{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:16:07Z","timestamp":1725538567352},"publisher-location":"Boston, MA","reference-count":8,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441902207"},{"type":"electronic","value":"9781441902214"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-1-4419-0221-4_49","type":"book-chapter","created":{"date-parts":[[2009,10,3]],"date-time":"2009-10-03T08:01:49Z","timestamp":1254556909000},"page":"417-422","source":"Crossref","is-referenced-by-count":0,"title":["Computer Log Anomaly Detection Using Frequent Episodes"],"prefix":"10.1007","author":[{"given":"Perttu","family":"Halonen","sequence":"first","affiliation":[]},{"given":"Markus","family":"Miettinen","sequence":"additional","affiliation":[]},{"given":"Kimmo","family":"H\u00e4t\u00f6nen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"49_CR1_49","first-page":"307","volume-title":"Adv. in knowl. discovery and data mining","author":"R. Agrawal","year":"1996","unstructured":"R. Agrawal et al. Fast discovery of association rules. In U.M. Fayyad et al., editors, Adv. in knowl. discovery and data mining, pages 307\u2013328. AAAI, Menlo Park, CA, USA, 1996."},{"key":"49_CR2_49","first-page":"62","volume-title":"Proc. PAKDD\u203200","author":"J. Boulicaut","year":"2000","unstructured":"J. Boulicaut and A. Bykowski. Frequent closures as a concise representation for binary data mining. In Proc. PAKDD\u203200, volume 1805 of LNAI, pages 62\u201373, Kyoto, Japan, April 2000. Springer."},{"key":"49_CR3_49","doi-asserted-by":"crossref","unstructured":"S. Forrest et al. Self-nonself discrimination in a computer. In Proc. of the 1994 IEEE Symp. on Research in Security and Privacy, Los Alamos, CA, pages 202\u2013212. IEEE Computer Society Press, 1994.","DOI":"10.1109\/RISP.1994.296580"},{"key":"49_CR4_49","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1109\/SECPRI.1997.601332","volume":"00","author":"C. Ko","year":"1997","unstructured":"C. Ko et al. Execution monitoring of security-critical programs in distributed systems: a specification-based approach. 1997 IEEE Symp. on Security and Privacy, 00:175\u2013187, 1997.","journal-title":"1997 IEEE Symp. on Security and Privacy"},{"key":"49_CR5_49","unstructured":"T. Lane and C.E. Brodley. Sequence matching and learning in anomaly detection for computer security. In AAAI Workshop: AI Approaches to Fraud Detection and Risk Management, pages 43\u201349, July 1997."},{"key":"49_CR6_49","first-page":"210","volume-title":"Proc. of the First Int. Conf. on Knowledge Discovery and Data Mining (KDD'95)","author":"H. Mannila","year":"1995","unstructured":"H. Mannila et al. Discovering frequent episodes in sequences. In Proc. of the First Int. Conf. on Knowledge Discovery and Data Mining (KDD'95), pages 210\u2013215, Montreal, Canada, August 1995. AAAI Press."},{"key":"49_CR7_49","first-page":"146","volume-title":"Proc. of the Second Int. Conf. on Knowledge Discovery and Data Mining (KDD'96)","author":"H. Mannila","year":"1996","unstructured":"H. Mannila and H. Toivonen. Discovering generalized episodes using minimal occurrences. In E. Simoudis et al., editors, Proc. of the Second Int. Conf. on Knowledge Discovery and Data Mining (KDD'96), pages 146\u2013151, Portland, Oregon, August 1996. AAAI Press."},{"key":"49_CR8_49","first-page":"398","volume":"1540","author":"N. Pasquier","year":"1999","unstructured":"N. Pasquier et al. Discovering frequent closed itemsets for association rules. LNCS, 1540:398\u2013 416, 1999.","journal-title":"LNCS"}],"container-title":["IFIP Advances in Information and Communication Technology","Artificial Intelligence Applications and Innovations III"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-0221-4_49.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:10:37Z","timestamp":1619827837000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4419-0221-4_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9781441902207","9781441902214"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-0221-4_49","relation":{},"ISSN":["1868-4238"],"issn-type":[{"type":"print","value":"1868-4238"}],"subject":[],"published":{"date-parts":[[2009]]}}}