{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:37:04Z","timestamp":1729625824243,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1109\/grc.2005.1547318","type":"proceedings-article","created":{"date-parts":[[2005,12,10]],"date-time":"2005-12-10T20:49:09Z","timestamp":1134247749000},"page":"387-392 Vol. 2","source":"Crossref","is-referenced-by-count":10,"title":["Kolmogorov complexity based automata modeling for intrusion detection"],"prefix":"10.1109","author":[{"given":"P.","family":"Baliga","sequence":"first","affiliation":[]},{"given":"T.Y.","family":"Lin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"225","article-title":"Rough patterns in data-rough sets and foundation of intrusion detection systems","volume":"18","author":"lin","year":"1993","journal-title":"Journal of Foundation of Computer Science and Decision Support"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"18","first-page":"509","article-title":"Patterns in numerical data: Practical approximations to Kolmogorov complexity","volume":"1711","author":"lin","year":"1999","journal-title":"Lecture Notes in AI Series No 1711"},{"key":"15","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","article-title":"Intrusion detection using sequences of system calls","volume":"6","author":"hoftmeyr","year":"0","journal-title":"Journal of Computer Security"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1109\/RISP.1994.296580"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/SECPRI.2001.924295"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1145\/586143.586146"},{"key":"11","article-title":"Occam's two razors, the sharp and the blunt","author":"domingos","year":"1998","journal-title":"Proc KDD-98"},{"key":"12","first-page":"139","article-title":"Learning stochastic regular grammars by means of a state merging method","author":"carraso","year":"1994","journal-title":"Proceedings of the 2nd International Colloquium on Grammatical Inference Lecture Notes in Artificial Intelligence"},{"key":"21","first-page":"130","article-title":"Information-theoretic measures for anomaly detection","author":"lee","year":"2001","journal-title":"Proceedings of the IEEE Symposium on Security and Privacy"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/52.605929"},{"key":"20","article-title":"Data mining approaches for intrusion detection","author":"lee","year":"1998","journal-title":"USENIX Symposium"},{"key":"2","article-title":"Real and functional analysis","author":"mukheijea","year":"1978","journal-title":"Plenum Press"},{"key":"1","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/3-540-39945-3_7","article-title":"A real-time intrusion detection system on learning program behavior","author":"ghosh","year":"0","journal-title":"Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1007\/978-1-4757-2606-0"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/SECPRI.2001.924296"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"5","article-title":"Two state-based approaches to program-based anomaly detection","author":"michael","year":"2001","journal-title":"Proceedings of the 16th Annual Computer Security Applications Conference"},{"key":"4","first-page":"66","article-title":"Using finite automata to mine execution data for intrusion detection: A preliminary report","author":"michael","year":"0","journal-title":"Proceedings of the Third International Workshop on Recent Advances in Intrusion"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1016\/B978-0-444-88071-0.50009-6"},{"key":"8","first-page":"237","author":"birkhoff","year":"1977","journal-title":"\"A Survey of Modem Algebra \" 4th Ed"}],"event":{"name":"2005 IEEE International Conference on Granular Computing","start":{"date-parts":[[2005,7,27]]},"location":"Beijing, China","end":{"date-parts":[[2005,7,27]]}},"container-title":["2005 IEEE International Conference on Granular Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10381\/33011\/01547318.pdf?arnumber=1547318","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,10]],"date-time":"2019-04-10T06:47:11Z","timestamp":1554878831000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1547318\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/grc.2005.1547318","relation":{},"subject":[],"published":{"date-parts":[[2005]]}}}