{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T16:58:09Z","timestamp":1725641889924},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642272448"},{"type":"electronic","value":"9783642272455"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-27245-5_35","type":"book-chapter","created":{"date-parts":[[2011,12,9]],"date-time":"2011-12-09T14:37:08Z","timestamp":1323441428000},"page":"295-304","source":"Crossref","is-referenced-by-count":1,"title":["Command and Block Profiles for Legitimate Users of a Computer Network"],"prefix":"10.1007","author":[{"given":"Anna M.","family":"Bartkowiak","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","unstructured":"Schonlau, M.: Masquerading used data, web page, http:\/\/www.schonlau.net"},{"key":"35_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1214\/ss\/998929472","volume":"16","author":"M. Schonlau","year":"2001","unstructured":"Schonlau, M., et al.: Computer intrusion: detecting masquerades. Statistical Science\u00a016, 1\u201317 (2001)","journal-title":"Statistical Science"},{"key":"35_CR3","first-page":"061","volume":"3","author":"A.M. Bartkowiak","year":"2011","unstructured":"Bartkowiak, A.M.: Anomaly, novelty, one-class classification: a comprehensive introduction. International Journal of Computer Systems and Industrial Management Applications\u00a03, 061\u2013071 (2011), http:\/\/www.mirlabs.net\/ijcisim\/index.html","journal-title":"International Journal of Computer Systems and Industrial Management Applications"},{"key":"35_CR4","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.cose.2004.08.007","volume":"24","author":"H.-S. Kim","year":"2005","unstructured":"Kim, H.-S., Cha, S.-S.: Empirical evaluation of SVM-based masquerade detection using UNIX command. Computers & Security\u00a024, 160\u2013168 (2005)","journal-title":"Computers & Security"},{"key":"35_CR5","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.jnca.2008.04.006","volume":"32","author":"X. Guan","year":"2009","unstructured":"Guan, X., Wang, W., Zhang, X.: Fast intrusion detection based on non-negative matrix factorization model. J. of Network and Computer Applications\u00a032, 31\u201344 (2009)","journal-title":"J. of Network and Computer Applications"},{"key":"35_CR6","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.comcom.2007.10.010","volume":"31","author":"W. Wang","year":"2008","unstructured":"Wang, W., Guan, X., Zhang, X.: Processing of massive audit data streams for real-time anomaly intrusion detection. Computer Communications\u00a031, 58\u201372 (2008)","journal-title":"Computer Communications"},{"key":"35_CR7","unstructured":"DiGesu, V., LoBosco, G., Friedman, J.H.: Intruders pattern identification, pp. 1\u20134. IEEE (2008) 978-1-4244-2175-6\/08 \u00a92008"},{"key":"35_CR8","first-page":"31","volume":"13","author":"A.S. Sodiya","year":"2011","unstructured":"Sodiya, A.S., Folorunso, O., Onashoga, S.A., Ogunderu, O.P.: An improved semi-global alignement algorithm for masquerade detection. Int. J. for Network Security\u00a013, 31\u201340 (2011)","journal-title":"Int. J. for Network Security"},{"issue":"1","key":"35_CR9","first-page":"31","volume":"7","author":"M. Bertacchini","year":"2007","unstructured":"Bertacchini, M., Fierens, P.I.: Preliminary results on masquerader detection using compression based similarity metrics. Electronic Journal of SADIO\u00a07(1), 31\u201342 (2007), http:\/\/www.dc.uba.ar\/sadio\/ejs","journal-title":"Electronic Journal of SADIO"},{"key":"35_CR10","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1007\/11925231_59","volume-title":"MICAI 2006: Advances in Artificial Intelligence","author":"R. Posadas","year":"2006","unstructured":"Posadas, R., Mex-Perera, C., Monroy, R., Nolazco-Flores, J.: Hybrid Method for Detecting Masqueraders Using Session Folding and Hidden Markov Models. In: Gelbukh, A., Reyes-Garcia, C.A. (eds.) MICAI 2006. LNCS (LNAI), vol.\u00a04293, pp. 622\u2013631. Springer, Heidelberg (2006)"},{"key":"35_CR11","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-0-387-77322-3_5","volume-title":"Insider Attack and Cyber Security: Beyond the Hacker","author":"M.B. Salem","year":"2008","unstructured":"Salem, M.B., Hershkop, S., Stolfo, S.J.: A survey of insider attack detection research. In: Insider Attack and Cyber Security: Beyond the Hacker, pp. 69\u201390. Springer, Heidelberg (2008)"},{"issue":"1","key":"35_CR12","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1504\/IJBM.2010.030413","volume":"2","author":"A. Bartkowiak","year":"2010","unstructured":"Bartkowiak, A.: Outliers in biometrical data: what\u2019s old, what\u2019s new. Int. J. of Biometrics\u00a02(1), 2\u201318 (2010)","journal-title":"Int. J. of Biometrics"},{"key":"35_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-97610-0","volume-title":"Self-organising maps","author":"T. Kohonen","year":"1995","unstructured":"Kohonen, T.: Self-organising maps. Springer, Heidelberg (1995)"},{"key":"35_CR14","unstructured":"Vesanto, J., Himberg, J., Alhoniemi, E., Parhankangas, J.: SOM Toolbox for Matlab 5. Som Toolbox team, Helsinki University of Technology, Finland, Libella Oy, Espoo, 1\u201354 (2000), http:\/\/www.cis.hut.fi\/projects\/somtoolbox\/"}],"container-title":["Communications in Computer and Information Science","Computer Information Systems \u2013 Analysis and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27245-5_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,19]],"date-time":"2021-12-19T15:25:17Z","timestamp":1639927517000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27245-5_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642272448","9783642272455"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27245-5_35","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}