{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:46:39Z","timestamp":1725515199443},"publisher-location":"Boston, MA","reference-count":10,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387096988"},{"type":"electronic","value":"9780387096995"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-09699-5_20","type":"book-chapter","created":{"date-parts":[[2008,7,16]],"date-time":"2008-07-16T18:12:54Z","timestamp":1216231974000},"page":"301-315","source":"Crossref","is-referenced-by-count":3,"title":["Anomaly Detection with Diagnosis in Diversified Systems using Information Flow Graphs"],"prefix":"10.1007","author":[{"given":"Fr\u00e9d\u00e9ric","family":"Majorczyk","sequence":"first","affiliation":[]},{"given":"Eric","family":"Totel","sequence":"additional","affiliation":[]},{"given":"Ludovic","family":"M\u00e9","sequence":"additional","affiliation":[]},{"given":"Ayda","family":"Sa\u00efdane","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"Bharathi, V.: N-version programming method of software fault tolerance: A critical review. In: National Conference on Nonlinear Systems and Dynamics (NCNSD). Kharagpur, India (2003)"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Champin, P.A., Solnon, C.: Measuring the similarity of labeled graphs. In: in Proceedings of the 5th International Conference on Case-Based Reasoning (ICCBR 2003), pp. 80\u201395. Trondheim, Norway (2003)","DOI":"10.1007\/3-540-45006-8_9"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"d\u2019Ausbourg, B.: Implementing secure dependencies over a network by designing a distributed security subsystem. In: Proceedings of the European Sysmposium on Research in Computer Security (ESORICS\u201994), pp. 249\u2013266 (1994)","DOI":"10.1007\/3-540-58618-0_68"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Gao, D., Reiter, M.K., Song, D.: Behavioral distance for intrusion detection. In: Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID 2005), pp. 63\u201381. Seattle, WA (2005)","DOI":"10.1007\/11663812_4"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Gao, D., Reiter,M.K., Song, D.: Behavioral distance measurement using hidden markov models. In: Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection (RAID 2006), pp. 19\u201340. Hamburg, Germany (2006)","DOI":"10.1007\/11856214_2"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Just, J.E., Reynolds, J.C., Clough, L.A., Danforth, M., Levitt, K.N., Maglich, R., Rowe, J.: Learning unknown attacks - a start. In: A. Wespi, G. Vigna, L. Deri (eds.) Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID 2002), Lecture Notes in Computer Science, vol. 2516, pp. 158\u2013176. Zurich, Switzerland (2002)","DOI":"10.1007\/3-540-36084-0_9"},{"key":"20_CR7","unstructured":"Porras, P.A., Neumann, P.G.: EMERALD: Event monitoring enabling responses to anomalous live disturbances. In: Proc. of the 20th National Information Systems Security Conference, pp. 353\u2013365. Baltimore, MD (1997). URL http:\/\/www2.csl.sri.com\/emerald\/emerald-niss97.html"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Totel, E., Majorczyk, F., M\u2019e, L.: COTS diversity based intrusion detection and application to web servers. In: Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID 2005), pp. 43\u201362. Seattle, WA (2005)","DOI":"10.1007\/11663812_3"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Ver\u00edssimo, P.E., Neves, N.F., Correia, M.P.: Intrusion-tolerant architectures: Concepts and design. In: Architecting Dependable Systems, Lecture Notes in Computer Science, vol. 2677. Sptringer-Verlag (2003)","DOI":"10.1007\/3-540-45177-3_1"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Vigna, G., Robertson, W., Kher, V., Kemmerer, R.A.: A stateful intrusion detection system for world-wide web servers. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC 2003), pp. 34\u201343. Las Vegas, Nevada (2003)","DOI":"10.1109\/CSAC.2003.1254308"}],"container-title":["IFIP \u2013 The International Federation for Information Processing","Proceedings of The Ifip Tc 11 23rd International Information Security Conference"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-09699-5_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:45:37Z","timestamp":1619574337000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-09699-5_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387096988","9780387096995"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-09699-5_20","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[]}}