{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:28:43Z","timestamp":1725560923483},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540208273"},{"type":"electronic","value":"9783540245919"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24591-9_8","type":"book-chapter","created":{"date-parts":[[2010,7,29]],"date-time":"2010-07-29T03:36:56Z","timestamp":1280374616000},"page":"97-110","source":"Crossref","is-referenced-by-count":2,"title":["Viterbi Algorithm for Intrusion Type Identification in Anomaly Detection System"],"prefix":"10.1007","author":[{"given":"Ja-Min","family":"Koo","sequence":"first","affiliation":[]},{"given":"Sung-Bae","family":"Cho","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"CERTCC-KR, Korea Computer Emergency Response Team and Coordination Center (2003), \n                    \n                      http:\/\/www.certcc.or.kr"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Vaccaro, H.S., Liepins, G.E.: Detection of anomalous computer session activity. In: Proc. of IEEE Symposium on Research in Security and Privacy, pp. 280\u2013289 (1989)","DOI":"10.1109\/SECPRI.1989.36302"},{"issue":"4","key":"8_CR3","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1016\/0167-4048(93)90029-5","volume":"12","author":"T.F. Lunt","year":"1993","unstructured":"Lunt, T.F.: A survey of intrusion detection techniques. Computers & Security\u00a012(4), 405\u2013418 (1993)","journal-title":"Computers & Security"},{"key":"8_CR4","unstructured":"IDC, Plugging the Holes In eCommerce: The Market for Intrusion Detection and Vulnerability Assessment Software (1999-2003)"},{"key":"8_CR5","unstructured":"Dowel, C., Ramstdet, P.: The computer watch data reduction tool. In: Proc. of the 13th National Computer Security Conference, Washington DC, USA, pp. 99\u2013108 (October 1990)"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Heberlein, T., Dias, G., Levitt, K., Mukherjee, B., Wood, J., Wolber, D.: A network security monitor. In: Proc. of the 1990 IEEE Symposium on Research in Security and Privacy, Los Alamitos, CA, USA, pp. 296\u2013304 (1990)","DOI":"10.1109\/RISP.1990.63859"},{"key":"8_CR7","unstructured":"Stanford-Che, S., Cheung, S., Crawford, R., Dilger, M., Frank, J., Hoagland, J., Levitt, K., Wee, C., Yip, R., Zerkle, D.: GrIDS-A graph based intrusion detection system for large networks. In: Proc. of the 19th National Information Systems Security Conference, vol.\u00a01, pp. 361\u2013370 (October 1998)"},{"key":"8_CR8","unstructured":"Lunt, T.F., Tamaru, A., Gilham, F., Jagannathan, R., Jalali, C., Neuman, P.G.: A realtime intrusion-detection expert system (IDES). Technical Report Project 6784, CSL, SRI International, Computer Science Laboratory, SRI International (February 1992)"},{"key":"8_CR9","unstructured":"Anderson, D., Lunt, T.F., Javits, H., Tamaru, A., Valdes, A.: Detecting unusual program behavior using the statistical components of NIDES. NIDES Technical Report, SRI International (May 1995)"},{"key":"8_CR10","unstructured":"Porras, P.A., Neumann, P.G.: EMERALD: Event monitoring enabling responses to anomalous live disturbances. In: Proc. of the 20th National Information Systems Security Conference, Baltimore, Maryland, USA, October 1997, pp. 353\u2013365 (1997)"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Debar, H., Becker, M., Siboni, D.: A neural network component for an intrusion detection system. In: Proc. of 1992 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, May 1992, pp. 240\u2013250 (1992)","DOI":"10.1109\/RISP.1992.213257"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Warrender, C., Forrest, S., Pearlmutter, B.: Detecting intrusion using calls: Alternative data models. In: Proc. of IEEE Symposium on Security and Privacy, pp. 133\u2013145 (May 1999)","DOI":"10.1109\/SECPRI.1999.766910"},{"issue":"1","key":"8_CR13","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/S0167-4048(03)00112-3","volume":"22","author":"S.-B. Cho","year":"2003","unstructured":"Cho, S.-B., Park, H.-J.: Efficient anomaly detection by modeling privilege flows using hidden Markov model. Computers & Security\u00a022(1), 45\u201355 (2003)","journal-title":"Computers & Security"},{"key":"8_CR14","unstructured":"Larochelle, D., Evans, D.: Statically detecting likely buffer overflow vulnerabilities. In: Proc. of USENIX Security Symposium, pp. 177\u2013190 (August 2001)"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Lau, F., Rubin, S.H., Smith, M.H., Trajkovic, L.: Distributed denial of service attacks. In: IEEE International Conference on Systems, Man and Cybernetics, pp. 2275\u20132280 (2000)","DOI":"10.1109\/ICSMC.2000.886455"},{"key":"8_CR16","unstructured":"Webster, S.E.: The development and analysis of intrusion detection algorithms. S. M. Thesis, Massachusetts Institute of Technology (June 1998)"},{"key":"8_CR17","unstructured":"Axelsson, S.: Research in intrusion detection system: A survey. Chalmers University of Technology (1999)"},{"issue":"2","key":"8_CR18","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"L.R. Rabiner","year":"1989","unstructured":"Rabiner, L.R.: A tutorial on hidden markov models and selected applications in speech recognition. Proc. of IEEE\u00a077(2), 257\u2013286 (1989)","journal-title":"Proc. of IEEE"},{"issue":"1","key":"8_CR19","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MASSP.1986.1165342","volume":"3","author":"L.R. Rabiner","year":"1986","unstructured":"Rabiner, L.R., Juang, B.H.: An introduction to hidden markov models. IEEE ASSP Magazine\u00a03(1), 4\u201316 (1986)","journal-title":"IEEE ASSP Magazine"},{"issue":"30","key":"8_CR20","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1109\/TIT.1972.1054829","volume":"18","author":"G.D. Forney Jr.","year":"1972","unstructured":"Forney Jr., G.D.: Maximum-likelihood sequence detection in the presence of intersymbol interference. IEEE Transactions on Information Theory\u00a018(30), 363\u2013378 (1972)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"3","key":"8_CR21","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1109\/PROC.1973.9030","volume":"61","author":"G.D. Forney Jr.","year":"1973","unstructured":"Forney Jr., G.D.: The viterbi algorithm. Proc. of IEEE\u00a061(3), 268\u2013278 (1973)","journal-title":"Proc. of IEEE"},{"key":"8_CR22","volume-title":"Fundamentals of Speech Recognition","author":"L.R. Rabiner","year":"1993","unstructured":"Rabiner, L.R., Juang, B.H.: Fundamentals of Speech Recognition, ch. 6. Prentice Hall, Englewood Cliffs (1993)"},{"issue":"3","key":"8_CR23","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/53.54527","volume":"7","author":"J. Picone","year":"1990","unstructured":"Picone, J.: Continuous speech recognition using hidden markov models. IEEE ASSP Magazine\u00a07(3), 26\u201341 (1990)","journal-title":"IEEE ASSP Magazine"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24591-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,17]],"date-time":"2019-03-17T10:24:09Z","timestamp":1552818249000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24591-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208273","9783540245919"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24591-9_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}