{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:15Z","timestamp":1750307895576,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,7,6]],"date-time":"2008-07-06T00:00:00Z","timestamp":1215302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,7,6]]},"DOI":"10.1145\/1387269.1387294","type":"proceedings-article","created":{"date-parts":[[2009,9,28]],"date-time":"2009-09-28T17:33:43Z","timestamp":1254159223000},"page":"147-156","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Anomaly-based fault detection in pervasive computing system"],"prefix":"10.1145","author":[{"given":"Byoung Uk","family":"Kim","sequence":"first","affiliation":[{"name":"The University of Arizona, Tucson, AZ, USA"}]},{"given":"Youssif","family":"Al-Nashif","sequence":"additional","affiliation":[{"name":"The University of Arizona, Tucson, AZ, USA"}]},{"given":"Samer","family":"Fayssal","sequence":"additional","affiliation":[{"name":"The University of Arizona, Tucson, AZ, USA"}]},{"given":"Salim","family":"Hariri","sequence":"additional","affiliation":[{"name":"The University of Arizona, Tucson, AZ, USA"}]},{"given":"Mazin","family":"Yousif","sequence":"additional","affiliation":[{"name":"Avirtec Corporation, Tucson, AZ, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,7,6]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"46","volume-title":"2003 AMIA Annual Symp.","author":"Bang M.","year":"2003","unstructured":"M. Bang , A. Larsson and H. Eriksson , \" NOSTOS: A paper-based ubiquitous computing healthcare environment to support data capture and collaboration,\" in Proc . 2003 AMIA Annual Symp. , Washington, DC , pp. 46 -- 50 , 2003 . M. Bang, A. Larsson and H. Eriksson, \"NOSTOS: A paper-based ubiquitous computing healthcare environment to support data capture and collaboration,\" in Proc. 2003 AMIA Annual Symp., Washington, DC, pp. 46--50, 2003."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/339647.339652"},{"key":"e_1_3_2_1_3_1","unstructured":"A. Wood \"\"Data Integrity Concepts Features and Technology \" \" White paper Tandem Division Compaq Computer Corporation.  A. Wood \"\"Data Integrity Concepts Features and Technology \" \" White paper Tandem Division Compaq Computer Corporation."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2005.34"},{"key":"e_1_3_2_1_5_1","volume-title":"Controlling overfitting in software quality models: experiments with regression trees and classification\" IEEE METRICS","author":"Khoshgoftaar T. M.","year":"2001","unstructured":"T. M. Khoshgoftaar , and E. B. Allen , \" Controlling overfitting in software quality models: experiments with regression trees and classification\" IEEE METRICS , 2001 . T. M. Khoshgoftaar, and E. B. Allen, \"Controlling overfitting in software quality models: experiments with regression trees and classification\" IEEE METRICS, 2001."},{"key":"e_1_3_2_1_6_1","first-page":"455","article-title":"Using regression trees to classify fault-prone software modules Reliability","volume":"51","author":"Allen E. B.","year":"2002","unstructured":"E. B. Allen , T. M. Khoshgoftaar , and J. Deng , \" Using regression trees to classify fault-prone software modules Reliability ,\" IEEE Trans. on Comp. , vol. 51 , pp. 455 -- 462 , 2002 . E. B. Allen, T. M. Khoshgoftaar, and J. Deng, \"Using regression trees to classify fault-prone software modules Reliability,\" IEEE Trans. on Comp., vol. 51, pp. 455--462, 2002.","journal-title":"IEEE Trans. on Comp."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024424811345"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(94)00130-F"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/942804.943747"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1109\/CSMR.2002.995794","volume-title":"An industrial case study Proc. of The Sixth European Conference on Software Maintenance and Reengineering","author":"Ping T. S. Y.","year":"2002","unstructured":"T. S. Y. Ping , and H. Muller , \" Predicting fault proneness using OO metrics \", An industrial case study Proc. of The Sixth European Conference on Software Maintenance and Reengineering , pp. 99 -- 107 , 2002 . T. S. Y. Ping, and H. Muller, \"Predicting fault proneness using OO metrics\", An industrial case study Proc. of The Sixth European Conference on Software Maintenance and Reengineering, pp. 99--107, 2002."},{"key":"e_1_3_2_1_11_1","volume-title":"An Introduction with Minitab Commentary","author":"Beaumont G. P.","year":"1996","unstructured":"G. P. Beaumont , \"Statistical Tests : An Introduction with Minitab Commentary \", Prentice Hall , 1996 . G. P. Beaumont, \"Statistical Tests: An Introduction with Minitab Commentary\", Prentice Hall, 1996."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00209184"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1018972607783"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/794203.795283"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(99)00102-8"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/851010.856105"},{"key":"e_1_3_2_1_17_1","volume-title":"ECML\/PKDD","author":"Forman George I. C.","year":"2004","unstructured":"I. C. Forman George , \"Learning From Little : Comparison of Classifiers given Little Training \", ECML\/PKDD , 2004 . I. C. Forman George, \"Learning From Little: Comparison of Classifiers given Little Training\", ECML\/PKDD, 2004."},{"key":"e_1_3_2_1_18_1","article-title":"An extensive empirical study of feature selection metrics for text classification","author":"Forman G.","year":"2003","unstructured":"G. Forman , \" An extensive empirical study of feature selection metrics for text classification ,\" Journal of Machine Learning Research pp. 1289--1305 , 2003 . G. Forman, \"An extensive empirical study of feature selection metrics for text classification,\" Journal of Machine Learning Research pp. 1289--1305, 2003.","journal-title":"Journal of Machine Learning Research pp. 1289--1305"},{"key":"e_1_3_2_1_19_1","volume-title":"April","author":"W.","year":"2005","unstructured":"TPC- W. http:\/\/www.tpc.org\/tpcw , April 2005 . TPC-W. http:\/\/www.tpc.org\/tpcw, April 2005."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/563998.564027"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1113841.1113843"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/24.994913"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.21"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/qre.392"},{"key":"e_1_3_2_1_25_1","volume-title":"Intrusion Detection: A Survey","author":"Lazarevic A.","year":"2006","unstructured":"A. Lazarevic , V. Kumar and J. Srivastava , \" Intrusion Detection: A Survey \", Springer US , vol. 5 , 2006 . A. Lazarevic, V. Kumar and J. Srivastava, \"Intrusion Detection: A Survey\", Springer US, vol. 5, 2006."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095821"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.980003"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/322510.322526"},{"key":"e_1_3_2_1_29_1","volume-title":"Proc., IEEE International Conference on Pervasive Service","author":"Fayssal S.","year":"2007","unstructured":"S. Fayssal and S. Hariri \"Anomaly-based Protection Approach Against Wireless Network Attacks\" , In Proc., IEEE International Conference on Pervasive Service , 2007 . S. Fayssal and S. Hariri \"Anomaly-based Protection Approach Against Wireless Network Attacks\", In Proc., IEEE International Conference on Pervasive Service, 2007."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022643204877"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2006.205142"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863979"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/366173.366197"},{"key":"e_1_3_2_1_34_1","volume-title":"USENIX Security Symposium, Washington, D.C.","author":"Christodorescu M.","year":"2003","unstructured":"M. Christodorescu and S. Jha , \" Static Analysis of Executables to Detect Malicious Patterns \", In USENIX Security Symposium, Washington, D.C. , 2003 . M. Christodorescu and S. Jha, \"Static Analysis of Executables to Detect Malicious Patterns\", In USENIX Security Symposium, Washington, D.C., 2003."},{"key":"e_1_3_2_1_35_1","volume-title":"Boundary Detection in Tokenizing Network Application Payload for Anomaly Detection\", on Data Mining for Computer Security (DMSEC)","author":"Vargiya R.","year":"2003","unstructured":"R. Vargiya and P. Chan , \" Boundary Detection in Tokenizing Network Application Payload for Anomaly Detection\", on Data Mining for Computer Security (DMSEC) , 2003 . R. Vargiya and P. Chan, \"Boundary Detection in Tokenizing Network Application Payload for Anomaly Detection\", on Data Mining for Computer Security (DMSEC), 2003."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/11856214_12"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERA.2007.55"},{"key":"e_1_3_2_1_38_1","unstructured":"A. Partow \" http:\/\/www.partow.net\/programming\/hashfunctions\/#Available \" HashFunctions.  A. Partow \" http:\/\/www.partow.net\/programming\/hashfunctions\/#Available \" HashFunctions."}],"event":{"name":"ICPS08: 2008 International Conference on Pervasive Services","sponsor":["ACM Association for Computing Machinery","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Sorrento Italy","acronym":"ICPS08"},"container-title":["Proceedings of the 5th international conference on Pervasive services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1387269.1387294","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1387269.1387294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:25Z","timestamp":1750258045000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1387269.1387294"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7,6]]},"references-count":38,"alternative-id":["10.1145\/1387269.1387294","10.1145\/1387269"],"URL":"https:\/\/doi.org\/10.1145\/1387269.1387294","relation":{},"subject":[],"published":{"date-parts":[[2008,7,6]]},"assertion":[{"value":"2008-07-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}