{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:52:01Z","timestamp":1729637521836,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/isi.2013.6578784","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T17:11:25Z","timestamp":1377709885000},"page":"45-49","source":"Crossref","is-referenced-by-count":1,"title":["Dynamic information-theoretic measures for security informatics"],"prefix":"10.1109","author":[{"given":"Richard","family":"Colbaugh","sequence":"first","affiliation":[]},{"given":"Kristin","family":"Glass","sequence":"additional","affiliation":[]},{"given":"Travis","family":"Bauer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Use of transfer entropy to infer relationships from behavior","author":"bauer","year":"2012","journal-title":"Proc CSIIRW '12"},{"year":"0","key":"22"},{"key":"17","article-title":"Information-theoretic measures for security informatics","author":"colbaugh","year":"2012","journal-title":"Talk at Homo Collectivus Sandia National Laboratories"},{"key":"23","article-title":"New malicious code detection using variable length n-grams","author":"krishna","year":"2006","journal-title":"Information System Security LNCS 4332"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-84858-7","author":"hastie","year":"2009","journal-title":"The Elements of Statistical Learning"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.85.461"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.103.238701"},{"key":"13","doi-asserted-by":"crossref","first-page":"571","DOI":"10.3390\/e14030571","article-title":"Benefit-cost analysis of security systems for multiple protected assets based upon information entropy","volume":"14","author":"dai","year":"2012","journal-title":"Entropy"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3124-8"},{"journal-title":"Foundations of Statistical Natural Language Processing","year":"1999","author":"manning","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.09.007"},{"journal-title":"Personal communication","year":"2012","author":"anderson","key":"21"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-011-0152-x"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1186\/2190-8532-1-3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1186\/2190-8532-1-18"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935845"},{"journal-title":"Cryptography Information Theory and Error-Correction","year":"2005","author":"bruen","key":"10"},{"journal-title":"Proc 2011 IEEE International Conference on Intelligence and Security Informatics","year":"2011","key":"7"},{"journal-title":"Proc 2010 IEEE International Conference on Intelligence and Security Informatics","year":"2010","key":"6"},{"journal-title":"Elements of Information Theory","year":"2006","author":"cover","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1002\/0471789542"},{"journal-title":"Introduction to Cryptography","year":"2002","author":"washington","key":"9"},{"journal-title":"Proc 2012 IEEE International Conference on Intelligence and Security Informatics","year":"2012","key":"8"}],"event":{"name":"2013 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2013,6,4]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2013,6,7]]}},"container-title":["2013 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6571725\/6578763\/06578784.pdf?arnumber=6578784","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T16:53:16Z","timestamp":1498063996000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6578784\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/isi.2013.6578784","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}