{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T02:51:30Z","timestamp":1761706290094,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/dsn.2012.6263961","type":"proceedings-article","created":{"date-parts":[[2012,8,16]],"date-time":"2012-08-16T16:04:08Z","timestamp":1345133048000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["Safeguarding academic accounts and resources with the University Credential Abuse Auditing System"],"prefix":"10.1109","author":[{"family":"Jing Zhang","sequence":"first","affiliation":[]},{"given":"Robin","family":"Berthier","sequence":"additional","affiliation":[]},{"given":"Will","family":"Rhee","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Bailey","sequence":"additional","affiliation":[]},{"given":"Partha","family":"Pal","sequence":"additional","affiliation":[]},{"given":"Farnam","family":"Jahanian","sequence":"additional","affiliation":[]},{"given":"William H.","family":"Sanders","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Aberrant behavior detection in time series for network monitoring","author":"brutlag","year":"2000","journal-title":"Proc of the 14th Systems Administration Conference (LISA 2000)"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1145\/1557019.1557153"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1109\/TSMCB.2003.817026"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1145\/1269880.1269886"},{"key":"18","article-title":"One class support vector machines for detecting anomalous windows registry accesses","author":"heller","year":"2003","journal-title":"Proc of the Workshop on Data Mining for Computer Security"},{"key":"15","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1023\/A:1009740009307","article-title":"Visual data mining: Recognizing telephone calling fraud","volume":"1","author":"cox","year":"1997","journal-title":"Data Mining and Knowledge Discovery"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1145\/1007730.1007738"},{"key":"13","first-page":"916","article-title":"Novel questionnaire-responded transaction approach with SVM for credit card fraud detection","volume":"2","author":"chen","year":"2005","journal-title":"Proc of the 2nd International Conference on Advances in Neural Networks"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1109\/ICDM.2005.22"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/CIFER.1997.618940"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1016\/j.inffus.2008.04.001"},{"key":"21","first-page":"1","author":"antonakakis","year":"2011","journal-title":"Detecting Malware Domains at the Upper DNS Hierarchy"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1145\/1653662.1653738"},{"key":"20","article-title":"Large-scale automatic classification of phishing pages","author":"whittaker","year":"2010","journal-title":"Proc of 17th Annual Network and Distributed System Security Symposium"},{"year":"2010","journal-title":"Phishing Activity Trends Report","key":"2"},{"year":"2009","journal-title":"Data-stealing Malware on the Rise Solutions to Keep Businesses and Consumers Safe","key":"1"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/NSS.2010.56"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1093\/acprof:oso\/9780195329452.001.0001"},{"year":"0","journal-title":"Weka 3 - Data Mining with Open Source Machine Learning Software","key":"6"},{"key":"5","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1214\/ss\/1042727940","article-title":"Statistical fraud detection: A review","volume":"17","author":"bolton","year":"2002","journal-title":"Statistical Science"},{"year":"2011","author":"young","journal-title":"Academic Publisher Steps Up Efforts to Stop Piracy of its Online Products","key":"4"},{"key":"9","article-title":"Towards street-level client-independent IP geolocation","author":"wang","year":"2011","journal-title":"Proc of the 8th USENIX Symposium on Networked Systems Design and Implementation"},{"year":"2011","key":"8"}],"event":{"name":"2012 42nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","start":{"date-parts":[[2012,6,25]]},"location":"Boston, MA, USA","end":{"date-parts":[[2012,6,28]]}},"container-title":["IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2012)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6253623\/6263904\/06263961.pdf?arnumber=6263961","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T18:56:17Z","timestamp":1497984977000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6263961\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/dsn.2012.6263961","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}