{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:53:22Z","timestamp":1725562402378},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540221258"},{"type":"electronic","value":"9783540259527"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-25952-7_40","type":"book-chapter","created":{"date-parts":[[2010,8,8]],"date-time":"2010-08-08T20:17:37Z","timestamp":1281298657000},"page":"492-500","source":"Crossref","is-referenced-by-count":17,"title":["Semantic Analysis for Monitoring Insider Threats"],"prefix":"10.1007","author":[{"given":"Svetlana","family":"Symonenko","sequence":"first","affiliation":[]},{"given":"Elizabeth D.","family":"Liddy","sequence":"additional","affiliation":[]},{"given":"Ozgur","family":"Yilmazel","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Del Zoppo","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Brown","sequence":"additional","affiliation":[]},{"given":"Matt","family":"Downey","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"volume-title":"Intelligence and Security Informatics: First NSF\/NIJ Symposium. Proceedings of First NSF\/NIJ Symposium","year":"2003","key":"40_CR1","unstructured":"Chen, A.H., Miranda, R., Zeng, D.D., Demchak, C., Schroeder, J., Madhusudan, T. (eds.): Intelligence and Security Informatics: First NSF\/NIJ Symposium. Proceedings of First NSF\/NIJ Symposium, Tucson. Springer, Heidelberg (2003)"},{"key":"40_CR2","unstructured":"Allan, J., Lavrenko, V., Malin, D., Swan, R.: Detections, Bounds, and Timelines: UMass and TDT-3 (2000), http:\/\/citeseer.nj.nec.com\/455856.html"},{"key":"40_CR3","volume-title":"Computer Security Threat Monitoring and Surveillance","author":"J. Anderson","year":"1980","unstructured":"Anderson, J.: Computer Security Threat Monitoring and Surveillance. James P. Anderson Co., Fort Washington (April 15, 1980)"},{"key":"40_CR4","unstructured":"Anderson, R.: Research and Development Initiatives Focused on Preventing, Detecting, and Responding to Insider Misuse of Critical Defense Information Systems: Results of a Three-Day Workshop (1999), http:\/\/www.rand.org\/publications\/CF\/CF151\/CF151.pdf"},{"key":"40_CR5","unstructured":"Berkhin, P.: Survey Of Clustering Data Mining Techniques (2000), http:\/\/citeseer.nj.nec.com\/berkhin02survey.html"},{"key":"40_CR6","doi-asserted-by":"crossref","unstructured":"Burgoon, J., Blair, J., Qin, T., Nunamaker Jr., J.: Detecting Deception Through Linguistic Analysis. Presented at First NSF\/NIJ Symposium on Intelligence and Security Informatics, Tucson, AZ (2003)","DOI":"10.1007\/3-540-44853-5_7"},{"key":"40_CR7","unstructured":"Hotho, A., Staab, S., Stumme, G.: Text clustering based on background knowledge (2003), http:\/\/citeseer.nj.nec.com\/hotho03text.html"},{"key":"40_CR8","unstructured":"Lawrence, R.H., Bauer, R.K.: AINT misbehaving: A taxonomy of anti-intrusion techniques (2000), http:\/\/www.sans.org\/resources\/idfaq\/aint.php"},{"key":"40_CR9","volume-title":"Encyclopedia of Library and Information Science","author":"E.D. Liddy","year":"2003","unstructured":"Liddy, E.D.: Natural Language Processing. In: Encyclopedia of Library and Information Science, 2nd edn., Marcel Decker, Inc., New York (2003)","edition":"2"},{"key":"40_CR10","unstructured":"Liddy, E.D.: Scenario Based Question-Answer Systems. In: Presented at AQUAINT 2003 PI Meeting (2003), http:\/\/cnlp.org\/presentations\/present.asp?show=conference"},{"key":"40_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/3-540-44853-5_3","volume-title":"Intelligence and Security Informatics","author":"F. Patman","year":"2003","unstructured":"Patman, F., Thompson, P.: A New Frontier in Text Mining. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol.\u00a02665, pp. 27\u201338. Springer, Heidelberg (2003)"},{"key":"40_CR12","doi-asserted-by":"crossref","unstructured":"Raskin, V., Hempelmann, C., Triezenberg, K., Nirenburg, S.: Ontology in Information Security: a Useful Theoretical Foundation and Methodological Tool. Presented at 2001 Workshop on New Security Paradigms, pp. 53\u201359 (2001)","DOI":"10.1145\/508171.508180"},{"key":"40_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/3-540-44853-5_29","volume-title":"Intelligence and Security Informatics","author":"D.V. Sreenath","year":"2003","unstructured":"Sreenath, D.V., Grosky, W.I., Fotouhi, F.: Emergent Semantics from Users\u2019 Browsing Paths. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol.\u00a02665, pp. 355\u2013357. Springer, Heidelberg (2003)"},{"key":"40_CR14","unstructured":"Steinbach, M., Karypis, G., Kumar, V.: A comparison of document clustering techniques (2000), http:\/\/citeseer.nj.nec.com\/steinbach00comparison.html"},{"key":"40_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/3-540-44853-5_6","volume-title":"Intelligence and Security Informatics","author":"S. Stolfo","year":"2003","unstructured":"Stolfo, S., Hershkop, S., Wang, K., Nimeskern, O., Hu, C.: Behavior Profiling of Email. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol.\u00a02665, pp. 74\u201390. Springer, Heidelberg (2003)"},{"key":"40_CR16","doi-asserted-by":"crossref","unstructured":"Upadhyaya, S., Chinchani, R., K., K.: An Analytical Framework for Reasoning About Intrusions. Presented at 20th IEEE Symposium on Reliable Distributed Systems, pp. 99\u2013108 (2001)","DOI":"10.1109\/RELDIS.2001.969760"},{"key":"40_CR17","doi-asserted-by":"publisher","first-page":"236","DOI":"10.2307\/2282967","volume":"58","author":"J.H. Ward Jr.","year":"1963","unstructured":"Ward Jr., J.H.: Hierarchical grouping to optimize an objective function. Journal of the American Statistical Association\u00a058, 236\u2013244 (1963)","journal-title":"Journal of the American Statistical Association"},{"key":"40_CR18","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Karypis, G.: Evaluation of Hierarchical Clustering Algorithms for Document Datasets (2002), http:\/\/citeseer.nj.nec.com\/zhao02evaluation.html","DOI":"10.1145\/584792.584877"},{"key":"40_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/3-540-44853-5_5","volume-title":"Intelligence and Security Informatics","author":"R. Zheng","year":"2003","unstructured":"Zheng, R., Yi, O., Zan, H., Hsinchun, C.: Authorship Analysis in Cybercrime Investigation. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol.\u00a02665, pp. 59\u201373. Springer, Heidelberg (2003)"},{"key":"40_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/3-540-44853-5_8","volume-title":"Intelligence and Security Informatics","author":"L. Zhou","year":"2003","unstructured":"Zhou, L., Burgoon, J.K., Twitchell, D.P.: A Longitudinal Analysis of Language Behavior of Deception in E-mail. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol.\u00a02665, pp. 102\u2013110. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-25952-7_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T08:54:49Z","timestamp":1559379289000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-25952-7_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540221258","9783540259527"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-25952-7_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}