{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T11:31:16Z","timestamp":1769859076121,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540443452","type":"print"},{"value":"9783540458531","type":"electronic"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45853-0_16","type":"book-chapter","created":{"date-parts":[[2007,5,3]],"date-time":"2007-05-03T20:42:13Z","timestamp":1178224933000},"page":"264-279","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":56,"title":["Learning Fingerprints for a Database Intrusion Detection System"],"prefix":"10.1007","author":[{"given":"Sin Yeung","family":"Lee","sequence":"first","affiliation":[]},{"given":"Wai Lup","family":"Low","sequence":"additional","affiliation":[]},{"given":"Pei Yuen","family":"Wong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,26]]},"reference":[{"key":"16_CR1","unstructured":"Low, W.L., Lee, S.Y., Teoh, P.: DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions. In: Proceedings of the 4th International Conference on Enterprise Information Systems (ICEIS). (2002)"},{"key":"16_CR2","unstructured":"Atanasov, M.: The truth about internet fraud. In: Ziff Davis Smart Business, Available at URL \n                  http:\/\/techupdate.zdnet.com\/techupdate\/stories\/main\/0,14179,2688776-11,00.html\n                  \n                 (2001)"},{"key":"16_CR3","unstructured":"Hatcher, T.: Survey: Costs of computer security breaches soar. In: CNN.com, Available at URL \n                  http:\/\/www.cnn.com\/2001\/TECH\/internet\/03\/12\/csi.fbi.hacking.report\/\n                  \n                 (2001)"},{"key":"16_CR4","unstructured":"Poulsen, K.: Guesswork Plagues Web Hole Reporting. In: SecurityFocus, Available at URL \n                  http:\/\/online.securityfocus.com\/news\/346\n                  \n                 (2002)"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Internet Security Systems: RealSecure Intrusion Detection Solution, Available at URL \n                  http:\/\/www.iss.net\n                  \n                 (2001)","DOI":"10.1016\/S1361-3723(01)00614-5"},{"key":"16_CR6","unstructured":"NFR Security: NFR network intrusion detection, Available at URL \n                  http:\/\/www.nfr.com\/products\/NID\/\n                  \n                 (2001)"},{"key":"16_CR7","unstructured":"Enterasys Networks, Inc.: The Dragon IDS, Available at URL \n                  http:\/\/www.enterasys.com\/ids\/dragonids.html\n                  \n                 (2001)"},{"key":"16_CR8","unstructured":"Cisco Systems, Inc.: Cisco Intrusion Detection, Available at URL \n                  http:\/\/www.cisco.com\/warp\/public\/cc\/pd\/sqsw\/sqidsz\/\n                  \n                 (2001)"},{"key":"16_CR9","unstructured":"Symantec Corporation: Enterprise Solutions, Available at URL \n                  http:\/\/enterprisesecurity.symantec.com\/\n                  \n                 (2001)"},{"key":"16_CR10","unstructured":"Roesch, M.: Snort: Lighweight intrusion detection for networks. In: Proceedings of the 13th Conference on Systems Administration (LISA-99), USENIX Association (1999) 229\u2013238"},{"key":"16_CR11","unstructured":"Andrews, C.: SQL injection FAQ, Available at URL \n                  http:\/\/www.sqlsecurity.com\n                  \n                 (2001)"},{"key":"16_CR12","unstructured":"Anley, C.: Advanced SQL Injection In SQL Server Applications, Next Generation Security Software Ltd, Available at URL \n                  http:\/\/www.nextgenss.com\/papers\/advancedsqlinjection.pdf\n                  \n                 (2002)"},{"key":"16_CR13","unstructured":"Anley, C.: (more) Advanced SQL Injection, Next Generation Security Software Ltd, Available at URL \n                  http:\/\/www.nextgenss.com\/papers\/moreadvancedsqlinjection.pdf\n                  \n                 (2002)"},{"key":"16_CR14","unstructured":"Oracle: Oracle, 2001, Available at URL \n                  http:\/\/www.oracle.com\n                  \n                 (2001)"},{"key":"16_CR15","unstructured":"Chung, C. Y., Gertz, M., Levitt, K.: Misuse detection in database systems through user profiling. In: Web Proceedings of the 2nd International Workshop on the Recent Advances in Intrusion Detection (RAID). (1999)"},{"key":"16_CR16","unstructured":"Quinlan, J. R.: Induction of decision trees. In Shavlik, J.W., Dietterich, T. G., eds.: Readings in Machine Learning. Morgan Kaufmann (1990) Originally published in Machine Learning 1:81-106, 1986."},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Hovy, E., Lin, C. Y.: Automated Text Summarization in SUMMARIST. In: Proceedings of ACL\/EACL Workshop on Intelligent Scalable Text Summarization. (1997) Madrid, Spain.","DOI":"10.3115\/1119089.1119121"},{"key":"16_CR18","unstructured":"Boguraev, B., Bellamy, R.: Dynamic Presentation of Phrasally-Based Document Abstractions. In: Proceedings of Thirty-second Annual Hawaii International Conference on System Sciences (HICSS). (1998)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2014 ESORICS 2002"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45853-0_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:08:54Z","timestamp":1559506134000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45853-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540443452","9783540458531"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-45853-0_16","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2002]]},"assertion":[{"value":"26 September 2002","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}