{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,3,22]],"date-time":"2023-03-22T22:13:04Z","timestamp":1679523184516},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2010,8,12]],"date-time":"2010-08-12T00:00:00Z","timestamp":1281571200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci. China"],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1007\/s11704-010-0570-9","type":"journal-article","created":{"date-parts":[[2010,8,12]],"date-time":"2010-08-12T13:40:21Z","timestamp":1281620421000},"page":"522-528","source":"Crossref","is-referenced-by-count":3,"title":["Network intrusion detection based on system calls and data mining"],"prefix":"10.1007","volume":"4","author":[{"given":"Xinguang","family":"Tian","sequence":"first","affiliation":[]},{"given":"Xueqi","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Miyi","family":"Duan","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xiaojuan","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,8,12]]},"reference":[{"issue":"3","key":"570_CR1","doi-asserted-by":"crossref","first-page":"598","DOI":"10.1016\/S1004-4132(08)60126-7","volume":"19","author":"X. G. Tian","year":"2008","unstructured":"Tian X G, Duan M Y, Sun C L, Li W F. Intrusion detection based on system calls and homogeneous Markov chains. Journal of Systems Engineering and Electronics, 2008, 19(3): 598\u2013605","journal-title":"Journal of Systems Engineering and Electronics"},{"issue":"2","key":"570_CR2","first-page":"231","volume":"17","author":"X. G. Tian","year":"2008","unstructured":"Tian X G, Duan M Y, Li W F, Sun C L. Anomaly detection of user behavior based on shell commands and homogeneous Markov chains. Chinese Journal of Electronics, 2008, 17(2): 231\u2013236","journal-title":"Chinese Journal of Electronics"},{"issue":"2","key":"570_CR3","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/j.jnca.2004.01.003","volume":"28","author":"S. Mukkamala","year":"2005","unstructured":"Mukkamala S, Sung A H, Abraham A. Intrusion detection using an ensemble of intelligent paradigms. Journal of Network and Computer Applications, 2005, 28(2): 167\u2013182","journal-title":"Journal of Network and Computer Applications"},{"issue":"8","key":"570_CR4","first-page":"2086","volume":"87-D","author":"S. H. Oh","year":"2004","unstructured":"Oh S H, Lee W S. A clustering-based anomaly intrusion detector for a host computer. IEICE Transactions on Information and Systems. E (Norwalk, Conn.), 2004, 87-D(8): 2086\u20132094","journal-title":"IEICE Transactions on Information and Systems. E (Norwalk, Conn.)"},{"issue":"13","key":"570_CR5","doi-asserted-by":"crossref","first-page":"663","DOI":"10.1049\/el:20020467","volume":"38","author":"Q. Yan","year":"2002","unstructured":"Yan Q, Xie W X, Yang B, Song G. An anomaly intrusion detection method based on HMM. Electronics Letters, 2002, 38(13): 663\u2013664","journal-title":"Electronics Letters"},{"issue":"1","key":"570_CR6","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1023\/A:1021830128811","volume":"51","author":"T. Lane","year":"2003","unstructured":"Lane T, Brodley C E. An empirical study of two approaches to sequence learning for anomaly detection. Machine Learning, 2003, 51(1): 73\u2013107","journal-title":"Machine Learning"},{"key":"570_CR7","unstructured":"Lee W, Dong X. Information-theoretic measures for anomaly detection. In: Proceedings of the 2001 IEEE Symposium on Security and Privacys, May 2001, Oakland, USA, IEEE Computer Society, 2001: 130\u2013134"},{"issue":"3","key":"570_CR8","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","volume":"6","author":"S. A. Hofmeyr","year":"1999","unstructured":"Hofmeyr S A, Forrest S, Somayaji A. Intrusion detection using sequences of system calls. Journal of Computer Security, 1999, 6(3): 151\u2013180","journal-title":"Journal of Computer Security"},{"issue":"7","key":"570_CR9","doi-asserted-by":"crossref","first-page":"810","DOI":"10.1109\/TC.2002.1017701","volume":"51","author":"N. Ye","year":"2002","unstructured":"Ye N, Emran S M, Chen Q, Vilbert S. Multivariate statistical analysis of audit trails for host-based intrusion detection. IEEE Transactions on Computers, 2002, 51(7): 810\u2013820","journal-title":"IEEE Transactions on Computers"},{"issue":"15","key":"570_CR10","doi-asserted-by":"crossref","first-page":"1356","DOI":"10.1016\/S0140-3664(02)00037-3","volume":"25","author":"T. Verwoerd","year":"2002","unstructured":"Verwoerd T, Hunt R. Intrusion detection techniques and approaches. Computer Communications, 2002, 25(15): 1356\u20131365","journal-title":"Computer Communications"},{"key":"570_CR11","doi-asserted-by":"crossref","unstructured":"Warrender C, Forrest S, Pearlmutter B. Detecting intrusions using system calls: alternative data models. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, May 1999, Berkely, USA, IEEE Computer Society, 1999: 133\u2013145","DOI":"10.1109\/SECPRI.1999.766910"},{"issue":"2","key":"570_CR12","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/S1005-8885(07)60105-8","volume":"13","author":"X. G. Tian","year":"2006","unstructured":"Tian X G, Gao L Z, Sun C L, Duan M Y, Zhang E Y. A method for anomaly detection of user behaviors based on machine learning. The Journal of China Universities of Post and Telecommunications, 2006, 13(2): 61\u201365, 78","journal-title":"The Journal of China Universities of Post and Telecommunications"}],"container-title":["Frontiers of Computer Science in China"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-010-0570-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11704-010-0570-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-010-0570-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T21:01:15Z","timestamp":1559422875000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11704-010-0570-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8,12]]},"references-count":12,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,12]]}},"alternative-id":["570"],"URL":"https:\/\/doi.org\/10.1007\/s11704-010-0570-9","relation":{},"ISSN":["1673-7350","1673-7466"],"issn-type":[{"value":"1673-7350","type":"print"},{"value":"1673-7466","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,8,12]]}}}