{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T05:31:32Z","timestamp":1740547892123,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540220640"},{"type":"electronic","value":"9783540247753"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24775-3_41","type":"book-chapter","created":{"date-parts":[[2010,9,10]],"date-time":"2010-09-10T23:48:20Z","timestamp":1284162500000},"page":"329-340","source":"Crossref","is-referenced-by-count":9,"title":["Using Self-Consistent Naive-Bayes to Detect Masquerades"],"prefix":"10.1007","author":[{"given":"Kwong H.","family":"Yung","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"1","key":"41_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","volume":"39","author":"A.P. Dempster","year":"1977","unstructured":"Dempster, A.P., Laird, N.M., Rubin, D.B.: Maximum likelihood from incomplete data via the EM algorithm. Journal of the Royal Statistical Society, Series B\u00a039(1), 1\u201338 (1977)","journal-title":"Journal of the Royal Statistical Society, Series B"},{"key":"41_CR2","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1093\/biomet\/56.3.463","volume":"56","author":"N.E. Day","year":"1969","unstructured":"Day, N.E.: Estimating the components of a mixture of two normal distributions. Biometrika\u00a056, 463\u2013474 (1969)","journal-title":"Biometrika"},{"key":"41_CR3","unstructured":"DuMouchel, W.: Computer intrusion detection based on Bayes factors for comparing command transition probabilities. Technical Report 91, National Institute of Statistical Sciences, Research Triangle Park, North Carolina 27709-4006 (1999)"},{"key":"41_CR4","unstructured":"DuMouchel, W., Schonlau, M.: A comparison of test statistics for computer intrusion detection based on principal components regression of transition probabilities. In: Proceedings of the 30th Symposium on the Interface: Computing Science and Statistics, vol.\u00a030, pp. 404\u2013413 (1999)"},{"key":"41_CR5","doi-asserted-by":"publisher","first-page":"431","DOI":"10.2307\/1266689","volume":"8","author":"V. Hasselblad","year":"1966","unstructured":"Hasselblad, V.: Estimation of parameters for a mixture of normal distributions. Technometrics\u00a08, 431\u2013444 (1966)","journal-title":"Technometrics"},{"key":"41_CR6","doi-asserted-by":"publisher","first-page":"1459","DOI":"10.2307\/2286083","volume":"64","author":"V. Hasselblad","year":"1969","unstructured":"Hasselblad, V.: Estimation of finite mixtures of distributions from the exponential family. Journal of American Statistical Association\u00a064, 1459\u20131471 (1969)","journal-title":"Journal of American Statistical Association"},{"key":"41_CR7","unstructured":"Ju, W.-H., Vardi, Y.: A hybrid high-order Markov chain model for computer intrusion detection. Technical Report 92, National Institute for Statistical Sciences, Research Triangle Park, North Carolina 27709\u20134006 (1999)"},{"key":"41_CR8","unstructured":"Loeb, V.: Spy case prompts computer search, Washington Post, March 5, p. A01 (2001)"},{"key":"41_CR9","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/DSN.2002.1028903","volume-title":"International Conference on Dependable Systems and Networks (DSN 2002)","author":"R.A. Maxion","year":"2002","unstructured":"Maxion, R.A., Townsend, T.N.: Masquerade Detection Using Truncated Command Lines. In: International Conference on Dependable Systems and Networks (DSN 2002), Washington, DC, June 23-26, pp. 219\u2013228. IEEE Computer Society Press, Los Alamitos (2002)"},{"issue":"2","key":"41_CR10","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1023\/A:1007692713085","volume":"39","author":"K. Nigam","year":"2000","unstructured":"Nigam, K., McCallum, A.K., Thrun, S., Mitchell, T.: Text classification from labeled and unlabeled documents using EM. Machine Learning\u00a039(2), 103\u2013134 (2000)","journal-title":"Machine Learning"},{"issue":"1","key":"41_CR11","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1214\/ss\/998929476","volume":"16","author":"M. Schonlau","year":"2001","unstructured":"Schonlau, M., DuMouchel, W., Ju, W.-H., Karr, A.F., Theus, M., Vardi, Y.: Computer intrusion: detecting masquerades.\u201d. Statistical Science\u00a016(1), 58\u201374 (2001)","journal-title":"Statistical Science"},{"issue":"1-2","key":"41_CR12","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/S0020-0190(00)00122-8","volume":"76","author":"M. Schonlau","year":"2000","unstructured":"Schonlau, M., Theus, M.: Detecting masquerades in intrusion detection based on unpopular commands. Information Processing Letters\u00a076(1-2), 33\u201338 (2000)","journal-title":"Information Processing Letters"},{"key":"41_CR13","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1207\/s15327906mbr0503_6","volume":"5","author":"J.H. Wolfe","year":"1970","unstructured":"Wolfe, J.H.: Pattern clustering by multivariate mixture analysis. Multivariate Behavioral Research\u00a05, 329\u2013350 (1970)","journal-title":"Multivariate Behavioral Research"},{"key":"41_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-540-45203-4_4","volume-title":"Applied Cryptography and Network Security","author":"K.H. Yung","year":"2003","unstructured":"Yung, K.H.: Using feedback to improve masquerade detection. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol.\u00a02846, pp. 48\u201362. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24775-3_41.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T18:04:41Z","timestamp":1740506681000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24775-3_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540220640","9783540247753"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24775-3_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}