{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:18:04Z","timestamp":1740169084881,"version":"3.37.3"},"reference-count":29,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772411","61672026","61602370"],"award-info":[{"award-number":["61772411","61672026","61602370"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"SZSTI","award":["JCYJ20170816100819428"],"award-info":[{"award-number":["JCYJ20170816100819428"]}]},{"name":"Fundamental Research Funds for the Central University"},{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","award":["201706280180"],"award-info":[{"award-number":["201706280180"]}],"id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2882812","type":"journal-article","created":{"date-parts":[[2018,11,22]],"date-time":"2018-11-22T19:37:59Z","timestamp":1542915479000},"page":"73940-73951","source":"Crossref","is-referenced-by-count":3,"title":["Behavior Rhythm: A New Model for Behavior Visualization and Its Application in System Security Management"],"prefix":"10.1109","volume":"6","author":[{"given":"Zhaoli","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xiaohong","family":"Guan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5663-7420","authenticated-orcid":false,"given":"Shancang","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4874-2567","authenticated-orcid":false,"given":"Tao","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Chao","family":"He","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"231","article-title":"Mining invariants from console logs for system problem detection","author":"lou","year":"2010","journal-title":"Proc USENIX Annu Tech Conf"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/INFOCOM.2014.6847986"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1016\/j.procs.2017.05.072"},{"key":"ref13","first-page":"207","article-title":"Building robust temporal user profiles for anomaly detection in file system accesses","author":"mehnaz","year":"2017","journal-title":"Proc 4th Annu Privacy Secur Trust Conf"},{"key":"ref14","first-page":"4","article-title":"Mining console logs for large-scale system problem detection","author":"xu","year":"2008","journal-title":"Proc Workshop Tackling Comput Syst Problems Mach Learn Techn"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/1629575.1629587"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/ICDM.2009.60"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1241","DOI":"10.1109\/TNET.2007.911438","article-title":"Internet traffic behavior profiling for network security monitoring","volume":"16","author":"xu","year":"2008","journal-title":"IEEE\/ACM Trans Netw"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/TNET.2013.2264634"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/j.cose.2013.04.007"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/ACCESS.2018.2843336"},{"year":"2016","journal-title":"Apache Flume","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1049\/iet-net.2017.0188"},{"key":"ref3","first-page":"556","article-title":"Algorithms for non-negative matrix factorization","author":"lee","year":"2001","journal-title":"Proc Adv Neural Inf Process Syst"},{"year":"2016","journal-title":"Apache SPARK","key":"ref6"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"788","DOI":"10.1038\/44565","article-title":"Learning the parts of objects by non-negative matrix factorization","volume":"401","author":"lee","year":"1999","journal-title":"Nature"},{"year":"2016","journal-title":"Apache Hadoop","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/SECPRI.2001.924286"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/MILCOM.2014.53"},{"key":"ref2","first-page":"215","article-title":"PrefixSpan: mining sequential patterns efficiently by prefix-projected pattern growth","author":"pei","year":"2001","journal-title":"Proc Int Conf Data Eng"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/2884781.2884805"},{"key":"ref1","first-page":"226","article-title":"A density-based algorithm for discovering clusters in large spatial databases with noise","author":"ester","year":"1996","journal-title":"Proc Int Conf Knowl Discovery Data Mining"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/JSYST.2014.2350019"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/DSN.2002.1028903"},{"key":"ref21","first-page":"58","article-title":"Computer intrusion: Detecting masquerades","volume":"16","author":"schonlau","year":"2001","journal-title":"Stat Sci"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1016\/j.jnca.2008.04.006"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1002\/sec.168","article-title":"Adaptive naive Bayes method for masquerade detection","volume":"4","author":"dash","year":"2011","journal-title":"Secur Commun Netw"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.17487\/rfc3164"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1016\/j.comcom.2007.10.010"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08543251.pdf?arnumber=8543251","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T13:16:37Z","timestamp":1643289397000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8543251\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2882812","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2018]]}}}