threat monitoring and surveillance. Technical report, James P. Anderson Company, Fort Washington, Pennsylvania, April 1980."},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Teresa F. Lunt. A survey of intrusion detection techniques. Computers and Security, 12, 1993.","DOI":"10.1016\/0167-4048(93)90029-5"},{"key":"2_CR3","unstructured":"T. D. Garvey and T. F. Lunt. Model-based intrusion detection. In Proceedings of the 14th National Computer Security Conference, October 1991."},{"key":"2_CR4","unstructured":"Ludovic M\u00e9. Gassata, a genetic algorithm as an alternative tool for security audit trails analysis. In First international workshop on the Recent Advances in Intrusion Detection, 1998."},{"key":"2_CR5","unstructured":"J. Kuri and G. Navarro. Fast multipattern search algorithms for intrusion detection. Technical Report TR\/DCC-99-11, Dept. of Computer Science, Univ. of Chile, December 1999. To appear in 7th International Symposium on String Processing and Information Retrieval (SPIRE\u201900), IEEE CS Press."},{"issue":"2","key":"2_CR6","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/PL00009253","volume":"23","author":"R. Baeza-Yates","year":"1999","unstructured":"R. Baeza-Yates and G. Navarro. Faster approximate string matching. Algorithmica, 23(2):127\u2013158, 1999.","journal-title":"Algorithmica"},{"key":"2_CR7","unstructured":"G. Navarro. Approximate Text Searching. PhD thesis, Dept. of Computer Science, Univ. of Chile, December 1998. Technical Report TR\/DCC-98-14. ftp:\/\/ftp.dcc.uchile.cl\/pub\/users\/gnavarro\/thesis98.ps.gz ."},{"key":"2_CR8","unstructured":"M. Bishop. A standard audit log format. In Proceedings of the 19th National Information Systems Security Conference, pages 136\u2013145, October 1995."},{"key":"2_CR9","unstructured":"P. D\u2019haeseleer, S. Forrest, and P. Helman. An immunological approach to change detection: Algorithms, analysis and implications. In Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy. IEEE Computer Society, IEEE Computer Society Press, May 1996."}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-39945-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T05:34:49Z","timestamp":1556343289000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-39945-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540410850","9783540399452"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-39945-3_2","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}