{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:04:44Z","timestamp":1763467484655},"reference-count":24,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[2001,1]]},"DOI":"10.1016\/s0164-1212(00)00076-5","type":"journal-article","created":{"date-parts":[[2003,4,4]],"date-time":"2003-04-04T21:09:52Z","timestamp":1049490592000},"page":"273-286","source":"Crossref","is-referenced-by-count":7,"title":["Anomalous intrusion detection system for hostile Java applets"],"prefix":"10.1016","volume":"55","author":[{"given":"Guy","family":"Helmer","sequence":"first","affiliation":[]},{"given":"Johnny","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Subhasri","family":"Madaka","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0164-1212(00)00076-5_BIB1","unstructured":"Applets, http:\/\/www.javasoft.com\/applets"},{"key":"10.1016\/S0164-1212(00)00076-5_BIB2","doi-asserted-by":"crossref","unstructured":"Bass, T., 2000. Intrusion detection systems and multisensor data fusion: creating cyberspace situational awareness. Communications of the ACM, April","DOI":"10.1145\/332051.332079"},{"key":"10.1016\/S0164-1212(00)00076-5_BIB3","doi-asserted-by":"crossref","unstructured":"Bass, T., Freyre, A., 1998. E-mail bombs and countermeasures: cyber attacks on availability and brand integrity. IEEE Network 12","DOI":"10.1109\/65.681925"},{"key":"10.1016\/S0164-1212(00)00076-5_BIB4","unstructured":"Bass, T., Gruber, D., 1999. A glimpse into the future of ID. The USENIX Association Magazine"},{"key":"10.1016\/S0164-1212(00)00076-5_BIB5","unstructured":"COAST intrusion detection pages, http:\/\/www.cs.purdue.edu\/coast\/intrusion-detection"},{"key":"10.1016\/S0164-1212(00)00076-5_BIB6","doi-asserted-by":"crossref","unstructured":"Cohen, W.W., 1995. Fast effective rule induction. In: Proceedings of the 12th International Conference on Machine Learning. Lake Tahoe, CA","DOI":"10.1016\/B978-1-55860-377-6.50023-2"},{"key":"10.1016\/S0164-1212(00)00076-5_BIB7","unstructured":"FAQ \u2013 Applet Security, http:\/\/www.javasoft.com\/sfaq"},{"key":"10.1016\/S0164-1212(00)00076-5_BIB8","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A. Intrusion detection using sequences of system calls. Journal of Computer Security"},{"key":"10.1016\/S0164-1212(00)00076-5_BIB9","unstructured":"Frank, J., 1994. Artificial intelligence and intrusion detection: current and future directions. In: Proceedings of the 17th National Computer Security Conference"},{"key":"10.1016\/S0164-1212(00)00076-5_BIB10","doi-asserted-by":"crossref","unstructured":"Heady, R., Luger, G., Maccabe, A., Servilla, M., 1990. The architecture of a network level intrusion detection system. Technical report, University of New Mexico","DOI":"10.2172\/425295"},{"key":"10.1016\/S0164-1212(00)00076-5_BIB11","doi-asserted-by":"crossref","unstructured":"Helmer, G.G., Wong, J.S.K., Honavar, V., Miller, L., 1998. Intelligent agents for intrusion detection. In: Proceedings, IEEE Information Technology Conference, Syracuse, NY","DOI":"10.1109\/IT.1998.713396"},{"key":"10.1016\/S0164-1212(00)00076-5_BIB12","unstructured":"Helmer, G.G., Wong, J.S.K., Honavar, V., Miller, L., 1999. Automated discovery of concise predictive rules for intrusion detection. Technical report 99\u201301, Department of Computer Science"},{"key":"10.1016\/S0164-1212(00)00076-5_BIB13","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","article-title":"Intrusion detection using sequences of system calls","volume":"6","author":"Hofmeyr","year":"1998","journal-title":"Journal of Computer Security"},{"key":"10.1016\/S0164-1212(00)00076-5_BIB14","unstructured":"Hostile Applets Home Page, http:\/\/www.rstcorp.com\/hostile-applets\/index.html"},{"key":"10.1016\/S0164-1212(00)00076-5_BIB15","doi-asserted-by":"crossref","unstructured":"Kosoresow, A.P., Hofmeyr, S.A., 1997. Intrusion detection via system call traces. IEEE Software, September\/October","DOI":"10.1109\/52.605929"},{"key":"10.1016\/S0164-1212(00)00076-5_BIB16","unstructured":"Lee, W., Stolfo, S., 1998. Data mining approaches for intrusion detection. Proceedings, 1998 Seventh USENIX Security Symposium"},{"key":"10.1016\/S0164-1212(00)00076-5_BIB17","unstructured":"Lunt, T., Tamaru, A., Gilham, G., Jagannathan, R., Neumann, P., Javitz, H., Valdes, A., Garvey, T., 1992. A real-time intrusion detection system (IDES). Final technical report, Computer Science Laboratory, SRI"},{"key":"10.1016\/S0164-1212(00)00076-5_BIB18","unstructured":"McGraw, G., Felten, E., 1999. Securing Java: getting down to business with mobile code. John Wiley & Sons, Inc, New York"},{"key":"10.1016\/S0164-1212(00)00076-5_BIB19","doi-asserted-by":"crossref","unstructured":"Mukherjee, B., Heberlein, L.T., Levitt, K.N., 1994. Network intrusion detection. IEEE Network","DOI":"10.1109\/65.283931"},{"key":"10.1016\/S0164-1212(00)00076-5_BIB20","unstructured":"NIDES Home Page, http:\/\/www.sdl.sri.com\/nides"},{"key":"10.1016\/S0164-1212(00)00076-5_BIB21","unstructured":"Stephenson, P. Managing intrusions, http:\/\/www.versalink.com\/docs\/intrmgmt.htm"},{"key":"10.1016\/S0164-1212(00)00076-5_BIB22","doi-asserted-by":"crossref","unstructured":"Sundaram, A., 1996. An introduction to intrusion detection. In: Crossroads","DOI":"10.1145\/332159.332161"},{"key":"10.1016\/S0164-1212(00)00076-5_BIB23","unstructured":"The LZW algorithm, http:\/\/www.rasip.fer.hr\/research\/compress\/algorithms\/fund\/lz\/lzw.html"},{"key":"10.1016\/S0164-1212(00)00076-5_BIB24","doi-asserted-by":"crossref","unstructured":"Warrender, C., Forrest, S., Pearlmutter, B., 1999. Detecting intrusions using system calls: alternative data models. In: IEEE Symposium on Security and Privacy, 9\u201312 May 1999","DOI":"10.1109\/SECPRI.1999.766910"}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121200000765?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121200000765?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,17]],"date-time":"2020-01-17T06:55:11Z","timestamp":1579244111000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0164121200000765"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,1]]},"references-count":24,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2001,1]]}},"alternative-id":["S0164121200000765"],"URL":"https:\/\/doi.org\/10.1016\/s0164-1212(00)00076-5","relation":{},"ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"subject":[],"published":{"date-parts":[[2001,1]]}}}