{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T17:40:18Z","timestamp":1777398018849,"version":"3.51.4"},"reference-count":18,"publisher":"Elsevier BV","issue":"5","license":[{"start":{"date-parts":[[2002,10,1]],"date-time":"2002-10-01T00:00:00Z","timestamp":1033430400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[2002,10]]},"DOI":"10.1016\/s0167-4048(02)00514-x","type":"journal-article","created":{"date-parts":[[2002,9,17]],"date-time":"2002-09-17T16:34:42Z","timestamp":1032280482000},"page":"439-448","source":"Crossref","is-referenced-by-count":638,"title":["Use of K-Nearest Neighbor classifier for intrusion detection"],"prefix":"10.1016","volume":"21","author":[{"given":"Yihua","family":"Liao","sequence":"first","affiliation":[]},{"given":"V.Rao","family":"Vemuri","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(02)00514-X_BIB1","doi-asserted-by":"crossref","unstructured":"S. Axelsson, \u201cIntrusion Detection Systems: A Survey and Taxonomy\u201d, http:\/\/citeseer.nj.nec.com\/axelsson00intrusion.html, 2000.","DOI":"10.1145\/357830.357849"},{"key":"10.1016\/S0167-4048(02)00514-X_BIB2","unstructured":"V. N. P. Dao and V. R. Vemuri, \u201cComputer Network Intrusion Detection: A Comparison of Neural Networks Methods\u201d, Differential Equations and Dynamical Systems, (Special Issue on Neural Networks, Part-2), vol.10, No. 1&2, 2002."},{"key":"10.1016\/S0167-4048(02)00514-X_BIB3","doi-asserted-by":"crossref","unstructured":"S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Logstaff, \u201cA Sense of Self for Unix process\u201d, Proceedings of 1996 IEEE Symposium on Computer Security and Privacy, 120\u2013128, 1996.","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"10.1016\/S0167-4048(02)00514-X_BIB4","doi-asserted-by":"crossref","unstructured":"S. Forrest, S. A. Hofmeyr and A. Somayaji, \u201cComputer Immunology\u201d, Communications of the ACM, Vol. 40, 88\u201396, 1997.","DOI":"10.1145\/262793.262811"},{"key":"10.1016\/S0167-4048(02)00514-X_BIB5","unstructured":"W. Lee, S. J. Stolfo and P. K. Chan, \u201cLearning Patterns from Unix Process Execution Traces for Intrusion Detection\u201d, Proceedings of AAAI97 Workshop on AI Methods in Fraud and Risk Management, 50\u201356, 1997."},{"key":"10.1016\/S0167-4048(02)00514-X_BIB6","doi-asserted-by":"crossref","unstructured":"C. Warrender, S. Forrest and B. Pearlmutter, \u201cDetecting Intrusions Using System Calls: Alternative Data Models\u201d, Proceedings of 1999 IEEE Symposium on Security and Privacy, 133\u2013145, 1999.","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"10.1016\/S0167-4048(02)00514-X_BIB7","unstructured":"A. K. Ghosh, A. Schwartzbard and A. M. Shatz, \u201cLearning Program Behavior Profiles for Intrusion Detection\u201d, Proceedings of 1st USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, April 1999."},{"key":"10.1016\/S0167-4048(02)00514-X_BIB8","doi-asserted-by":"crossref","unstructured":"Y. Yang, \u201cExpert Network: Effective and Efficient Learning from Human Decisions in Text Categorization and Retrieval\u201d, Proceedings of 17th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR\u201994), 13\u201322, 1994.","DOI":"10.1007\/978-1-4471-2099-5_2"},{"key":"10.1016\/S0167-4048(02)00514-X_BIB9","doi-asserted-by":"crossref","unstructured":"C. Ko, G. Fink and K. Levitt, \u201cAutomated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring\u201d, Proceedings of 10th Annual Computer Security Applications Conference, Orlando, FL, Dec, 134\u2013144, 1994.","DOI":"10.1109\/CSAC.1994.367313"},{"key":"10.1016\/S0167-4048(02)00514-X_BIB10","unstructured":"M. Asaka, T. Onabuta, T. Inoue, S. Okazawa and S. Goto, \u201cA New Intrusion Detection Method Based on Discriminant Analysis\u201d, IEEE TRANS. INF. & SYST., Vol. E84-D, No. 5, 570\u2013577, 2001."},{"key":"10.1016\/S0167-4048(02)00514-X_BIB11","doi-asserted-by":"crossref","unstructured":"N. Ye, X. Li, Q. Chen S. M. Emran and M. Xu, \u201cProbabilistic Techniques for Intrusion Detection Based on Computer Audit Data\u201d, IEEE Trans. SMC-A, Vol. 31, No. 4, 266\u2013274, 2001.","DOI":"10.1109\/3468.935043"},{"key":"10.1016\/S0167-4048(02)00514-X_BIB12","unstructured":"K. Aas and L. Eikvil, Text Categorisation: A Survey, http:\/\/citeseer.nj.nec.com\/aas99text.html, 1999."},{"key":"10.1016\/S0167-4048(02)00514-X_BIB13","unstructured":"MIT Lincoln Laboratory, http:\/\/www.ll.mit.edu\/IST\/ideval\/."},{"key":"10.1016\/S0167-4048(02)00514-X_BIB14","unstructured":"Sun Microsystems, SunShield Basic Security Module Guide, 1995."},{"key":"10.1016\/S0167-4048(02)00514-X_BIB15","doi-asserted-by":"crossref","unstructured":"R. Lippmann, D. Fried, I. Graf, J. Haines, K. Kendall, D. McClung, D. Webber, S. Webster, D. Wyschograd, R. Cunninghan and M. Zissan, \u201cEvaluating Intrusion Detection Systems: the 1998 DARPA off-line Intrusion Detection Evaluation\u201d, Proceedings of the DARPA Information Survivability Conference and Exposition, IEEE Computer SocietyPress, Los Alamitos, CA, 12\u201326, 2000.","DOI":"10.1109\/DISCEX.2000.821506"},{"key":"10.1016\/S0167-4048(02)00514-X_BIB16","unstructured":"K. Kendall, \u201cA Database of Computer Attacks for the Evaluation of Intrusion Detection Systems\u201d, Master\u2019s Thesis, Massachusetts Institute of Technology, 1998."},{"key":"10.1016\/S0167-4048(02)00514-X_BIB17","unstructured":"J. T.-Y. Kwok, \u201cAutomatic Text Categorization Using Support Vector Machine\u201d, Proceedings of International Conference on Neural Information Processing, 347\u2013351, 1998."},{"key":"10.1016\/S0167-4048(02)00514-X_BIB18","doi-asserted-by":"crossref","unstructured":"M. Damashek, \u201cGauging Similarity with n-Grams: Language-Independent Categorization of Text\u201d, Science, Vol. 267, 843\u2013848, Feb. 1995.","DOI":"10.1126\/science.267.5199.843"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S016740480200514X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S016740480200514X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T00:06:13Z","timestamp":1733789173000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S016740480200514X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,10]]},"references-count":18,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2002,10]]}},"alternative-id":["S016740480200514X"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(02)00514-x","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2002,10]]}}}