{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T19:21:29Z","timestamp":1761765689603,"version":"3.28.0"},"reference-count":64,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/isi.2013.6578848","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T21:11:25Z","timestamp":1377724285000},"page":"301-308","source":"Crossref","is-referenced-by-count":5,"title":["Research towards a systematic signature discovery process"],"prefix":"10.1109","author":[{"given":"Nathan A.","family":"Baker","sequence":"first","affiliation":[]},{"given":"Jonathan L.","family":"Barr","sequence":"additional","affiliation":[]},{"given":"George T.","family":"Bonheyo","sequence":"additional","affiliation":[]},{"given":"Cliff A.","family":"Joslyn","sequence":"additional","affiliation":[]},{"given":"Kannan","family":"Krishnaswami","sequence":"additional","affiliation":[]},{"given":"Mark E.","family":"Oxley","sequence":"additional","affiliation":[]},{"given":"Rich","family":"Quadrel","sequence":"additional","affiliation":[]},{"given":"Landon H.","family":"Sego","sequence":"additional","affiliation":[]},{"given":"Mark F.","family":"Tardiff","sequence":"additional","affiliation":[]},{"given":"Adam S.","family":"Wynne","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","author":"fodor","key":"35"},{"year":"2002","author":"casella","journal-title":"Statistical Inference","key":"36"},{"doi-asserted-by":"publisher","key":"33","DOI":"10.1002\/0471271357"},{"key":"34","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-75969-2","author":"sarkar","year":"2008","journal-title":"Lattice Multivariate Data Visualization with R"},{"doi-asserted-by":"publisher","key":"39","DOI":"10.1080\/01621459.1988.10478639"},{"doi-asserted-by":"publisher","key":"37","DOI":"10.1145\/240455.240464"},{"year":"2001","author":"de boor","journal-title":"A practical Guide to Splines","key":"38"},{"year":"2006","author":"bishop","journal-title":"Pattern Recognition and Machine Learning (Information Science and Statistics)","key":"43"},{"year":"1997","author":"hand","journal-title":"Construction and Assessment of Classification Rules","key":"42"},{"year":"2012","author":"vonesh","journal-title":"Generalized Linear and Nonlinear Models for Correlated Data Theory and Applications Using SAS","key":"41"},{"doi-asserted-by":"publisher","key":"40","DOI":"10.1007\/978-1-4899-3242-6"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1016\/j.chb.2004.02.004"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1177\/104649640103200203"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1177\/1046496406294322"},{"year":"2005","author":"box","journal-title":"Statistics for Experimenters Design Innovation and Discovery","key":"25"},{"doi-asserted-by":"publisher","key":"26","DOI":"10.1007\/b97673"},{"year":"2002","author":"myers","journal-title":"Response Surface Methodology Process and Product Optimization Using Designed Experiments","key":"27"},{"doi-asserted-by":"publisher","key":"28","DOI":"10.2307\/2332195"},{"year":"2001","author":"hastie","journal-title":"The Elements of Statistical Learning Data Mining Inference and Prediction","key":"29"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1016\/j.patrec.2009.09.011"},{"year":"2006","author":"dubitzky","journal-title":"Fundamentals of Data Mining in Genomics and Proteomics","key":"2"},{"key":"1","first-page":"1","article-title":"Low-level multi-INT sensor fusion using entropic measures of dependence","author":"deignan","year":"2011","journal-title":"Information Fusion (FUSION) 2011 Proceedings of the 14th International Conference on"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1093\/jnci\/djk018"},{"year":"1996","author":"hocking","journal-title":"Methods and Applications of Linear Models Regression and the Analysis of Variance","key":"30"},{"key":"6","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1002\/sec.77","article-title":"Syntax, and semantics-based signature database for hybrid intrusion detection systems","volume":"2","author":"barry","year":"2009","journal-title":"Security Comm Networks"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1002\/0470007745"},{"year":"1977","author":"tukey","journal-title":"Exploratory Data Analysis","key":"32"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1049\/iet-syb:20060038"},{"year":"2012","author":"scheaffer","journal-title":"Elementary Survey Sampling","key":"31"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1016\/j.talanta.2010.08.017"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1021\/ac1003568"},{"year":"2011","journal-title":"United States Department of Defense Tech Rep","article-title":"Technology readiness assessment (TRA) guidance","key":"59"},{"doi-asserted-by":"publisher","key":"58","DOI":"10.1109\/ISI.2013.6578856"},{"key":"57","article-title":"Microeconomic Theory: A Mathematical Approach, ser","author":"henderson","year":"1980","journal-title":"ser Handbook in Economics Series"},{"year":"1992","author":"keeney","journal-title":"Value-Focused Thinking A Path to Creative Decision Making","key":"56"},{"key":"19","article-title":"Final report from the nsf innovation and discovery workshop: The scientific basis of individual and team innovation and discovery","author":"schunn","year":"2006","journal-title":"Technical Report to National Science Foundation"},{"doi-asserted-by":"publisher","key":"55","DOI":"10.1017\/CBO9780511921803"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1006\/obhd.2000.2888"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1111\/1467-8616.00154"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1037\/0022-3514.53.3.497"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1016\/j.jesp.2004.05.009"},{"year":"1953","author":"osborn","journal-title":"Applied Imagination Principles and Procedures of Creative Problem Solving","key":"13"},{"key":"14","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1177\/1368430200032003","article-title":"Idea production in nominal and virtual groups: Does computer-mediated communication improve group brainstorming","volume":"3","author":"ziegler","year":"2000","journal-title":"Group Processes & Intergroup Relations"},{"key":"11","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1038\/415530a","article-title":"Gene expression profiling predicts clinical outcome of breast cancer","volume":"415","author":"veer't","year":"2002","journal-title":"Nature"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1207\/s15427633scc0401_5"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1111\/1467-8721.00202"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1287\/mnsc.1090.1144"},{"doi-asserted-by":"publisher","key":"64","DOI":"10.1093\/molbev\/mst010"},{"key":"62","article-title":"A generalized bio-inspired method for discovering sequencebased signatures","author":"peterson","year":"0","journal-title":"Intelligence and Security Informatics IEEE Conf Intelligence and Security Informatics"},{"doi-asserted-by":"publisher","key":"63","DOI":"10.1093\/bioinformatics\/btt013"},{"key":"60","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1016\/j.chroma.2012.10.053","article-title":"Preliminary effects of real-world factors on the recovery and exploitation of forensic impurity profiles of a nerveagent simulant from office media","volume":"1270","author":"fraga","year":"2012","journal-title":"Journal of Chromatography A"},{"doi-asserted-by":"publisher","key":"61","DOI":"10.1021\/ac051437y"},{"doi-asserted-by":"publisher","key":"49","DOI":"10.1155\/2012\/450967"},{"key":"48","article-title":"3D data management: Controlling data volume, velocity, and variety","author":"laney","year":"2001","journal-title":"META Group Stamford CT Tech Rep"},{"key":"45","article-title":"Learning from data: Concepts, theory, and methods (adaptive and learning systems for signal processing","author":"cherkassky","year":"1998","journal-title":"Communications and Control Engineering Series"},{"doi-asserted-by":"publisher","key":"44","DOI":"10.1007\/978-0-387-68282-2"},{"year":"2009","author":"hey","journal-title":"The Fourth Paradigm Data-Intensive Scientific Discovery","key":"47"},{"doi-asserted-by":"publisher","key":"46","DOI":"10.1017\/CBO9780511844409"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1371\/journal.pone.0009749"},{"key":"51","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-4286-2","author":"berger","year":"1985","journal-title":"Statistical Decision Theory and Bayesian Analysis"},{"doi-asserted-by":"publisher","key":"52","DOI":"10.1017\/CBO9780511611308"},{"year":"1976","author":"keeney","journal-title":"Decisions With Multiple Objectives Preferences and Value Tradeoffs","key":"53"},{"doi-asserted-by":"publisher","key":"54","DOI":"10.1016\/j.ipm.2009.03.002"},{"doi-asserted-by":"publisher","key":"50","DOI":"10.1016\/j.forsciint.2012.12.016"}],"event":{"name":"2013 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2013,6,4]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2013,6,7]]}},"container-title":["2013 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6571725\/6578763\/06578848.pdf?arnumber=6578848","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,17]],"date-time":"2024-05-17T11:23:46Z","timestamp":1715945026000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6578848\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":64,"URL":"https:\/\/doi.org\/10.1109\/isi.2013.6578848","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}