{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:07:53Z","timestamp":1773655673423,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642147050","type":"print"},{"value":"9783642147067","type":"electronic"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14706-7_17","type":"book-chapter","created":{"date-parts":[[2010,8,11]],"date-time":"2010-08-11T05:14:43Z","timestamp":1281503683000},"page":"217-228","source":"Crossref","is-referenced-by-count":5,"title":["Intellectual Intrusion Detection with Sequences Alignment Methods"],"prefix":"10.1007","author":[{"given":"Yaroslav A.","family":"Markov","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Maxim O.","family":"Kalinin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"8","key":"17_CR1","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"M.A. Harrison","year":"1976","unstructured":"Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in Operating Systems. Communications of ACM\u00a019(8), 461\u2013471 (1976)","journal-title":"Communications of ACM"},{"issue":"3","key":"17_CR2","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1016\/0022-2836(70)90057-4","volume":"48","author":"S.B. Needleman","year":"1970","unstructured":"Needleman, S.B., Wunsch, C.D.: A general method applicable to the search for similarities in the amino acid sequence of two proteins. Journal of Molecular Biology\u00a048(3), 443\u2013453 (1970)","journal-title":"Journal of Molecular Biology"},{"key":"17_CR3","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/0022-2836(81)90087-5","volume":"147","author":"T.F. Smith","year":"1981","unstructured":"Smith, T.F., Waterman, M.S.: Identification of Common Molecular Subsequences. Journal of Molecular Biology\u00a0147, 195\u2013197 (1981)","journal-title":"Journal of Molecular Biology"},{"key":"17_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-540-39650-5_19","volume-title":"Computer Security \u2013 ESORICS 2003","author":"C. Kruegel","year":"2003","unstructured":"Kruegel, C., Mutz, D., Valeur, F., Vigna, G.: On the Detection of Anomalous System Call Arguments. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol.\u00a02808, pp. 326\u2013343. Springer, Heidelberg (2003)"},{"key":"17_CR5","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1145\/586110.586145","volume-title":"Proceedings of the 9th ACM Conference on Computer and Communications Security","author":"D. Wagner","year":"2002","unstructured":"Wagner, D., Soto, P.: Mimicry attacks on host-based intrusion detection systems. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 255\u2013264. ACM Press, New York (2002)"},{"key":"17_CR6","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1109\/SECPRI.1996.502675","volume-title":"Proceedings of the 1996 IEEE Symposium on Security and Privacy","author":"S. Forrest","year":"1996","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of self for unix processes. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 120\u2013128. IEEE Computer Society Press, Los Alamitos (1996)"},{"key":"17_CR7","unstructured":"Data Mining Approaches for Intrusion Detection, \n                    \n                      http:\/\/www1.cs.columbia.edu\/~sal\/hpapers\/USENIX\/usenix.html"},{"key":"17_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1312","DOI":"10.1007\/978-3-540-24855-2_142","volume-title":"Genetic and Evolutionary Computation \u2013 GECCO 2004","author":"E. Leon","year":"2004","unstructured":"Leon, E., Nasraoui, O., Gomez, J.: Network Intrusion Detection Using Genetic Clustering. In: Deb, K., et al. (eds.) GECCO 2004. LNCS, vol.\u00a03103, pp. 1312\u20131313. Springer, Heidelberg (2004)"},{"key":"17_CR9","unstructured":"Computer Immune Systems, \n                    \n                      http:\/\/www.cs.unm.edu\/~immsec\/systemcalls.htm"},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/CSAC.2003.1254307","volume-title":"Proceedings of 19th Annual Computer Security Applications Conference","author":"S.E. Coull","year":"2003","unstructured":"Coull, S.E., Branch, J.W., Szymanski, B.K., Breimer, E.: Intrusion Detection: A Bioinformatics Approach. In: Proceedings of 19th Annual Computer Security Applications Conference, pp. 24\u201333. IEEE Computer Society, Los Alamitos (2003)"},{"key":"17_CR11","first-page":"964","volume-title":"Proceedings of CSSE","author":"N. Li","year":"2008","unstructured":"Li, N., Xia, C., Yang, Y., Wang, H.: An Algorithm for Generation of Attack Signatures Based on Sequences Alignment. In: Proceedings of CSSE, vol.\u00a03, pp. 964\u2013969. IEEE Computer Society, Los Alamitos (2008)"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14706-7_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T17:11:06Z","timestamp":1558285866000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14706-7_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642147050","9783642147067"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14706-7_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}