{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T08:41:45Z","timestamp":1774687305611,"version":"3.50.1"},"reference-count":10,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2004,2,1]],"date-time":"2004-02-01T00:00:00Z","timestamp":1075593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computational Statistics &amp; Data Analysis"],"published-print":{"date-parts":[[2004,2]]},"DOI":"10.1016\/s0167-9473(03)00115-4","type":"journal-article","created":{"date-parts":[[2003,7,7]],"date-time":"2003-07-07T13:47:57Z","timestamp":1057585677000},"page":"51-67","source":"Crossref","is-referenced-by-count":12,"title":["Statistical anomaly detection via httpd data analysis"],"prefix":"10.1016","volume":"45","author":[{"given":"Daniel Q.","family":"Naiman","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-9473(03)00115-4_BIB1","series-title":"Statistical Language Learning","author":"Charniak","year":"1993"},{"key":"10.1016\/S0167-9473(03)00115-4_BIB2","series-title":"A sense of self for unix processes. Proceedings of the 1996 IEEE Symposium on Security and Privacy","author":"Forrest","year":"1996"},{"key":"10.1016\/S0167-9473(03)00115-4_BIB3","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1145\/360303.360333","article-title":"Protection in operating systems","volume":"19","author":"Harrison","year":"1976","journal-title":"Commun. ACM"},{"key":"10.1016\/S0167-9473(03)00115-4_BIB4","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","article-title":"Intrusion detection using sequences of system calls","volume":"6","author":"Hofmeyr","year":"1998","journal-title":"J. Comput. Security"},{"key":"10.1016\/S0167-9473(03)00115-4_BIB5","series-title":"Speech Recognition and Understanding. Recent Advances, Trends and Applications","first-page":"345","article-title":"Basic methods of probabilistic context free grammars","author":"Jelinek","year":"1992"},{"key":"10.1016\/S0167-9473(03)00115-4_BIB6","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1145\/356850.356852","article-title":"Formal models for computer security","volume":"13","author":"Landwehr","year":"1981","journal-title":"ACM Comput. Surveys"},{"key":"10.1016\/S0167-9473(03)00115-4_BIB7","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1198\/10618600152628194","article-title":"Computing scan statistic p-values using importance sampling with applications to genetics and medical image analysis","volume":"10","author":"Naiman","year":"2001","journal-title":"J. Comput. Graph. Statist."},{"key":"10.1016\/S0167-9473(03)00115-4_BIB8","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/MASSP.1986.1165342","article-title":"An introduction to hidden Markov models","volume":"3","author":"Rabiner","year":"1986","journal-title":"IEEE ASSP Magazine"},{"key":"10.1016\/S0167-9473(03)00115-4_BIB9","doi-asserted-by":"crossref","unstructured":"Sakakibara, Y., Brown, M., Hughey, R., Saira Mian, I., Sj\u00f6lander, K., Underwood, R.C., Haussler, D., 1994. Recent methods for RNA modeling using stochastic context-free grammars. In: M. Crochemore, D. Gusfield (Ed.), Proceedings of the 5th Annual Asilomar Symposium on Combinatorial Pattern Matching, Springer, Berlin, pp. 289\u2013306.","DOI":"10.1007\/3-540-58094-8_25"},{"key":"10.1016\/S0167-9473(03)00115-4_BIB10","unstructured":"Warrander, C., Forrest, S., Pearlmutter, B., 1999. Detecting intrusions using system calls: alternative data models. 1999 IEEE Symposium on Security and Privacy. IEEE Computer Soc. Press, Silver Spring, MD, pp. 133\u2013145."}],"container-title":["Computational Statistics &amp; Data Analysis"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167947303001154?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167947303001154?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T08:29:11Z","timestamp":1552897751000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167947303001154"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,2]]},"references-count":10,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2004,2]]}},"alternative-id":["S0167947303001154"],"URL":"https:\/\/doi.org\/10.1016\/s0167-9473(03)00115-4","relation":{},"ISSN":["0167-9473"],"issn-type":[{"value":"0167-9473","type":"print"}],"subject":[],"published":{"date-parts":[[2004,2]]}}}