{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:27:04Z","timestamp":1759962424936},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540401896"},{"type":"electronic","value":"9783540448532"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44853-5_6","type":"book-chapter","created":{"date-parts":[[2007,11,30]],"date-time":"2007-11-30T23:01:31Z","timestamp":1196463691000},"page":"74-90","source":"Crossref","is-referenced-by-count":21,"title":["Behavior Profiling of Email"],"prefix":"10.1007","author":[{"given":"Salvatore J.","family":"Stolfo","sequence":"first","affiliation":[]},{"given":"Shlomo","family":"Hershkop","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Nimeskern","sequence":"additional","affiliation":[]},{"given":"Chia-Wei","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,5,27]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"M. Bhattacharyya, S. Hershkop, E. Eskin, and S. J. Stolfo. MET: An Experimental System for Malicious Email Tracking. In Proceedings of the 2002 New Security Paradigms Workshop (NSPW-2002). Virginia Beach, VA, September, 2002.","DOI":"10.1145\/844102.844104"},{"issue":"9","key":"6_CR2","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1145\/362342.362367","volume":"16","author":"C. Bron","year":"1973","unstructured":"C. Bron, J. Kerbosch Finding all cliques of an undirected graph Comm. ACM 16(9) (1973) 575\u2013577.","journal-title":"ACM"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"E. Eskin, A. Arnold, M. Prerau, L. Portnoy and S. J. Stolfo. A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data Data Mining for Security Applications. Kluwer 2002.","DOI":"10.1007\/978-1-4615-0953-0_4"},{"key":"6_CR4","unstructured":"George H. John and Pat Langley. Estimating continuous distributions in bayesian classifiers In Proceedings of the Eleventh Conference on Uncertainty in Artificial Intelligence. Pages 338\u2013345, 1995"},{"key":"6_CR5","unstructured":"Wenke Lee, Sal Stolfo, and Kui Mok. Mining Audit Data to Build Intrusion Detection Models In Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD\u2019 98), New York, NY, August 1998"},{"key":"6_CR6","unstructured":"Wenke Lee, Sal Stolfo, and Phil Chan. Learning Patterns from Unix Process Execution Traces for Intrusion Detection AAAI Workshop: AI Approaches to Fraud Detection and Risk Management, July 1997"},{"key":"6_CR7","unstructured":"Matthew G. Schultz, Eleazar Eskin, and Salvatore J. Stolfo. Malicious Email Filter \u2014 A UNIX Mail Filter that Detects Malicious Windows Executables. Proceedings of USENIX Annual Technical Conference-FREENIX Track. Boston, MA: June 2001."},{"issue":"5199","key":"6_CR8","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1126\/science.267.5199.843","volume":"267","author":"M. Damashek","year":"1995","unstructured":"Damashek, M. Gauging Similarity with n-grams: language independent categorization of text Science, 267(5199), 843\u2013848, 1995.","journal-title":"Science"},{"key":"6_CR9","unstructured":"Mitchell, T. Machine Learning, McGraw-Hill, 1997, pg. 180\u2013183."},{"key":"6_CR10","unstructured":"Hogg, R.V. Introduction to Mathematical Statistics, Prentice Hall, 1994."}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44853-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,25]],"date-time":"2019-02-25T20:38:54Z","timestamp":1551127134000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44853-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540401896","9783540448532"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-44853-5_6","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}