{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T02:46:04Z","timestamp":1725763564568},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642452031"},{"type":"electronic","value":"9783642452048"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-45204-8_12","type":"book-chapter","created":{"date-parts":[[2013,12,11]],"date-time":"2013-12-11T07:04:25Z","timestamp":1386745465000},"page":"163-168","source":"Crossref","is-referenced-by-count":2,"title":["Monitoring for Slow Suspicious Activities Using a Target Centric Approach"],"prefix":"10.1007","author":[{"given":"Harsha K.","family":"Kalutarage","sequence":"first","affiliation":[]},{"given":"Siraj A.","family":"Shaikh","sequence":"additional","affiliation":[]},{"given":"Qin","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Anne E.","family":"James","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"(CSIEM): Cisco security information event management deployment guide (August 2013), \n                  \n                    http:\/\/www.cisco.com"},{"issue":"1","key":"12_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/00401706.1969.10490657","volume":"11","author":"R.E. Grubbs","year":"1969","unstructured":"Grubbs, R.E.: Procedures for Detecting Outlying Observations in Samples. Technometrics\u00a011(1), 1\u201321 (1969)","journal-title":"Technometrics"},{"issue":"3","key":"12_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V. Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Comput. Surv.\u00a041(3), 15:1\u201315:58 (2009)","journal-title":"ACM Comput. Surv."},{"key":"12_CR4","unstructured":"Kalutarage, H.K., Shaikh, S.A., Zhou, Q., James, A.E.: Sensing for suspicion at scale: A bayesian approach for cyber conflict attribution and reasoning. In: 4th International Conference on Cyber Conflict (CYCON), pp. 1\u201319 (2012)"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Siaterlis, C., Maglaris, B.: Towards multisensor data fusion for dos detection. In: ACM Symposium on Applied Computing, pp. 439\u2013446 (2004)","DOI":"10.1145\/967900.967992"},{"key":"12_CR6","unstructured":"Whyte, D., van Oorschot, P.C., Kranakis, E.: Exposure maps: removing reliance on attribution during scan detection. In: Proceedings of the 1st USENIX Workshop on Hot Topics in Security, HOTSEC 2006. USENIX Association (2006)"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-642-38631-2_10","volume-title":"Network and System Security","author":"H.K. Kalutarage","year":"2013","unstructured":"Kalutarage, H.K., Shaikh, S.A., Zhou, Q., James, A.E.: Tracing sources of anonymous slow suspicious activities. In: Lopez, J., Huang, X., Sandhu, R. (eds.) NSS 2013. LNCS, vol.\u00a07873, pp. 122\u2013134. Springer, Heidelberg (2013)"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Vokorokos, L., Chovanec, M., L\u00e1tka, O., Kleinova, A.: Security of distributed intrusion detection system based on multisensor fusion. In: 6th International Symposium on Applied Machine Intelligence and Informatics, pp. 19\u201324 (2008)","DOI":"10.1109\/SAMI.2008.4469175"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Patcha, A., Park, J.M.: An overview of anomaly detection techniques: Existing solutions and latest technological trends. In: Computer Networks. Elsevier (2007)","DOI":"10.1016\/j.comnet.2007.02.001"},{"key":"12_CR10","unstructured":"Kumar, S., Spafford, E.H.: An application of pattern matching in intrusion detection. In: Technical Report CSDTR-94-013 Purdue University, IN, USA (1994)"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Computing Surveys\u00a041 (2009)","DOI":"10.1145\/1541880.1541882"},{"issue":"3","key":"12_CR12","first-page":"226","volume":"3","author":"M.H. Bhuyan","year":"2012","unstructured":"Bhuyan, M.H., Bhattacharyya, D., Kalita, J.K.: Survey on incremental approaches for network anomaly detection. International Journal of Communication Networks and Information Security\u00a03(3), 226\u2013239 (2012)","journal-title":"International Journal of Communication Networks and Information Security"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-45204-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,25]],"date-time":"2019-05-25T11:15:23Z","timestamp":1558782923000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-45204-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642452031","9783642452048"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-45204-8_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}