{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T15:08:41Z","timestamp":1764688121797,"version":"3.33.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,15]]},"DOI":"10.1109\/bigdata62323.2024.10825247","type":"proceedings-article","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T18:31:23Z","timestamp":1737052283000},"page":"2645-2652","source":"Crossref","is-referenced-by-count":1,"title":["Efficient Host Intrusion Detection using Hyperdimensional Computing"],"prefix":"10.1109","author":[{"given":"Yujin","family":"Nam","sequence":"first","affiliation":[{"name":"UC San Diego,Dept. of Computer Science and Engineering,USA"}]},{"given":"Rachel","family":"King","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison,Dept. of Computer Sciences,Madison,USA"}]},{"given":"Quinn","family":"Burke","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison,Dept. of Computer Sciences,Madison,USA"}]},{"given":"Minxuan","family":"Zhou","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology,Computer Science Department,Chicago,USA"}]},{"given":"Patrick","family":"McDaniel","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison,Dept. of Computer Sciences,Madison,USA"}]},{"given":"Tajana","family":"Rosing","sequence":"additional","affiliation":[{"name":"UC San Diego,Dept. of Computer Science and Engineering,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3299519"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243829"},{"year":"2021","key":"ref3","article-title":"Matrix Enterprise | MITRE ATT&CK\u00ae"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3539605"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3214304"},{"key":"ref6","first-page":"1031","article-title":"Towards an Open Format for Scalable System Telemetry","volume-title":"2020 IEEE International Conference on Big Data (Big Data)","author":"Taylor"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD56317.2022.00087"},{"volume-title":"Network intrusion detection.","year":"2002","author":"Northcutt","key":"ref8"},{"key":"ref9","first-page":"487","article-title":"{SLEUTH}: Real-time attack scenario reconstruction from {COTS} audit data","volume-title":"26th USENIX Security Symposium","author":"Hossain"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00096"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427255"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA51647.2021.00028"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.23919\/DATE54114.2022.9774533"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3345279"},{"issue":"4","key":"ref15","first-page":"1432","article-title":"A Secured Intrusion Detection System for Mobile as Edge Computing","volume-title":"Applied Sciences","volume":"14","author":"Alsubhi","year":"2024"},{"key":"ref16","first-page":"1","article-title":"Edge-Detect: Edge-centric Network Intrusion Detection using Deep Neural Network","volume-title":"2021 IEEE CCNC.","author":"Singh"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23349"},{"key":"ref18","first-page":"113","article-title":"AIQL: Enabling efficient attack investigation from system monitoring data","volume-title":"2018 USENIX Annual Technical Conference","author":"Gao"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2020.24167","article-title":"You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis","volume-title":"Proceedings 2020 Network and Distributed System Security Symposium","author":"Wang"},{"key":"ref20","first-page":"2345","article-title":"{SIGL}: Securing software installations through deep graph learning","volume-title":"30th USENIX Security Symposium","author":"Han"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.02.005"},{"year":"2024","key":"ref22","article-title":"sysflow-telemetry\/sf-lab"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IEDM19573.2019.8993491"}],"event":{"name":"2024 IEEE International Conference on Big Data (BigData)","start":{"date-parts":[[2024,12,15]]},"location":"Washington, DC, USA","end":{"date-parts":[[2024,12,18]]}},"container-title":["2024 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10824975\/10824942\/10825247.pdf?arnumber=10825247","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T08:23:18Z","timestamp":1737102198000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10825247\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/bigdata62323.2024.10825247","relation":{},"subject":[],"published":{"date-parts":[[2024,12,15]]}}}