{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T03:16:39Z","timestamp":1725938199034},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319736969"},{"type":"electronic","value":"9783319736976"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-73697-6_17","type":"book-chapter","created":{"date-parts":[[2018,1,5]],"date-time":"2018-01-05T02:53:43Z","timestamp":1515120823000},"page":"221-227","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle"],"prefix":"10.1007","author":[{"given":"Wu","family":"Xin","sequence":"first","affiliation":[]},{"given":"Qingni","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Yahui","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Zhonghai","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,6]]},"reference":[{"key":"17_CR1","unstructured":"Hadoop. \nhttps:\/\/hadoop.apache.org\/"},{"issue":"1","key":"17_CR2","first-page":"246","volume":"37","author":"DG Feng","year":"2014","unstructured":"Feng, D.G., Zhang, M., Li, H.: Big data security and privacy protection. Chin. J. Comput. 37(1), 246\u2013258 (2014)","journal-title":"Chin. J. Comput."},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Molloy, I., Park, Y., Chari, S.: Generative models for access control policies: applications to role mining over logs with attribution. In: ACM Symposium on Access Control Models and Technologies, pp. 45\u201356 (2012)","DOI":"10.1145\/2295136.2295145"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Zeng, W., Yang, Y., Luo, B.: Access control for big data using data content. In: IEEE International Conference on Big Data, pp. 45\u201347 (2013)","DOI":"10.1109\/BigData.2013.6691798"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Gupta, C., Sinha, R., Zhang, Y.: Eagle: user profile-based anomaly detection for securing Hadoop clusters. In: IEEE International Conference on Big Data, pp. 1336\u20131343 (2015)","DOI":"10.1109\/BigData.2015.7363892"},{"key":"17_CR6","unstructured":"Eagle. \nhttp:\/\/eagle.apache.org\/"},{"key":"17_CR7","unstructured":"Apache Software Foundation (ASF). \nhttp:\/\/www.apache.org\/"},{"issue":"5","key":"17_CR8","doi-asserted-by":"crossref","first-page":"1063","DOI":"10.1007\/s00778-007-0051-4","volume":"17","author":"A Kamra","year":"2008","unstructured":"Kamra, A., Terzi, E., Bertino, E.: Detecting anomalous access patterns in relational databases. VLDB J. 17(5), 1063\u20131077 (2008)","journal-title":"VLDB J."},{"key":"17_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/11535706_16","volume-title":"Data and Applications Security XIX","author":"A Spalka","year":"2005","unstructured":"Spalka, A., Lehnhardt, J.: A comprehensive approach to anomaly detection in relational databases. In: Jajodia, S., Wijesekera, D. (eds.) DBSec 2005. LNCS, vol. 3654, pp. 207\u2013221. Springer, Heidelberg (2005). \nhttps:\/\/doi.org\/10.1007\/11535706_16"},{"key":"17_CR10","unstructured":"Gaussian Distribution. \nhttps:\/\/en.wikipedia.org\/wiki\/Gaussian_function"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-73697-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,5]],"date-time":"2018-01-05T02:59:34Z","timestamp":1515121174000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-73697-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319736969","9783319736976"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-73697-6_17","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}