{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:21:36Z","timestamp":1729628496517,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/saint.2003.1183049","type":"proceedings-article","created":{"date-parts":[[2003,8,27]],"date-time":"2003-08-27T11:38:00Z","timestamp":1061984280000},"page":"200-208","source":"Crossref","is-referenced-by-count":0,"title":["Exploiting pattern relationship for intrusion detection"],"prefix":"10.1109","author":[{"family":"Ning Jiang","sequence":"first","affiliation":[]},{"given":"K.A.","family":"Hua","sequence":"additional","affiliation":[]},{"family":"JungHwan Oh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"259","volume":"1","author":"heikki","year":"1997","journal-title":"Discovery of Frequent Episodes in Event Sequences Data Mining and Knowledge Discovery"},{"key":"ref11","article-title":"Mining sequential patterns: generalizations and performance improvements","author":"srikant","year":"1996","journal-title":"International Conference on Extending Database Technology"},{"key":"ref12","article-title":"An intrusion-detection system based on the Teiresias pattern-Discovery algorithm","author":"wespi","year":"1999","journal-title":"Proc EICO 99"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-39945-3_8","article-title":"Intrusion detection using variable-Length audit trail patterns","author":"wespi","year":"2000","journal-title":"RAID '00 Proc Third Int'l Workshop Recent Advances in Intrusion Detection"},{"key":"ref14","article-title":"Audit trail pattern analysis for detecting suspicious process behavior","author":"wespi","year":"1998","journal-title":"Proceedings of RAID 98 Workshop on Recent Advances in Intrusion Detection"},{"key":"ref15","article-title":"Detecting intrusions using system calls: alternative data models","author":"christina","year":"1999","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"ref4","first-page":"1","article-title":"Fixed vs. variable-Length patterns for detecting suspicious process behavior","author":"debar","year":"1998","journal-title":"Jean-Jacques Quisquater Ynes Deswarte Catherine Meadows and Dieter Gollmann editors Computer Security-ESORICS 98 5th European Symposium on Research in Computer Security LNCS"},{"article-title":"Fundamentals of Algorithms","year":"1996","author":"brassard","key":"ref3"},{"key":"ref6","first-page":"202","article-title":"Self-Nonself discrimination","author":"stephanie","year":"1994","journal-title":"Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy"},{"key":"ref5","first-page":"120","article-title":"A sense of self for Unix processes","author":"stephanie","year":"1996","journal-title":"Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"151","DOI":"10.3233\/JCS-980109","article-title":"Intrusion detection using sequences of system calls","volume":"6","author":"hofmeyr","year":"1998","journal-title":"Journal of Computer Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335372"},{"key":"ref2","article-title":"Approaches to the automatic discovery of patterns in biosequences","author":"brazma","year":"1995","journal-title":"Department of Informatics University of Bergen Norway Tech Report"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.1995.380415"},{"key":"ref9","article-title":"Why 6?&#x201D; Defining the operational limits of stide, an anomaly-Based intrusion detector","author":"kymie","year":"2002","journal-title":"IEEE Symposium on Security and Privacy"}],"event":{"name":"2003 Symposium on Applications and the Internet (SAINT 2003)","acronym":"SAINT-03","location":"Orlando, FL, USA"},"container-title":["2003 Symposium on Applications and the Internet, 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8426\/26546\/01183049.pdf?arnumber=1183049","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,5]],"date-time":"2018-03-05T11:07:15Z","timestamp":1520248035000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1183049\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/saint.2003.1183049","relation":{},"subject":[]}}