{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:40:10Z","timestamp":1750308010828,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,7,3]],"date-time":"2006-07-03T00:00:00Z","timestamp":1151884800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,7,3]]},"DOI":"10.1145\/1143549.1143619","type":"proceedings-article","created":{"date-parts":[[2007,1,17]],"date-time":"2007-01-17T01:15:56Z","timestamp":1168996556000},"page":"349-354","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["System approach to intrusion detection using hidden Markov model"],"prefix":"10.1145","author":[{"given":"Rahul","family":"Khanna","sequence":"first","affiliation":[{"name":"Intel Corporation, Hillsboro, OR"}]},{"given":"Huaping","family":"Liu","sequence":"additional","affiliation":[{"name":"Oregon State University, Corvallis, OR"}]}],"member":"320","published-online":{"date-parts":[[2006,7,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/98.760423"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1994.367313"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/882495.884434"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/3468.935043"},{"key":"e_1_3_2_1_5_1","volume-title":"A data mining analysis of RTID alarms,\" 2nd International Workshop on Recent Advances in Intrusion Detection","author":"Manganaris S.","year":"1999","unstructured":"S. Manganaris , M. Christensen , D. Serkle , and K. Hermix , \" A data mining analysis of RTID alarms,\" 2nd International Workshop on Recent Advances in Intrusion Detection , Purdue University , West Lafayette , Indiana, USA, Sep. 1999 . S. Manganaris, M. Christensen, D. Serkle, and K. Hermix, \"A data mining analysis of RTID alarms,\" 2nd International Workshop on Recent Advances in Intrusion Detection, Purdue University, West Lafayette, Indiana, USA, Sep. 1999."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.18626"},{"key":"e_1_3_2_1_7_1","series-title":"Series in Machine Perception and Artificial Intelligence","doi-asserted-by":"crossref","DOI":"10.1142\/4648","volume-title":"Hidden Markov models: Applications in computer vision,\" World Scientific","author":"Bunke H.","year":"2001","unstructured":"H. Bunke and T. Caelli ,\" Hidden Markov models: Applications in computer vision,\" World Scientific , Series in Machine Perception and Artificial Intelligence , vol. 45 , 2001 . H. Bunke and T. Caelli,\" Hidden Markov models: Applications in computer vision,\" World Scientific, Series in Machine Perception and Artificial Intelligence, vol. 45, 2001."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/872016.872176"},{"key":"e_1_3_2_1_9_1","volume-title":"2001 IEEE ICASSP","author":"Lee A.","year":"2001","unstructured":"A. Lee ,\" Gaussian mixture selection using context independent HMM,\" in Proc . 2001 IEEE ICASSP , 2001 . A. Lee,\" Gaussian mixture selection using context independent HMM,\" in Proc. 2001 IEEE ICASSP, 2001."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-97610-0","volume-title":"Self-organizing maps","author":"Kohonen T.","year":"1995","unstructured":"T. Kohonen , Self-organizing maps . Springer Press , 1995 . T. Kohonen, Self-organizing maps. Springer Press, 1995."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/79.543975"},{"key":"e_1_3_2_1_12_1","first-page":"727","volume-title":"17th Int. Conf. Machine Learning","author":"Pelleg D.","year":"2000","unstructured":"D. Pelleg and A. Moore , \" Xmeans: extending K-means with efficient estimation of the number of clusters,\" in Proc . 17th Int. Conf. Machine Learning , p. 727 , 2000 . D. Pelleg and A. Moore, \"Xmeans: extending K-means with efficient estimation of the number of clusters,\" in Proc. 17th Int. Conf. Machine Learning, p. 727, 2000."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1018046501280"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014069"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729694"},{"key":"e_1_3_2_1_16_1","volume-title":"Probability and random processes","author":"Grimmett G. R.","year":"1992","unstructured":"G. R. Grimmett and D. R. Stirzaker , Probability and random processes . Oxford, U.K. : Clarendon Press , 2 nd edition, 1992 . G. R. Grimmett and D. R. Stirzaker, Probability and random processes. Oxford, U.K.: Clarendon Press, 2nd edition, 1992.","edition":"2"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/647593.728880"},{"key":"e_1_3_2_1_18_1","volume-title":"Aalborg, Denmark, Feb. 27-Mar. 2","author":"Wespi A.","year":"1999","unstructured":"A. Wespi , H. Debar , and M. Dacier , \" An intrusion-detection system based on the Teiresias pattern-discovery algorithm,\" Eicar'99 , Aalborg, Denmark, Feb. 27-Mar. 2 , 1999 . A. Wespi, H. Debar, and M. Dacier, \"An intrusion-detection system based on the Teiresias pattern-discovery algorithm,\" Eicar'99, Aalborg, Denmark, Feb. 27-Mar. 2, 1999."},{"key":"e_1_3_2_1_19_1","unstructured":"DARPA \"DARPA 1999 Intrusion Detection Evaluation \" http:\/\/www.ll.mit.edu\/IST\/ideval\/data\/1999\/1999_data_index.html 1999.  DARPA \"DARPA 1999 Intrusion Detection Evaluation \" http:\/\/www.ll.mit.edu\/IST\/ideval\/data\/1999\/1999_data_index.html 1999."}],"event":{"name":"IWCMC06: 2006 International Wireless Communications and Mobile Computing Conference","sponsor":["ACM Association for Computing Machinery"],"location":"Vancouver British Columbia Canada","acronym":"IWCMC06"},"container-title":["Proceedings of the 2006 international conference on Wireless communications and mobile computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1143549.1143619","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1143549.1143619","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:35Z","timestamp":1750259195000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1143549.1143619"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,7,3]]},"references-count":19,"alternative-id":["10.1145\/1143549.1143619","10.1145\/1143549"],"URL":"https:\/\/doi.org\/10.1145\/1143549.1143619","relation":{},"subject":[],"published":{"date-parts":[[2006,7,3]]},"assertion":[{"value":"2006-07-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}