{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:28:59Z","timestamp":1725902939809},"publisher-location":"Cham","reference-count":8,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319615417"},{"type":"electronic","value":"9783319615424"}],"license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-61542-4_44","type":"book-chapter","created":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T08:02:27Z","timestamp":1499155347000},"page":"467-470","source":"Crossref","is-referenced-by-count":0,"title":["Suspicious User Detection Based on File Server Usage Features"],"prefix":"10.1007","author":[{"given":"Ryuichi","family":"Ohori","sequence":"first","affiliation":[]},{"given":"Satoru","family":"Torii","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"key":"44_CR1","doi-asserted-by":"crossref","unstructured":"Breunig, M.M., et al.: LOF: identifying density-based local outliers. ACM Sigmod Rec. 29(2), 93\u2013104 (2000). ACM","DOI":"10.1145\/335191.335388"},{"key":"44_CR2","unstructured":"Calandrino, J.A., McKinney, S.J., Sheldon, F.T.: Detection of undesirable insider behavior. In: Third Annual Cyber Security and Information Infrastructure Research Workshop. Oak Ridge National Laboratory, Oak Ridge, Tennessee, USA, pp. 294\u2013308 (2007)"},{"key":"44_CR3","unstructured":"D Language Foundation: D Programming Language 2.073. 1999\u20132016. http:\/\/dlang.org\/"},{"key":"44_CR4","doi-asserted-by":"crossref","unstructured":"Dempster, A.P., Laird, N.M., Rubin, D.B.: Maximum likelihood from incomplete data via the EM algorithm. J. R. Stat. Soc. Ser. B (Methodological) 39(1), 1\u201338 (1977). ISSN 00359246","DOI":"10.1111\/j.2517-6161.1977.tb01600.x"},{"key":"44_CR5","unstructured":"Fraley, C., et al.: mclust 5.2. 1999\u20132016. https:\/\/cran.r-project.org\/package=mclust"},{"key":"44_CR6","unstructured":"Ponemon Institute, LLC (2015) Cost of Cyber Crime Study: Global. http:\/\/www.cnmeonline.com\/myresources\/hpe\/docs\/HPE_SIEM_Analyst_Report_-_2015_Cost_of_Cyber_Crime_Study_-_Global.pdf"},{"key":"44_CR7","unstructured":"Preferred Infrastructure, Inc. maf 0.2. 2013\u20132014. https:\/\/github.com\/pfi\/maf"},{"key":"44_CR8","unstructured":"R development core team. R 3.2.2. 1996\u20132016. https:\/\/www.r-project.org\/"}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61542-4_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,28]],"date-time":"2019-09-28T10:55:42Z","timestamp":1569668142000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61542-4_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"ISBN":["9783319615417","9783319615424"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61542-4_44","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,5]]}}}