{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:22:55Z","timestamp":1729664575028,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/cmpsac.2004.1342825","type":"proceedings-article","created":{"date-parts":[[2004,11,8]],"date-time":"2004-11-08T16:28:24Z","timestamp":1099931304000},"page":"180-185","source":"Crossref","is-referenced-by-count":0,"title":["Application of maximum entropy principle to software failure prediction"],"prefix":"10.1109","author":[{"family":"Wu Ji","sequence":"first","affiliation":[]},{"family":"Yang Hai-yan","sequence":"additional","affiliation":[]},{"family":"Jia Xiao-xia","sequence":"additional","affiliation":[]},{"family":"Liu Chang","sequence":"additional","affiliation":[]},{"family":"Liu Chao","sequence":"additional","affiliation":[]},{"family":"Jin Mao-zhong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"15","DOI":"10.1007\/BFb0080116"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1016\/S0019-9958(67)91040-6"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.2307\/2333344"},{"key":"11","article-title":"SMART failure prediction method now being endorsed for SCSI disk drives","volume":"43","author":"nass","year":"1995","journal-title":"Electronic Design"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1145\/586143.586146"},{"key":"3","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1109\/DISCEX.2001.932213","article-title":"Modeling system calls for intrusion detection with dynamic window sizes","author":"eskin","year":"2001","journal-title":"Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEXII'01)"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/ISSRE.2003.1251035"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/AERO.2000.878756"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/HICSS.1999.772984"},{"key":"7","article-title":"Perils of software reliability modeling","author":"horgan","year":"1995","journal-title":"Technical Report"},{"key":"6","first-page":"202","article-title":"Bayesian approaches to failure prediction for disk drives","author":"hamerly","year":"2001","journal-title":"Proc 7th Int Conf Machine Learning"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1007\/BF03023004"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/TSE.1985.232177"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/ICSM.2002.1167828"},{"key":"8","article-title":"Data mining approaches for intrusion detection","author":"lee","year":"1998","journal-title":"Proceedings 7th USENIX Security Symposium"}],"event":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","location":"Hong Kong"},"container-title":["Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9304\/29570\/01342825.pdf?arnumber=1342825","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T11:37:50Z","timestamp":1497613070000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1342825\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/cmpsac.2004.1342825","relation":{},"subject":[]}}