{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T18:28:16Z","timestamp":1772303296648,"version":"3.50.1"},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/wcins.2010.5541790","type":"proceedings-article","created":{"date-parts":[[2010,8,10]],"date-time":"2010-08-10T15:51:40Z","timestamp":1281455500000},"page":"312-315","source":"Crossref","is-referenced-by-count":5,"title":["A novel hidden Markov model for detecting complicate network attacks"],"prefix":"10.1109","author":[{"family":"Shi Zhicai","sequence":"first","affiliation":[]},{"family":"Xia Yongxiang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00112-3"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"ref6","first-page":"145","article-title":"Using hidden Markov models to evaluate the risks of intrusions","author":"ames","year":"2006","journal-title":"Proc Symp Recent Advances in Intrusion Detection (RAID'04)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/11556992_38"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.109"},{"key":"ref7","first-page":"131","article-title":"Approach to forecasting multi&#x2013;step attack based on HMM","volume":"34","author":"song\u2013hong","year":"2008","journal-title":"Computer Engineering"},{"key":"ref2","article-title":"Machine learning techniques for the computer security domain of anomaly detection","volume":"8","author":"terran","year":"2000","journal-title":"Purdue Univ"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/11893295_21"}],"event":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS)","location":"Beijing, China","start":{"date-parts":[[2010,6,25]]},"end":{"date-parts":[[2010,6,27]]}},"container-title":["2010 IEEE International Conference on Wireless Communications, Networking and Information Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5524730\/5541718\/05541790.pdf?arnumber=5541790","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,19]],"date-time":"2017-03-19T05:15:54Z","timestamp":1489900554000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5541790\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/wcins.2010.5541790","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}