{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:12:03Z","timestamp":1725538323309},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642040900"},{"type":"electronic","value":"9783642040917"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04091-7_17","type":"book-chapter","created":{"date-parts":[[2009,9,26]],"date-time":"2009-09-26T05:52:07Z","timestamp":1253944327000},"page":"135-142","source":"Crossref","is-referenced-by-count":0,"title":["Learning Program Behavior for Run-Time Software Assurance"],"prefix":"10.1007","author":[{"given":"Hira","family":"Agrawal","sequence":"first","affiliation":[]},{"given":"Clifford","family":"Behrens","sequence":"additional","affiliation":[]},{"given":"Balakrishnan","family":"Dasarathy","sequence":"additional","affiliation":[]},{"given":"Leslie","family":"Lee Fook","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Asterisk open source digital PBX, \n                    \n                      http:\/\/www.asterisk.org"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Bhatkar, S., Chaturvedi, A., Sekar, R.: Dataflow Anomaly Detection. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 48\u201362 (2006)","DOI":"10.1109\/SP.2006.12"},{"issue":"3","key":"17_CR3","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1145\/287000.287001","volume":"7","author":"J. Cook","year":"1998","unstructured":"Cook, J., Wolf, A.L.: Discovering Models of Software Processes from Event-Based Data. ACM Trans. Software Engineering and Methodology\u00a07(3), 215\u2013249 (1998)","journal-title":"ACM Trans. Software Engineering and Methodology"},{"key":"17_CR4","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1016\/S0019-9958(67)91165-5","volume":"10","author":"E. Gold","year":"1967","unstructured":"Gold, E.: Language identification in the limit. Inf. Control\u00a010, 447\u2013474 (1967)","journal-title":"Inf. Control"},{"key":"17_CR5","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511574931","volume-title":"Algorithms on Strings, Trees, and Sequences: Computer Science and Computational Biology","author":"D. Gusfield","year":"1997","unstructured":"Gusfield, D.: Algorithms on Strings, Trees, and Sequences: Computer Science and Computational Biology. Cambridge University Press, Cambridge (1997)"},{"key":"17_CR6","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","volume":"6","author":"S.A. Hofmeyr","year":"1998","unstructured":"Hofmeyr, S.A., Somayaji, A., Forrest, S.: Intrusion Detection using Sequences of System Calls. Journal of Computer Security\u00a06, 151\u2013180 (1998)","journal-title":"Journal of Computer Security"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Ko, C.: Logic induction of valid behavior specifications for intrusion detection. In: Proc. IEEE Symposium on Security and Privacy (2000)","DOI":"10.1109\/SECPRI.2000.848452"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Lazarevic, A., Ertoz, L., Ozgur, A., Srivastava, J., Kumar, V.: A comparative study of anomaly detection schemes in network intrusion detection. In: SDM (2003)","DOI":"10.1137\/1.9781611972733.3"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Lindqvist, U., Porras, P.A.: eXpert-BSM: A Host-based Intrusion Detection Solution for Sun Solaris. In: Proc.17th Annual Computer Security Applications Conference, pp. 240\u2013251 (2001)","DOI":"10.1109\/ACSAC.2001.991540"},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1016\/0022-2836(70)90057-4","volume":"48","author":"S.B. Needleman","year":"1970","unstructured":"Needleman, S.B., Wunsch, C.D.: A general method applicable to the search for similarities in the amino acid sequence of two proteins. Journal of Molecular Biology\u00a048, 443\u2013453 (1970)","journal-title":"Journal of Molecular Biology"},{"key":"17_CR11","unstructured":"Tandon, G., Chan, P.: Learning Rules from System Call Arguments and Sequences for Anomaly Detection. In: Workshop on Data Mining for Computer Security, pp. 20\u201329 (2003)"},{"key":"17_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/978-3-540-45215-7_17","volume-title":"Computer Network Security","author":"K. Wee","year":"2003","unstructured":"Wee, K., Moon, B.: Automatic generation of finite state automata for detecting intrusions using system call sequences. In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. LNCS, vol.\u00a02776, pp. 206\u2013216. Springer, Heidelberg (2003)"}],"container-title":["Advances in Intelligent and Soft Computing","Computational Intelligence in Security for Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04091-7_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T10:56:46Z","timestamp":1619780206000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04091-7_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642040900","9783642040917"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04091-7_17","relation":{},"ISSN":["1867-5662","1867-5670"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1867-5670"}],"subject":[],"published":{"date-parts":[[2009]]}}}