{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:44:12Z","timestamp":1725515052716},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540691365"},{"type":"electronic","value":"9783540693048"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-69304-8_21","type":"book-chapter","created":{"date-parts":[[2008,6,9]],"date-time":"2008-06-09T01:47:18Z","timestamp":1212976038000},"page":"205-216","source":"Crossref","is-referenced-by-count":0,"title":["Locality-Based Server Profiling for Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Robert","family":"Lee","sequence":"first","affiliation":[]},{"given":"Sheau-Dong","family":"Lang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1109\/ISPAN.2005.56","volume-title":"Proc. 8th International Symposium on Parallel Architectures, Algorithms and Networks","author":"M. Zhou","year":"2005","unstructured":"Zhou, M., Lee, R., Lang, S.-D.: Locality-Based Profile Analysis for Secondary Intrusion Detection. In: Proc. 8th International Symposium on Parallel Architectures, Algorithms and Networks, pp. 166\u2013173. IEEE Computer Society Press, Washington (2005)"},{"key":"21_CR2","volume-title":"ACM New Security Paradigms Workshop","author":"J. McHugh","year":"2004","unstructured":"McHugh, J., Gates, C.: Locality: a New Paradigm for Thinking About Normal Behavior and Outsider Threat. In: ACM New Security Paradigms Workshop. ACM Press, New York (2004)"},{"key":"21_CR3","volume-title":"Proc. 1st IEEE International Workshop on Information Assurance","author":"V. Berk","year":"2003","unstructured":"Berk, V., Bakos, G.: Designing a Framework for Active Worm Detection on Global Networks. In: Proc. 1st IEEE International Workshop on Information Assurance. IEEE Computer Society Press, Washington (2003)"},{"key":"21_CR4","unstructured":"Hofmeyr, S.: An Immunological Model of Distributed Detection and Its Application to Computer Science Security. Ph.D. dissertation, Dept. of Computer Science, Univ. of New Mexico (1999)"},{"key":"21_CR5","volume-title":"18th Annual Computer Security Applications Conference","author":"M. Williamson","year":"2002","unstructured":"Williamson, M.: Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code. In: 18th Annual Computer Security Applications Conference. IEEE Computer Society Press, Washington (2002)"},{"key":"21_CR6","unstructured":"Cui, W., Katz, R.H., Tan, W.: BINDER: An extrusion-based break-in detector for personal computers. Technical report, Hewlett-Packard Laboratories, Palo Alto, CA (2004)"},{"key":"21_CR7","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/DSN.2006.6","volume-title":"Proc. International Conference on Dependable Systems and Networks","author":"V. Sekar","year":"2006","unstructured":"Sekar, V., Xie, Y., Reiter, M.K., Zhang, H.: A multi-resolution approach for worm detection and containment. In: Proc. International Conference on Dependable Systems and Networks, pp. 189\u2013198. IEEE Computer Society Press, Washington (2006)"},{"key":"21_CR8","unstructured":"Sekar, V., Xie, Y., Reiter, M.K., Zhang, H.: Is host-based anomaly detection + temporal correlation = worm causality? Technical report, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA (2007)"},{"key":"21_CR9","unstructured":"Wireshark Network Protocol Analyzer, \n                      \n                        http:\/\/www.wireshark.org\/"},{"key":"21_CR10","unstructured":"Nmap Network Security Scanner, \n                      \n                        http:\/\/nmap.org\/"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69304-8_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,2]],"date-time":"2019-03-02T03:07:25Z","timestamp":1551496045000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69304-8_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540691365","9783540693048"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69304-8_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}