{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:44:54Z","timestamp":1742388294879,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icdm.2002.1184017","type":"proceedings-article","created":{"date-parts":[[2003,6,26]],"date-time":"2003-06-26T11:35:00Z","timestamp":1056627300000},"page":"637-640","source":"Crossref","is-referenced-by-count":4,"title":["Considering both intra-pattern and inter-pattern anomalies for intrusion detection"],"prefix":"10.1109","author":[{"family":"Ning Jiang","sequence":"first","affiliation":[]},{"given":"K.A.","family":"Hua","sequence":"additional","affiliation":[]},{"given":"S.","family":"Sheu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","article-title":"Intrusion detection using sequences of system calls","volume":"6","author":"steven","year":"1998","journal-title":"Journal of Computer Security"},{"key":"ref3","first-page":"202","article-title":"Self-nonself discrimination","author":"stephanie","year":"1994","journal-title":"Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy"},{"key":"ref10","article-title":"Detecting intrusions using system calls: alternative data models","author":"christina","year":"1999","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"ref6","article-title":"Mining sequential patterns: generalizations and performance improvements","author":"ramakrishnan","year":"1996","journal-title":"International Conference on Extending Database Technology"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1023\/A:1009748302351","article-title":"Discovery of frequent episodes in event sequences","volume":"1","author":"heikki","year":"1997","journal-title":"Data Mining and Knowledge Discovery"},{"key":"ref8","article-title":"Intrusion detection using variable-length audit trail patterns","author":"andreas","year":"2000","journal-title":"RAID '00 Proc Third Int'l Workshop Recent Advances in Intrusion Detection"},{"key":"ref7","article-title":"An intrusion-detection system based on the Teiresias pattem-discovery algorithm","author":"andreas","year":"1999","journal-title":"Proc EICO 99"},{"key":"ref2","first-page":"120","article-title":"A sense of self for Unix processes","author":"stephanie","year":"1996","journal-title":"Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy"},{"key":"ref9","article-title":"Audit trail pattern analysis for detecting suspicious process behavior","author":"wespi","year":"1998","journal-title":"Proceedings of RAID 98 Workshop on Recent Advances in Intrusion Detection"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.1995.380415"}],"event":{"name":"2002 IEEE International Conference on Data Mining. ICDM 2002","acronym":"ICDM-02","location":"Maebashi City, Japan"},"container-title":["2002 IEEE International Conference on Data Mining, 2002. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8435\/26564\/01184017.pdf?arnumber=1184017","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,24]],"date-time":"2018-02-24T20:02:11Z","timestamp":1519502531000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1184017\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/icdm.2002.1184017","relation":{},"subject":[]}}