{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:49:33Z","timestamp":1729637373220,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/cyber.2003.1253494","type":"proceedings-article","created":{"date-parts":[[2004,5,13]],"date-time":"2004-05-13T14:43:37Z","timestamp":1084459417000},"page":"486-493","source":"Crossref","is-referenced-by-count":4,"title":["Utilizing statistical characteristics of N-grams for intrusion detection"],"prefix":"10.1109","author":[{"family":"Li Zhuowei","sequence":"first","affiliation":[]},{"given":"A.","family":"Das","sequence":"additional","affiliation":[]},{"given":"S.","family":"Nandi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/366173.366197"},{"key":"ref3","article-title":"Data mining approaches for intrusion detection","author":"lee","year":"1998","journal-title":"Proceedings of the 7th USENIX Security Symposium"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/306549.306577"},{"journal-title":"Computer security issues&trends 2002 CSI\/FBI computer crime and security survey","year":"2002","author":"power","key":"ref6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSN.2000.857599"},{"key":"ref12","first-page":"171","article-title":"A markov chain model of temporal behavior for anomaly detection","author":"ye","year":"2000","journal-title":"Proceedings of the 2000 IEEE Systems Man and Cybernetics Information Assurance and Security Workshop 2000"},{"key":"ref8","article-title":"A bayesian paradigm for designing network intrusion systems","author":"scott","year":"2002","journal-title":"Computational Statistics and Data Analysis (special issue on network intrusion detection)"},{"key":"ref7","article-title":"A bayesian classification model for real-time intrusion detection","author":"puttini","year":"2002","journal-title":"22nd International Workshop on Bayesian Inference and Maximum Entropy Methods in Science and Engineering MAXENT"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","article-title":"Intrusion detection using sequences of system calls","volume":"6","author":"hofmeyr","year":"1998","journal-title":"Journal of Computer Security"},{"key":"ref9","first-page":"144","article-title":"A fast automaton-based method for detecting anomalous program behaviors","author":"sekar","year":"2000","journal-title":"Proceedings of the 2000 IEEE Symposium on Security and Privacy"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502675"}],"event":{"name":"2003 International Conference on Cyberworlds","acronym":"CW-03","location":"Singapore"},"container-title":["Proceedings. 2003 International Conference on Cyberworlds"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8879\/28043\/01253494.pdf?arnumber=1253494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,17]],"date-time":"2018-05-17T16:06:30Z","timestamp":1526573190000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1253494\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/cyber.2003.1253494","relation":{},"subject":[]}}