{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:29:33Z","timestamp":1725902973558},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319615417"},{"type":"electronic","value":"9783319615424"}],"license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-61542-4_94","type":"book-chapter","created":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T04:02:27Z","timestamp":1499140947000},"page":"929-940","source":"Crossref","is-referenced-by-count":2,"title":["Software Abnormal Behavior Detection Based on Hidden Markov Model"],"prefix":"10.1007","author":[{"given":"Jingling","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Guoxiao","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Tianyu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Baojiang","family":"Cui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"key":"94_CR1","doi-asserted-by":"crossref","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A.: A sense of self for unix processes. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 120\u2013128 (1996)","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"94_CR2","unstructured":"Lee, W., Stolfo, S.J.: Data mining approaches for intrusion detection. In: Usenix security (1998)"},{"key":"94_CR3","doi-asserted-by":"crossref","unstructured":"Wespi, A., Dacier, M., Debar, H.: Intrusion detection using variable-length audit trail patterns. In: International Workshop on Recent Advances in Intrusion Detection, pp. 110\u2013129. Springer, Heidelberg, October 2000","DOI":"10.1007\/3-540-39945-3_8"},{"issue":"4","key":"94_CR4","first-page":"151","volume":"37","author":"F Tao","year":"2010","unstructured":"Tao, F., Yin, Z.Y., Fu, J.M.: Software behavior model based on system calls. Comput. Sci. 37(4), 151\u2013157 (2010)","journal-title":"Comput. Sci."},{"issue":"11","key":"94_CR5","first-page":"2716","volume":"22","author":"JM Fu","year":"2011","unstructured":"Fu, J.M., Tao, F., Wang, D.: Software behavior model based on system objects. Ruanjian Xuebao\/J. Soft. 22(11), 2716\u20132728 (2011)","journal-title":"Ruanjian Xuebao\/J. Soft."},{"key":"94_CR6","doi-asserted-by":"crossref","unstructured":"Wagner, D., Soto, P.: Mimicry attacks on host-based intrusion detection systems. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 255\u2013264 (2002)","DOI":"10.1145\/586110.586145"},{"key":"94_CR7","doi-asserted-by":"crossref","unstructured":"Yap, R.H.: Improving host-based ids with argument abstraction to prevent mimicry attacks. In: International Workshop on Recent Advances in Intrusion Detection. Springer, Heidelberg, pp. 146\u2013164 (2005)","DOI":"10.1007\/11663812_8"},{"key":"94_CR8","doi-asserted-by":"crossref","unstructured":"Warrender, C., Forrest, S., Pearlmutter, B.: Detecting intrusions using system calls: alternative data models. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp. 133\u2013145 (1999)","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"94_CR9","unstructured":"Zhou, X., Peng, Q., Wang, J.: Intrusion detection method based on two-layer HMM. Appl. Res. Comput. 25(3) (2008)"},{"issue":"4","key":"94_CR10","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/j.cose.2004.09.008","volume":"24","author":"S Chebrolu","year":"2005","unstructured":"Chebrolu, S., Abraham, A., Thomas, J.P.: Feature deduction and ensemble design of intrusion detection systems. Comput. Secur. 24(4), 295\u2013307 (2005)","journal-title":"Comput. Secur."},{"key":"94_CR11","first-page":"76","volume":"8","author":"W Shuxia","year":"2015","unstructured":"Shuxia, W.: Network intrusion detection method research under big data environment. Bull. Sci. Technol. 8, 76 (2015)","journal-title":"Bull. Sci. Technol."},{"key":"94_CR12","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.ins.2011.03.014","volume":"231","author":"JY Huang","year":"2013","unstructured":"Huang, J.Y., Liao, I.E., Chung, Y.F., Chen, K.T.: Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining. Inf. Sci. 231, 32\u201344 (2013)","journal-title":"Inf. Sci."},{"key":"94_CR13","unstructured":"Lee, W., Stolfo, S. J., Mok, K.W.: A data mining framework for building intrusion detection models. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp. 120\u2013132 (1999)"}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61542-4_94","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,28]],"date-time":"2019-09-28T07:02:45Z","timestamp":1569654165000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61542-4_94"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"ISBN":["9783319615417","9783319615424"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61542-4_94","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,5]]}}}