{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T08:41:57Z","timestamp":1743064917310,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":12,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781489976857"},{"type":"electronic","value":"9781489976871"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-1-4899-7687-1_505","type":"book-chapter","created":{"date-parts":[[2017,4,13]],"date-time":"2017-04-13T12:32:16Z","timestamp":1492086736000},"page":"788-790","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Machine Learning for IT Security"],"prefix":"10.1007","author":[{"given":"Philip K.","family":"Chan","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,14]]},"reference":[{"key":"505_CR1323","unstructured":"Anderson D, Lunt T, Javitz H, Tamaru A, Valdes A (1995) Detecting unusual program behavior using the statistical component of the next-generation intrusion detection expert system (NIDES). Technical report SRI-CSL-95-06, SRI"},{"key":"505_CR1324","doi-asserted-by":"crossref","unstructured":"Apap F, Honig A, Hershkop S, Eskin E, Stolfo S (2002) Detecting malicious software by monitoring anomalous windows registry accesses. In: Proceeding of fifth international symposium on recent advances in intrusion detection (RAID), Zurich, pp\u00a016\u201318","DOI":"10.1007\/3-540-36084-0_3"},{"key":"505_CR1325","first-page":"2673","volume":"7","author":"A Bratko","year":"2006","unstructured":"Bratko A, Filipic B, Cormack G, Lynam T, Zupan B (2006) Spam filtering using statistical data compression models. J Mach Learn Res 7:2673\u20132698","journal-title":"J Mach Learn Res"},{"key":"505_CR1326","first-page":"2699","volume":"7","author":"G Fumera","year":"2006","unstructured":"Fumera G, Pillai I, Roli F (2006) Spam filtering based on the analysis of text information embedded into images. J Mach Learn Res 7:2699\u20132720","journal-title":"J Mach Learn Res"},{"key":"505_CR1327","first-page":"141","volume-title":"A study in using neural networks for anomaly and misuse detection","author":"A Ghosh","year":"1999","unstructured":"Ghosh A, Schwartzbard A (1999) A study in using neural networks for anomaly and misuse detection. In: Proceeding of 8th USENIX security symposium, Washington, DC, pp\u00a0141\u2013151"},{"issue":"3","key":"505_CR1328","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1145\/322510.322526","volume":"2","author":"T Lane","year":"1999","unstructured":"Lane T, Brodley C (1999) Temporal sequence learning and data reduction for anomaly detection. ACM Trans Inf Syst Secur 2(3):295\u2013331","journal-title":"ACM Trans Inf Syst Secur"},{"key":"505_CR1329","series-title":"IEEE symposium on security and privacy","first-page":"120","volume-title":"A data mining framework for building intrusion detection models","author":"W Lee","year":"1999","unstructured":"Lee W, Stolfo S, Mok K (1999) A data mining framework for building intrusion detection models. In: IEEE symposium on security and privacy, pp\u00a0120\u2013132"},{"key":"505_CR1330","first-page":"601","volume-title":"Learning rules for anomaly detection of hostile network traffic","author":"M Mahoney","year":"2003","unstructured":"Mahoney M, Chan P (2003) Learning rules for anomaly detection of hostile network traffic. In: Proceeding of IEEE international conference data mining, Melbourne, pp\u00a0601\u2013604"},{"key":"505_CR1331","first-page":"219","volume-title":"Masquerade detection using truncated command lines","author":"R Maxion","year":"2002","unstructured":"Maxion R, Townsend T (2002) Masquerade detection using truncated command lines. In: Proceeding of international conference dependable systems and networks (DSN), Washington, DC, pp\u00a0219\u2013228"},{"key":"505_CR1332","first-page":"38","volume-title":"Data mining methods for detection of new malicious executables","author":"M Schultz","year":"2001","unstructured":"Schultz M, Eskin E, Zadok E, Stolfo S (2001) Data mining methods for detection of new malicious executables. In: Proceeding of IEEE symposium security and privacy, Oakland, pp\u00a038\u201349"},{"key":"505_CR1333","first-page":"144","volume-title":"A fast automaton-based method for detecting anomalous program behaviors","author":"R Sekar","year":"2001","unstructured":"Sekar R, Bendre M, Dhurjati D, Bollinen P (2001) A fast automaton-based method for detecting anomalous program behaviors. In: Proceeding of IEEE symposium security and privacy, Oakland, pp\u00a0144\u2013155"},{"key":"505_CR1334","first-page":"133","volume-title":"Detecting intrusions using system calls: alternative data models","author":"C Warrender","year":"1999","unstructured":"Warrender C, Forrest S, Pearlmutter B (1999) Detecting intrusions using system calls: alternative data models. In: IEEE symposium on security and privacy, Los Alamitos, pp\u00a0133\u2013145"}],"container-title":["Encyclopedia of Machine Learning and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4899-7687-1_505","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T22:48:37Z","timestamp":1591051717000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4899-7687-1_505"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9781489976857","9781489976871"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-1-4899-7687-1_505","relation":{},"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"14 April 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}