{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:51:36Z","timestamp":1725889896772},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540706199"},{"type":"electronic","value":"9783540706212"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-70621-2_26","type":"book-chapter","created":{"date-parts":[[2008,7,17]],"date-time":"2008-07-17T09:46:52Z","timestamp":1216288012000},"page":"323-332","source":"Crossref","is-referenced-by-count":2,"title":["A Data Mining Approach to Learning Probabilistic User Behavior Models from Database Access Log"],"prefix":"10.1007","author":[{"given":"Mikhail","family":"Petrovskiy","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","volume-title":"Method of Potential Functions in the Theory of Learning Machines","author":"M.A. Aizerman","year":"1970","unstructured":"Aizerman, M.A., Braverman, E.M., Rozonoer, L.I.: Method of Potential Functions in the Theory of Learning Machines. Nauka, Moscow (in Russian) (1970)"},{"issue":"1","key":"26_CR2","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/BF01232474","volume":"4","author":"P. Dan","year":"1995","unstructured":"Dan, P., Yu, S., Chung, J.-Y.: Characterization of database access pattern for analytic prediction of buffer hit probability. VLDB J.\u00a04(1), 127\u2013154 (1995)","journal-title":"VLDB J."},{"doi-asserted-by":"crossref","unstructured":"Debar, H., Becke, M., Siboni, D.: A neural network component for an intrusion detection system. In: IEEE Symp. on Security and Privacy, pp. 240\u2013250 (1992)","key":"26_CR3","DOI":"10.1109\/RISP.1992.213257"},{"unstructured":"Ghosh, A., Schwartzbard, A., Schatz, M.: Learning Program Behavior for Intrusion Detection. In: 11th USENIX Workshop on Intrusion Detection and Network Monitoring, Florida, CA (1999)","key":"26_CR4"},{"key":"26_CR5","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-21606-5","volume-title":"The Elements of Statistical Learning","author":"T. Hastie","year":"2001","unstructured":"Hastie, T.: The Elements of Statistical Learning. Springer, New York (2001)"},{"unstructured":"Lee, W., Stolfo, S.: Data mining approaches for intrusion detection. In: 7th USENIX Security Symposium (SECURITY 1998) (1998)","key":"26_CR6"},{"unstructured":"Liu, B., Hsu, W., Ma, Y.: Integrating classification and association rule mining. In: 4th Int. Conf. on KDD and Data Mining, pp. 80\u201396 (1998)","key":"26_CR7"},{"doi-asserted-by":"crossref","unstructured":"Manavoglu, E., Pavlov, D., Giles, C.: Probabilistic User Behavior Models. In: IEEE Int. Conf. on Data Mining (ICDM-2003), Melbourne, FL (2003)","key":"26_CR8","DOI":"10.1109\/ICDM.2003.1250921"},{"unstructured":"Maxion, R., Roberts, R.: Proper Use of ROC Curves in Intrusion\/Anomaly Detection, Tech. report CS-TR-871, University of Newcastle upon Tyne (2004)","key":"26_CR9"},{"key":"26_CR10","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"G. Piatetsky-Shapiro","year":"1996","unstructured":"Piatetsky-Shapiro, G., Fayyad, U., Smyth, P., Uthurusamy, R.: Advances in Knowledge Discovery and Data Mining. AAAI Press\/MIT Press, Menlo Park (1996)"},{"unstructured":"Quinlan, J.: Generating production rules from decision trees. In: 10th International Joint Conference on Artificial Intelligence, pp. 304\u2013307 (1987)","key":"26_CR11"},{"doi-asserted-by":"crossref","unstructured":"Sarwar, B., Karypis, G., Konstan, J., Riedl, J.: Item-based Collaborative Filtering Recommendation Algorithms. In: 10th International World Wide Web Conference, pp. 285\u2013295 (2001)","key":"26_CR12","DOI":"10.1145\/371920.372071"},{"key":"26_CR13","volume-title":"Data Mining with SQL Server 2005","author":"Z.-H. Tang","year":"2005","unstructured":"Tang, Z.-H., MacLennan, J.: Data Mining with SQL Server 2005. Wiley Publishing, Chichester (2005)"},{"doi-asserted-by":"crossref","unstructured":"Valeur, F., Mutz, D., Vigna, G.: A Learning-Based Approach to the Detection of SQL Attacks. In: IEEE Conf. on Detection of Intrusions and Malware & Vulnerability Assessment, pp. 123\u2013140 (2005)","key":"26_CR14","DOI":"10.1007\/11506881_8"}],"container-title":["Communications in Computer and Information Science","Software and Data Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-70621-2_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T04:24:42Z","timestamp":1620015882000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-70621-2_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540706199","9783540706212"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-70621-2_26","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[]}}