{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:01:57Z","timestamp":1729630917234,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1109\/isi.2011.5984065","type":"proceedings-article","created":{"date-parts":[[2011,8,16]],"date-time":"2011-08-16T19:28:09Z","timestamp":1313522889000},"page":"143-149","source":"Crossref","is-referenced-by-count":0,"title":["Anomaly detection using weak estimators"],"prefix":"10.1109","author":[{"given":"Justin","family":"Zhan","sequence":"first","affiliation":[]},{"given":"B. John","family":"Oommen","sequence":"additional","affiliation":[]},{"given":"Johanna","family":"Crisostomo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"University of New Mexico System Call Datasets","year":"1997","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143874"},{"journal-title":"Stochastic Approximation and Recursive Algorithms and Applications","year":"2003","author":"kushner","key":"13"},{"journal-title":"Learning from delayed rewards","year":"1989","author":"watkins","key":"14"},{"journal-title":"Learning Automata An Introduction","year":"1989","author":"narendra","key":"11"},{"journal-title":"Markov Chains","year":"1999","author":"norris","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127348"},{"key":"2","first-page":"10","article-title":"One class training for masquerade detection","author":"wang","year":"0","journal-title":"ICDM Workshop on Data Mining for Computer Security (DMSEC)"},{"key":"1","doi-asserted-by":"crossref","first-page":"659","DOI":"10.3233\/JCS-2005-13403","article-title":"A comparative evaluation of two algorithms for Windows Registry Anomaly Detection","volume":"13","author":"stolfo","year":"2005","journal-title":"Journal of Computer Security"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2006.277790"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.09.007"},{"key":"6","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1007\/11427995_51","article-title":"Learning classifiers for misuse detection using a bag of system calls representation","volume":"3495","author":"kang","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/WIMOB.2006.1696374"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2006.872256"}],"event":{"name":"2011 IEEE International Conference on Intelligence and Security Informatics (ISI 2011)","start":{"date-parts":[[2011,7,10]]},"location":"Beijing, China","end":{"date-parts":[[2011,7,12]]}},"container-title":["Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5975309\/5983989\/05984065.pdf?arnumber=5984065","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T03:17:07Z","timestamp":1560482227000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5984065\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/isi.2011.5984065","relation":{},"subject":[],"published":{"date-parts":[[2011,7]]}}}