{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T21:40:25Z","timestamp":1738359625188,"version":"3.35.0"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540859291"},{"type":"electronic","value":"9783540859307"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-85930-7_63","type":"book-chapter","created":{"date-parts":[[2008,9,5]],"date-time":"2008-09-05T13:11:13Z","timestamp":1220620273000},"page":"495-500","source":"Crossref","is-referenced-by-count":0,"title":["Applying Frequent Episode Algorithm to Masquerade Detection"],"prefix":"10.1007","author":[{"given":"Feng","family":"Yu","sequence":"first","affiliation":[]},{"given":"Min","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"63_CR1","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1214\/ss\/998929476","volume":"16","author":"M. Schonlaum","year":"2001","unstructured":"Schonlaum, M., DuMouchel, W., et al.: Computer Intrusion: Detecting Masquerades. Statistical Science\u00a016(1), 58\u201374 (2001)","journal-title":"Statistical Science"},{"unstructured":"Loeb, V.: Spy Case Prompts Computer Search. Washington Post, (March 5, 2001)","key":"63_CR2"},{"unstructured":"Wang, K., Stolfo, S.J.: One-Class Training for Masquerade Detection. In: 3rd ICDM workshop on data mining for computer security, florida (November 2003)","key":"63_CR3"},{"doi-asserted-by":"crossref","unstructured":"Maxion, R.A., Townsend, T.N.: Masquerade Detection Using Truncated Command Lines. In: Proceedings of the International Conference on Dependable Systems and Networks (DNS 2002), Washington, D.C, June 23-26, pp. 219\u2013228 (2002)","key":"63_CR4","DOI":"10.1109\/DSN.2002.1028903"},{"unstructured":"Maxion, R.A.: Masquerade Detection using enriched command lines. In: International Conference on Dependable Systems and Networks (DNS 2003), San Francisco, CA, USA (June 2003)","key":"63_CR5"},{"unstructured":"Coull, S., Branch, J., Szymanski, B., Breimer, E.: Intrusion Detection: A Bioinformatics Approach. In: 19th Annual Computer Security Applications Conferences, Las Vegas, Nevada, December 8\u201312 (2003)","key":"63_CR6"},{"key":"63_CR7","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.cose.2004.08.007","volume":"24","author":"H.S. Kim","year":"2005","unstructured":"Kim, H.S., Cha, S.D.: Empherical Evaluation of SVM Based Masquerade Detection Using UNIX Commands. Computers and Security\u00a024, 160\u2013168 (2005)","journal-title":"Computers and Security"},{"key":"63_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/11593980_19","volume-title":"Information Systems Security","author":"S.K. Dash","year":"2005","unstructured":"Dash, S.K., Reddy, K.S., Pujari, A.K.: Episode Based Masquerade Detection. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2005. LNCS, vol.\u00a03803, pp. 251\u2013262. Springer, Heidelberg (2005)"},{"unstructured":"Jianxiong, L., Bridges S.M., Vaughn R.B., et al.: Fuzzy Frequent Episodes for Real-time. Intrusion Detection, http:\/\/www.cs.msstate.edu\/bridges\/papers\/fuzzieee\u20132001.pdf","key":"63_CR9"}],"container-title":["Communications in Computer and Information Science","Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85930-7_63","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T21:05:25Z","timestamp":1738357525000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85930-7_63"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540859291","9783540859307"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85930-7_63","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2008]]}}}