{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T05:18:14Z","timestamp":1739423894301,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642040900"},{"type":"electronic","value":"9783642040917"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04091-7_3","type":"book-chapter","created":{"date-parts":[[2009,9,26]],"date-time":"2009-09-26T05:52:07Z","timestamp":1253944327000},"page":"19-27","source":"Crossref","is-referenced-by-count":0,"title":["Clustering of Windows Security Events by Means of Frequent Pattern Mining"],"prefix":"10.1007","author":[{"given":"Rosa","family":"Basagoiti","sequence":"first","affiliation":[]},{"given":"Urko","family":"Zurutuza","sequence":"additional","affiliation":[]},{"given":"Asier","family":"Aztiria","sequence":"additional","affiliation":[]},{"given":"Guzm\u00e1n","family":"Santaf\u00e9","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Reyes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Anderson, J.P.: Computer Security Threat Monitoring and Surveillance. Technical report, Fort Washington (1980)"},{"issue":"2","key":"3_CR2","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"13","author":"D.E. Denning","year":"1987","unstructured":"Denning, D.E.: An Intrusion-Detection Model. IEEE transaction on Software Engineering\u00a013(2), 222\u2013232 (1987)","journal-title":"IEEE transaction on Software Engineering"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Teng, H., Chen, K., Lu, S.: Adaptive real-time anomaly detection using inductively generated sequential patterns. In: Proceedings of 1990 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, California, May 7-9, pp. 278\u2013284 (1990)","DOI":"10.1109\/RISP.1990.63857"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Debar, H., Becker, M., Siboni, D.: A Neural Network Component for an Intrusion DetectionSystem. In: Proceedings, IEEE Symposium on Research in Computer Security and Privacy, pp. 240\u2013250 (1992)","DOI":"10.1109\/RISP.1992.213257"},{"key":"3_CR5","first-page":"268","volume-title":"Proceedings of the 1998 Annual Computer Security Applications Conference (ACSAC 1998)","author":"D. Endler","year":"1998","unstructured":"Endler, D.: Intrusion detection: Applying machine learning to solaris audit data. In: Proceedings of the 1998 Annual Computer Security Applications Conference (ACSAC 1998), Scottsdale, AZ, pp. 268\u2013279. IEEE Computer Society, Los Alamitos (1998)"},{"key":"3_CR6","unstructured":"Lee, W., Stolfo, S.: Data Mining Approaches for Intrusion Detection. In: Proceedings of the Seventh USENIX Security Symposium (SECURITY 1998), San Antonio, TX (January 1998)"},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1145\/322510.322526","volume":"2","author":"T. Lane","year":"1999","unstructured":"Lane, T., Brodley, C.E.: Temporal Sequence Learning and Data Reduction for Anomaly Detection. ACM Transactions on Information and System Security\u00a02, 295\u2013331 (1999)","journal-title":"ACM Transactions on Information and System Security"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Larosa, C., Xiong, L., Mandelberg, K.: Frequent pattern mining for kernel trace data. In: SAC 2008: Proceedings of the 2008 ACM symposium on Applied computing, Brazil, pp. 880\u2013885 (2008)","DOI":"10.1145\/1363686.1363890"},{"key":"3_CR9","unstructured":"Rana, A.Z., Bell, J.: Using event attribute name-value pairs for summarizing log data. In: AusCERT 2007 (2007)"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Vaarandi, R.: Mining Event Logs with SLCT and LogHound. In: Proceedings of the 2008 IEEE\/IFIP Network Operations and Management Symposium, pp. 1071\u20131074 (2008)","DOI":"10.1109\/NOMS.2008.4575281"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Viinikka, J.: Time series modeling for IDS Alert Management. In: ACM ASIAN Symposium on Information (2006)","DOI":"10.1145\/1128817.1128835"},{"issue":"11","key":"3_CR12","doi-asserted-by":"publisher","first-page":"1490","DOI":"10.1109\/TKDE.2005.183","volume":"17","author":"D. Burdick","year":"2005","unstructured":"Burdick, D., Calimlim, M., Gehrke, J.: A maximal frequent itemset algorithm for transactional databases. IEEE Trans. Knowl. Data Eng.\u00a017(11), 1490\u20131504 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"11","key":"3_CR13","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/240455.240464","volume":"39","author":"U. Fayyad","year":"1996","unstructured":"Fayyad, U., Piatetsky-Shapiro, G., Smyth, P.: The KDD process for extracting useful knowledge from volumes of data. Communications of the ACM\u00a039(11), 27\u201334 (1996)","journal-title":"Communications of the ACM"},{"key":"3_CR14","unstructured":"MacQueen, J.B.: Some Methods for classification and Analysis of Multivariate Observations. In: Proceedings of 5th Berkeley Symposium on Mathematical Statistics and Probability, vol.\u00a01, pp. 281\u2013297. University of California Press (1967)"}],"container-title":["Advances in Intelligent and Soft Computing","Computational Intelligence in Security for Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04091-7_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T11:03:35Z","timestamp":1739358215000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04091-7_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642040900","9783642040917"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04091-7_3","relation":{},"ISSN":["1867-5662","1867-5670"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1867-5670"}],"subject":[],"published":{"date-parts":[[2009]]}}}