{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:23Z","timestamp":1750307603007,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,13]],"date-time":"2009-11-13T00:00:00Z","timestamp":1258070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,13]]},"DOI":"10.1145\/1655028.1655044","type":"proceedings-article","created":{"date-parts":[[2009,11,17]],"date-time":"2009-11-17T13:30:15Z","timestamp":1258464615000},"page":"73-80","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Using identity credential usage logs to detect anomalous service accesses"],"prefix":"10.1145","author":[{"given":"Daisuke","family":"Mashima","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Mustaque","family":"Ahamad","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Federal Trade Commission. \"Consumer Sentinel Network Data Book \" 2009.  Federal Trade Commission. \"Consumer Sentinel Network Data Book \" 2009."},{"key":"e_1_3_2_1_2_1","unstructured":"Internet Crime Complaint Center \"2008 Internet Crime Report \" 2009.  Internet Crime Complaint Center \"2008 Internet Crime Report \" 2009."},{"key":"e_1_3_2_1_3_1","unstructured":"BuzzPort https:\/\/buzzport.gatech.edu.  BuzzPort https:\/\/buzzport.gatech.edu."},{"key":"e_1_3_2_1_4_1","unstructured":"Warrender C. Forrest S. Pearlmutter B. \"Detecting intrusions using system calls: Alternative data models \" in Proc. of the IEEE Symposium on Security and Privacy 1999.  Warrender C. Forrest S. Pearlmutter B. \"Detecting intrusions using system calls: Alternative data models \" in Proc. of the IEEE Symposium on Security and Privacy 1999."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.01.009"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/508791.508835"},{"volume-title":"Proc. of the American Conference on Applied Mathematics","year":"2008","author":"Cha Sung-Hyuk","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","unstructured":"S. Stolfo W. Fan W. Lee A. Prodromidis and P. Chan. \"Credit Card Fraud Detection Using Meta-learning: Issues and Initial Results \" in Proc. of AAAI-97 Workshop on Fraud Detection and Risk Management 1997.  S. Stolfo W. Fan W. Lee A. Prodromidis and P. Chan. \"Credit Card Fraud Detection Using Meta-learning: Issues and Initial Results \" in Proc. of AAAI-97 Workshop on Fraud Detection and Risk Management 1997."},{"volume-title":"Proc. of IEEE International Conference on Networking, Sensing and Control","year":"2004","author":"Kou Yufeng","key":"e_1_3_2_1_10_1"},{"journal-title":"\"Statistical Fraud Detection: A Review,\" in Statistical Science","year":"2002","author":"Bolton R.J.","key":"e_1_3_2_1_11_1"},{"journal-title":"\"A Comprehensive Survey of Data Mining-based Fraud detection Research,\" in Artificial Intelligence Review","year":"2005","author":"Phua C.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMP.2008.22"},{"volume-title":"Proc. of 14th European Symposium on Research in Computer Security","year":"2009","author":"Mashima Daisuke","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Ke Wang and Salvatore J. Stolfo. \"Anomalous Payload-Based Network Intrusion Detection \" in Proc. of 7th International Symposium on Recent Advances in Intrusion Detection 2004.  Ke Wang and Salvatore J. Stolfo. \"Anomalous Payload-Based Network Intrusion Detection \" in Proc. of 7th International Symposium on Recent Advances in Intrusion Detection 2004.","DOI":"10.1007\/978-3-540-30143-1_11"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11663812_12"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1433006.1433013"},{"key":"e_1_3_2_1_18_1","unstructured":"Clemens Kolbitsch et al. \"Effective and Efficient Malware Detection at the End Host \" in Proc. of 18th USENIX Security Symposium 2009.   Clemens Kolbitsch et al. \"Effective and Efficient Malware Detection at the End Host \" in Proc. of 18th USENIX Security Symposium 2009."},{"key":"e_1_3_2_1_19_1","unstructured":"IP2LOCATION http:\/\/www.ip2location.com.  IP2LOCATION http:\/\/www.ip2location.com."},{"key":"e_1_3_2_1_20_1","unstructured":"American Registry for Internet Numbers https:\/\/www.arin.net.  American Registry for Internet Numbers https:\/\/www.arin.net."}],"event":{"name":"CCS '09: 16th ACM Conference on Computer and Communications Security 2009","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Chicago Illinois USA","acronym":"CCS '09"},"container-title":["Proceedings of the 5th ACM workshop on Digital identity management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655028.1655044","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1655028.1655044","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:45:31Z","timestamp":1750250731000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655028.1655044"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,13]]},"references-count":19,"alternative-id":["10.1145\/1655028.1655044","10.1145\/1655028"],"URL":"https:\/\/doi.org\/10.1145\/1655028.1655044","relation":{},"subject":[],"published":{"date-parts":[[2009,11,13]]},"assertion":[{"value":"2009-11-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}