{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:56:09Z","timestamp":1725566169335},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540231233"},{"type":"electronic","value":"9783540301431"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30143-1_12","type":"book-chapter","created":{"date-parts":[[2010,9,18]],"date-time":"2010-09-18T23:59:24Z","timestamp":1284854364000},"page":"223-237","source":"Crossref","is-referenced-by-count":34,"title":["Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix"],"prefix":"10.1007","author":[{"given":"Mizuki","family":"Oka","sequence":"first","affiliation":[]},{"given":"Yoshihiro","family":"Oyama","sequence":"additional","affiliation":[]},{"given":"Hirotake","family":"Abe","sequence":"additional","affiliation":[]},{"given":"Kazuhiko","family":"Kato","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1016\/0167-4048(93)90029-5","volume":"12","author":"T.F. Lunt","year":"1993","unstructured":"Lunt, T.F.: A survey of intrusion detection techniques. Computers and Security\u00a012, 405\u2013418 (1993)","journal-title":"Computers and Security"},{"key":"12_CR2","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1109\/3468.935043","volume":"31","author":"N. Ye","year":"2001","unstructured":"Ye, N., Li, X., Chen, Q., Emran, S.M., Xu, M.: Probablistic Techniques for Intrusion Detection Based on Computer Audit Data. IEEE Transactions on Systems Man and Cybernetics, Part A (Systems & Humans)\u00a031, 266\u2013274 (2001)","journal-title":"IEEE Transactions on Systems Man and Cybernetics, Part A (Systems & Humans)"},{"key":"12_CR3","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","volume":"6","author":"S.A. Hofmeyr","year":"1998","unstructured":"Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion Detection using Sequences of System Calls. Journal of Computer Security\u00a06, 151\u2013180 (1998)","journal-title":"Journal of Computer Security"},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1145\/382912.382914","volume":"3","author":"W. Lee","year":"2000","unstructured":"Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security (TISSEC)\u00a03, 227\u2013261 (2000)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Sekar, R., Bendre, M., Bollineni, P.: A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, Oakland, pp. 144\u2013155 (2001)","DOI":"10.1109\/SECPRI.2001.924295"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Wagner, D., Dean, D.: Intrusion Detection via Static Analysis. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, Oakland, pp. 156\u2013168 (2001)","DOI":"10.1109\/SECPRI.2001.924296"},{"key":"12_CR7","unstructured":"Abe, H., Oyama, Y., Oka, M., Kato, K.: Optimization of Intrusion Detection System Based on Static Analyses (in Japanese). IPSJ Transactions on Advanced Computing Systems (2004)"},{"key":"12_CR8","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/52.605929","volume":"14","author":"A.P. Kosoresow","year":"1997","unstructured":"Kosoresow, A.P., Hofmeyr, S.A.: A Shape of Self for UNIX Processes. IEEE Software\u00a014, 35\u201342 (1997)","journal-title":"IEEE Software"},{"key":"12_CR9","unstructured":"DuMouchel, W.: Computer Intrusion Detection Based on Bayes Factors for Comparing Command Transition Probabilities. Technical Report TR91, National Institute of Statistical Sciences, NISS (1999)"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Jha, S., Tan, K.M.C., Maxion, R.A.: Markov Chains, Classifiers and Intrusion Detection. In: Proc. of 14th IEEE Computer Security Foundations Workshop, pp. 206\u2013219 (2001)","DOI":"10.1109\/CSFW.2001.930147"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Warrender, C., Forrest, S., Pearlmutter, B.A.: Detecting Intrusions Using System Calls: Alternative Data Models. In: IEEE Symposium on Security and Privacy, pp. 133\u2013145 (1999)","DOI":"10.1109\/SECPRI.1999.766910"},{"issue":"1","key":"12_CR12","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1214\/ss\/998929476","volume":"16","author":"M. Schonlau","year":"2001","unstructured":"Schonlau, M., DuMouchel, W., Ju, W.H., Karr, A.F., Theus, M., Vardi, Y.: Computer intrusion: Detecting masquerades. Statistical Science\u00a016(1), 58\u201374 (2001)","journal-title":"Statistical Science"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Maxion, R.A., Townsend, T.N.: Masquerade Detection Using Truncated Command Lines. In: Prof. of the International Conference on Dependable Systems and Networks (DSN 2002), pp. 219\u2013228 (2002)","DOI":"10.1109\/DSN.2002.1028903"},{"key":"12_CR14","unstructured":"(Java), \n                    \n                      http:\/\/java.sun.com\/"},{"key":"12_CR15","unstructured":"(Matlab), \n                    \n                      http:\/\/www.mathworks.com\/"}],"container-title":["Lecture Notes in Computer Science","Recent Advances in Intrusion Detection"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30143-1_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:52:21Z","timestamp":1620013941000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30143-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540231233","9783540301431"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30143-1_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}