{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,27]],"date-time":"2025-02-27T05:09:07Z","timestamp":1740632947103,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642163265"},{"type":"electronic","value":"9783642163272"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16327-2_41","type":"book-chapter","created":{"date-parts":[[2010,10,4]],"date-time":"2010-10-04T15:56:44Z","timestamp":1286207804000},"page":"343-351","source":"Crossref","is-referenced-by-count":2,"title":["Proximity User Identification Using Correlogram"],"prefix":"10.1007","author":[{"given":"Shervin","family":"Shahidi","sequence":"first","affiliation":[]},{"given":"Parisa","family":"Mazrooei","sequence":"additional","affiliation":[]},{"given":"Navid Nasr","family":"Esfahani","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Saraee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"41_CR1","doi-asserted-by":"crossref","unstructured":"Skin, E., Lee, W., Stolfo, S.: Modeling system calls for intrusion detection with dynamic window sizes. In: DARPA Information Survivability Conference and Exposition II (DISCEX II), Anaheim, vol.\u00a01, pp. 165\u2013175 (2001)","DOI":"10.1109\/DISCEX.2001.932213"},{"key":"41_CR2","unstructured":"Ye, N.: A markov chain model of temporal behavior for anomaly detection. In: The 2000 IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, pp. 171\u2013174 (2000)"},{"key":"41_CR3","unstructured":"Lane, T., Brodley, C.: Sequence matching and learning in Anomaly Detection for computer security. In: The Fourth National Conference on Artificial Intelligence, pp. 43\u201349 (1997)"},{"key":"41_CR4","doi-asserted-by":"crossref","unstructured":"Warrender, C., Forrest, S., Pearlmutter, B.: Detecting intrusions using system calls: alternative data models. In: 1999 IEEE Symposium on Security and Privacy, pp. 133\u2013145 (1999)","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"41_CR5","unstructured":"Javitz, H., Valdes, A.: The NIDES statistical component: description and justification. Computer Science Laboratory, SRI International, Tech. Report (1993)"},{"key":"41_CR6","unstructured":"Knorr, E., Ng, R.: Algorithms for mining distance-based outliers in large data sets. In: 24th Int. Conf. Very Large Data Bases, VLDB, Technique et Science Informatiques, pp. 392\u2013403 (1998)"},{"key":"41_CR7","unstructured":"Knorr, E., Ng, R.: Finding international knowledge of distance-based outliers. The VLDB Journal, 211\u2013222 (1999)"},{"key":"41_CR8","doi-asserted-by":"crossref","unstructured":"Breunig, V., Kriegel, H., Ng, R., Sander, J.: LOF: identifying density-based local outliers. In: ACM SIGMOD Int. Conf. on Management of Data, pp. 93\u2013104 (2000)","DOI":"10.1145\/342009.335388"},{"key":"41_CR9","unstructured":"Portnoy, L., Eskin, E., Stolfo, S.: Intrusion detection with unlabeled data using clustering. In: ACM CSS Workshop on Data Mining Applied to Security (DMSA 2001), Philadelphia, PA (2001)"},{"key":"41_CR10","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/11425274_5","volume-title":"Foundations of Intelligent Systems","author":"U. Galassi","year":"2005","unstructured":"Galassi, U., Giordana, A., Saitta, L., Botta, M.: Learning Profiles Based on Hirarcical Hidden Markov Model. In: Hacid, M.-S., Murray, N.V., Ra\u015b, Z.W., Tsumoto, S. (eds.) ISMIS 2005. LNCS (LNAI), vol.\u00a03488, pp. 47\u201355. Springer, Heidelberg (2005)"},{"key":"41_CR11","unstructured":"Link, H., Lane, T., Magliano, J.: Models and Model Biases for Automatically Learning Task Switching Behavior. In: Proceedings of the 2005 HCI International (HCII) Conference on Augmented Cognition, HCI International, HCII (2005)"},{"key":"41_CR12","unstructured":"Lee, W., Stolfo, S.: Data mining approaches for intrusion detection. In: 1998 USENIX Security Symposium (1998)"},{"key":"41_CR13","unstructured":"Greenberg, S.: Using Unix: collected traces of 168 users. In: Research Report 88\/333\/45, Includes Tar-Format Cartridge Tape. Department of Computer Science, University of Calgary, Alberta (1998)"}],"container-title":["IFIP Advances in Information and Communication Technology","Intelligent Information Processing V"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16327-2_41.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T05:37:59Z","timestamp":1740548279000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16327-2_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642163265","9783642163272"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16327-2_41","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2010]]}}}