{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T06:02:24Z","timestamp":1763704944450,"version":"3.40.4"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2014,4,16]],"date-time":"2014-04-16T00:00:00Z","timestamp":1397606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1007\/s10207-014-0238-9","type":"journal-article","created":{"date-parts":[[2014,4,15]],"date-time":"2014-04-15T18:45:36Z","timestamp":1397587536000},"page":"583-590","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Using instance-weighted naive Bayes for adapting concept drift in masquerade detection"],"prefix":"10.1007","volume":"13","author":[{"given":"Sevil","family":"Sen","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,4,16]]},"reference":[{"key":"238_CR1","unstructured":"Bertaccihini, M., Fierens, PI.: A survey on Masquerader detection approaches. In: Proceedings of Congreso Iberoamericano de Seguridad Informtica, Universidad de la Repblica de Uruguay, pp. 46\u201360 (2008)"},{"key":"238_CR2","unstructured":"Bertaccihini, M., Fierens, PI.: Preliminary results on masquerader information-theoretic detection using compression-based similarity metrics. IElectron. J. SADIO 7(1) (2007)"},{"key":"238_CR3","doi-asserted-by":"crossref","unstructured":"Chen, L., Dong, G.: Masquerader detection using OCLEP: One-class classification using length statistics of emerging patterns. In: Proceedings of the Seventh International Conference on Web-Age Information Management Workshops (2006)","DOI":"10.1109\/WAIMW.2006.19"},{"key":"238_CR4","doi-asserted-by":"crossref","unstructured":"Coull, S.E., Szymanski, B.K.: Sequence alignment for Masquerade detection. Comput. Stat. Data Anal. 52(8), 4116\u20134131 (2008)","DOI":"10.1016\/j.csda.2008.01.022"},{"key":"238_CR5","doi-asserted-by":"crossref","unstructured":"Cummings, A., Lewellen, T., McIntire, D., Moore P., Trzeciak, R.: Insider threat study: Illicit cyber activity involving fraud in the U.S. Financial Services Sector, CERT, Report (2011)","DOI":"10.21236\/ADA610430"},{"key":"238_CR6","unstructured":"Cybersecurity Watch Survey (2011). http:\/\/www.cert.org\/insider_threat\/"},{"key":"238_CR7","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1002\/sec.168","volume":"4","author":"SK Dash","year":"2011","unstructured":"Dash, S.K., Reddy, K.S., Pujari, A.K.: Adaptive Naive Bayes method for masquerade detection. Secur. Commun. Netw. 4, 410\u2013417 (2011)","journal-title":"Secur. Commun. Netw."},{"key":"238_CR8","doi-asserted-by":"crossref","unstructured":"Evans, S., Eiland, E., Markham, S., Impson, J., Laczo, A.: MDLCompress for intrusion detection: Signature inference and masquerade attack. In: Proceedings of Military Communications Conference (2007)","DOI":"10.1109\/MILCOM.2007.4455304"},{"key":"238_CR9","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T Fawcett","year":"2006","unstructured":"Fawcett, T.: An introduction to ROC analysis. Pattern Recognit. Lett. 27, 861\u2013874 (2006)","journal-title":"Pattern Recognit. Lett."},{"key":"238_CR10","doi-asserted-by":"crossref","unstructured":"Garg, A., Rahalkar, R., Upadhyaya, S., Kwiat, K.: Profiling users in GUI based systems for masquerade detection. In: Proceedings of the 2006 IEEE Workshop on Information Assurance, pp. 48\u201354 (2006)","DOI":"10.1109\/IAW.2006.1652076"},{"key":"238_CR11","unstructured":"Greenberg, S.: Using Unix: collected traces of 168 Users. Research report 88\/333\/45, Department of Computer Science, University of Calgary, Calgary, Canada (1998)"},{"key":"238_CR12","doi-asserted-by":"crossref","first-page":"732","DOI":"10.1016\/j.cose.2011.08.003","volume":"30","author":"L Huang","year":"2011","unstructured":"Huang, L., Stamp, M.: Masquerade detection using profile hidden Markov models. Comput. Secur. 30, 732\u2013747 (2011)","journal-title":"Comput. Secur."},{"key":"238_CR13","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/s10844-011-0153-8","volume":"38","author":"L Jiang","year":"2012","unstructured":"Jiang, L.: Learning instance weighted Naive Bayes from labeled and unlabeled data. J. Intell. Inf. Syst. 38, 257\u2013268 (2012)","journal-title":"J. Intell. Inf. Syst."},{"key":"238_CR14","unstructured":"Lane, T., Brodley, CE.: Sequence matching and learning in anomaly detection for computer security. In: Proceedings of AAAI Workshop on AI Approaches to Fraud Detection and Risk Management, pp. 43\u201349 (1997)"},{"key":"238_CR15","doi-asserted-by":"crossref","unstructured":"Latendresse, M.: Masquerade detection via customized grammars. In: Proceedings of 2nd International Conference on Detection of Intrusion and Malware, and Vulnerability Assessment, LNCS, vol. 3548, pp. 141\u2013159 (2005)","DOI":"10.1007\/11506881_9"},{"key":"238_CR16","doi-asserted-by":"crossref","unstructured":"Maxion, R.A., Townsend, T.N.: Masquerade detection using truncated command lines. In: Proceedings of International Conference on Dependable Systems & Networks, pp. 219\u2013228 (2002)","DOI":"10.1109\/DSN.2002.1028903"},{"key":"238_CR17","doi-asserted-by":"crossref","unstructured":"Maxion, R.A.: Masquerade detection using enriched command lines. In: Proceedings of International Conference on Dependable Systems & Networks, pp. 5\u201314 (2003)","DOI":"10.1109\/DSN.2003.1209911"},{"key":"238_CR18","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1109\/TR.2004.824828","volume":"53","author":"RA Maxion","year":"2004","unstructured":"Maxion, R.A., Townsted, T.N.: Masquerade detection augmented with error analysis. IEEE Trans. Reliab. 53, 124\u2013147 (2004)","journal-title":"IEEE Trans. Reliab."},{"key":"238_CR19","unstructured":"McCallum, A., Nigam, K.: A comparison of event models for naive bayes text classification. In: Proceedings of AAAI Workshop on Learning for Text Categorization (1998)"},{"key":"238_CR20","doi-asserted-by":"crossref","unstructured":"Nguyen, N., Reiher, P., Kuenning GH.: Detecting insider threats by monitoring system call activity. In: Proceedings of IEEE Workshop on Information Assurance, pp. 45\u201352 (2003)","DOI":"10.1109\/SMCSIA.2003.1232400"},{"key":"238_CR21","doi-asserted-by":"crossref","unstructured":"Oka, M., Oyama, Y., Abe, H., Kato, K.: Anomaly detection using layered networks based on eigen co-occurrence matrix. In: Proceedings of Seventh International Symposium on Recent Advances in Intrusion Detection, pp. 223\u2013237 (2004)","DOI":"10.1007\/978-3-540-30143-1_12"},{"key":"238_CR22","unstructured":"Oka, M., Oyama, Y., Kato, K.: Eigen co-occurrence matrix method for masquerade detection. In: Publications of the Japan Society for Software Science and Technology (2004)"},{"key":"238_CR23","doi-asserted-by":"crossref","first-page":"2640","DOI":"10.1016\/j.jss.2012.06.014","volume":"85","author":"IS Razo-Zapata","year":"2012","unstructured":"Razo-Zapata, I.S., Mex-Perera, C., Monroy, R.: Masquerade attacks based on user\u2019s profile. J. Syst. Softw. 85, 2640\u20132651 (2012)","journal-title":"J. Syst. Softw."},{"key":"238_CR24","unstructured":"Salem, B.S., Stolfo, S.J.: Detecting masqueraders: A comparison of one-class bag-of-words user behavior modeling techniques. In: Proceedings of 2nd International Workshop on Managing Insider Security Threats, pp. 3\u201313 (2010)"},{"key":"238_CR25","doi-asserted-by":"crossref","unstructured":"Salem, M.B., Stolfo, S.J.: Modeling user search behavior for masquerade detection. In: Proceedings of 14th International Symposium on Recent Advances in Intrusion Detection, pp. 181\u2013200 (2011)","DOI":"10.1007\/978-3-642-23644-0_10"},{"key":"238_CR26","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/978-0-387-77322-3_5","volume":"39","author":"MB Salem","year":"2008","unstructured":"Salem, M.B., Hershkop, S., Stolfo, S.J.: A survey of insider attack detection research. Adv. Inf. Secur. 39, 69\u201390 (2008)","journal-title":"Adv. Inf. Secur."},{"key":"238_CR27","unstructured":"Schonlau Dataset (2001). http:\/\/www.schonlau.net"},{"issue":"1","key":"238_CR28","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1214\/ss\/998929476","volume":"16","author":"M Schonlau","year":"2001","unstructured":"Schonlau, M., DuMoucel, W., Ju, H., Karr, A.F., Theus, M., Vardi, Y.: Computer intrusion: Detecting masqueraders. Stat. Sci. 16(1), 58\u201374 (2001)","journal-title":"Stat. Sci."},{"key":"238_CR29","doi-asserted-by":"crossref","unstructured":"Seo, J., Cha, S.: Masquerade detection based on SVM and sequence-based user commands profile. In: Proceedings of 2nd ACM Symposium on Information, Computer and Communications Security, pp. 398\u2013400 (2007)","DOI":"10.1145\/1229285.1229340"},{"key":"238_CR30","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1016\/j.cose.2011.05.004","volume":"30","author":"JE Tapiador","year":"2011","unstructured":"Tapiador, J.E., Clark, J.A.: Masquerade mimicry attack detection: A randomised approach. Comput. Secur. 30, 297\u2013310 (2011)","journal-title":"Comput. Secur."},{"key":"238_CR31","unstructured":"Tsymbal, A.: The Problem of Concept Drift: Definitions and Related Work. Technical report, TCD-CS-2004-15, Trinity College Dublin (2004)"},{"key":"238_CR32","unstructured":"Wang, K., Stolfo, SJ.: One-class training for masquerade detection. In: Proceedings of 3rd IEEE Workshop on Data Mining for Computer, Security (2003)"},{"key":"238_CR33","doi-asserted-by":"crossref","unstructured":"Yung, K.H.: Using feedback to improve masquerade detection. In: Proceedings of International Conference on Applied Cryptography and Network Security. LNCS, vol. 2846, pp. 48\u201362. Springer, Heidelberg (2003)","DOI":"10.1007\/978-3-540-45203-4_4"},{"key":"238_CR34","doi-asserted-by":"crossref","unstructured":"Yung, K.H.: Using self-consistent Naive-Bayes to detect masquerades. Stanford Electrical and Computer Science Research Journal, pp. 14\u201321 (2004)","DOI":"10.1007\/978-3-540-24775-3_41"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-014-0238-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-014-0238-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-014-0238-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T11:22:28Z","timestamp":1746184948000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-014-0238-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,16]]},"references-count":34,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2014,11]]}},"alternative-id":["238"],"URL":"https:\/\/doi.org\/10.1007\/s10207-014-0238-9","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2014,4,16]]}}}