{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:41Z","timestamp":1750307921093,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,3,20]],"date-time":"2007-03-20T00:00:00Z","timestamp":1174348800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,3,20]]},"DOI":"10.1145\/1229285.1229340","type":"proceedings-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T19:41:00Z","timestamp":1175802060000},"page":"398-400","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Masquerade detection based on SVM and sequence-based user commands profile"],"prefix":"10.1145","author":[{"given":"Jeongseok","family":"Seo","sequence":"first","affiliation":[{"name":"Republic of Korea"}]},{"given":"Sungdeok","family":"Cha","sequence":"additional","affiliation":[{"name":"Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2007,3,20]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1023\/A:1009715923555"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.5555\/345662"},{"key":"e_1_3_2_1_3_1","volume-title":"2004 CSI\/FBI Computer Crime and Security Survey","author":"Gordon L.","year":"2004","unstructured":"L. Gordon , M. Loeb , and 2004 CSI\/FBI Computer Crime and Security Survey . Computer Security Institute , 2004 . L. Gordon, M. Loeb, and et al. 2004 CSI\/FBI Computer Crime and Security Survey. Computer Security Institute, 2004."},{"key":"e_1_3_2_1_4_1","volume-title":"2003 Intl. Conf. on Machine Learning and Applications","author":"Hu W.","year":"2003","unstructured":"W. Hu , Y. Liao , and V. Vemuri . Robust support vector machines for anomaly detection in computer security . 2003 Intl. Conf. on Machine Learning and Applications , June 2003 . W. Hu, Y. Liao, and V. Vemuri. Robust support vector machines for anomaly detection in computer security. 2003 Intl. Conf. on Machine Learning and Applications, June 2003."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1109\/AINA.2005.191"},{"key":"e_1_3_2_1_6_1","volume-title":"E87-D(11)","author":"Kim H.","year":"2004","unstructured":"H. Kim and S. Cha . Efficient masquerade detection using svm based on common command frequency in sliding windows. IEICE Transactions on Information and Systems , E87-D(11) , November 2004 . H. Kim and S. Cha. Efficient masquerade detection using svm based on common command frequency in sliding windows. IEICE Transactions on Information and Systems, E87-D(11), November 2004."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1016\/j.cose.2004.08.007"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1162\/153244302760200687"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.5555\/647883.738240"},{"key":"e_1_3_2_1_10_1","first-page":"503","volume-title":"Intl. Conf. on Information and Knowledge Engineering","author":"Mukkamala S.","year":"2002","unstructured":"S. Mukkamala and A. Sung . Feature ranking and selection for intrusion detection systems using support vector machines . Intl. Conf. on Information and Knowledge Engineering , pages 503 -- 509 , 2002 . S. Mukkamala and A. Sung. Feature ranking and selection for intrusion detection systems using support vector machines. Intl. Conf. on Information and Knowledge Engineering, pages 503--509, 2002."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1214\/ss\/998929476"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/IAW.2004.1437848"},{"key":"e_1_3_2_1_13_1","volume-title":"3rd IEEE Conference Data Mining Workshop on Data Mining for Computer Security","author":"Wang K.","year":"2003","unstructured":"K. Wang and S. Stolfo . One-class training for masquerade detection . 3rd IEEE Conference Data Mining Workshop on Data Mining for Computer Security , November 2003 . K. Wang and S. Stolfo. One-class training for masquerade detection. 3rd IEEE Conference Data Mining Workshop on Data Mining for Computer Security, November 2003."},{"key":"e_1_3_2_1_14_1","volume-title":"US Dept. of Justice","author":"Webster W.","year":"2002","unstructured":"W. Webster , C. Alexander, and et al. A review of FBI security program . US Dept. of Justice , March 2002 . W. Webster, C. Alexander, and et al. A review of FBI security program. US Dept. of Justice, March 2002."}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"Asia CCS07","name":"Asia CCS07: Asia CCS'07 ACM Symposium on Information, Computer and Communications Security","location":"Singapore"},"container-title":["Proceedings of the 2nd ACM symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1229285.1229340","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1229285.1229340","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:37Z","timestamp":1750258297000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1229285.1229340"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,3,20]]},"references-count":14,"alternative-id":["10.1145\/1229285.1229340","10.1145\/1229285"],"URL":"https:\/\/doi.org\/10.1145\/1229285.1229340","relation":{},"subject":[],"published":{"date-parts":[[2007,3,20]]},"assertion":[{"value":"2007-03-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}