{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:21:41Z","timestamp":1750306901279,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,26]],"date-time":"2012-10-26T00:00:00Z","timestamp":1351209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,26]]},"DOI":"10.1145\/2393216.2393218","type":"proceedings-article","created":{"date-parts":[[2012,11,13]],"date-time":"2012-11-13T15:04:07Z","timestamp":1352819047000},"page":"7-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Host based attack detection using system calls"],"prefix":"10.1145","author":[{"given":"Jestin","family":"Joy","sequence":"first","affiliation":[{"name":"Federal Institute of Science and Technology, Cochin, Kerala, India"}]},{"given":"Anita","family":"John","sequence":"additional","affiliation":[{"name":"Rajagiri School of Engineering and Technology, Cochin, Kerala, India"}]}],"member":"320","published-online":{"date-parts":[[2012,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.39"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1947337.1947356"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the Research Conference. RPI","author":"Freeman S.","year":"2002","unstructured":"S. Freeman , A. Bivens , J. Branch , and B. Szymanski . Host-based intrusion detection using user signatures . In Proceedings of the Research Conference. RPI , Troy, NY , 2002 . S. Freeman, A. Bivens, J. Branch, and B. Szymanski. Host-based intrusion detection using user signatures. In Proceedings of the Research Conference. RPI, Troy, NY, 2002."},{"key":"e_1_3_2_1_4_1","first-page":"253","volume-title":"Proc. Network and Distributed Systems Security Symposium","volume":"1","author":"Garfinkel T.","year":"2003","unstructured":"T. Garfinkel and M. Rosenblum . A virtual machine introspection based architecture for intrusion detection . In Proc. Network and Distributed Systems Security Symposium , volume 1 , pages 253 -- 285 . Citeseer , 2003 . T. Garfinkel and M. Rosenblum. A virtual machine introspection based architecture for intrusion detection. In Proc. Network and Distributed Systems Security Symposium, volume 1, pages 253--285. Citeseer, 2003."},{"key":"e_1_3_2_1_5_1","series-title":"Communications in Computer and Information Science","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1007\/978-3-642-24037-9_36","volume-title":"Advances in Parallel Distributed Computing","author":"Joy J.","year":"2011","unstructured":"J. Joy , A. John , and J. Joy . Rootkit detection mechanism: A survey . In D. Nagamalai, E. Renault, and M. Dhanuskodi, editors, Advances in Parallel Distributed Computing , volume 203 of Communications in Computer and Information Science , pages 366 -- 374 . Springer Berlin Heidelberg , 2011 . J. Joy, A. John, and J. Joy. Rootkit detection mechanism: A survey. In D. Nagamalai, E. Renault, and M. Dhanuskodi, editors, Advances in Parallel Distributed Computing, volume 203 of Communications in Computer and Information Science, pages 366--374. Springer Berlin Heidelberg, 2011."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/191177.191183"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.19"},{"key":"e_1_3_2_1_8_1","first-page":"107","volume-title":"Information Assurance Workshop, 2004. Proceedings. Second IEEE International","author":"Levine J.","year":"2005","unstructured":"J. Levine , J. Grizzard , and H. Owen . A methodology to detect and characterize kernel level rootkit exploits involving redirection of the system call table . In Information Assurance Workshop, 2004. Proceedings. Second IEEE International , pages 107 -- 125 . IEEE, 2005 . J. Levine, J. Grizzard, and H. Owen. A methodology to detect and characterize kernel level rootkit exploits involving redirection of the system call table. In Information Assurance Workshop, 2004. Proceedings. Second IEEE International, pages 107--125. IEEE, 2005."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.11"},{"key":"e_1_3_2_1_10_1","volume-title":"Malicious Code Injection via\/dev\/mem. Black Hat Europe: http:\/\/www. blackhat.com\/presentations\/bh-europe-09\/Lineberry\/BlackHat-Europe-2009-Lineberry-code-injection-via-dev-mem.pdf","author":"Lineberry A.","year":"2009","unstructured":"A. Lineberry . Malicious Code Injection via\/dev\/mem. Black Hat Europe: http:\/\/www. blackhat.com\/presentations\/bh-europe-09\/Lineberry\/BlackHat-Europe-2009-Lineberry-code-injection-via-dev-mem.pdf , 2009 . A. Lineberry. Malicious Code Injection via\/dev\/mem. Black Hat Europe: http:\/\/www. blackhat.com\/presentations\/bh-europe-09\/Lineberry\/BlackHat-Europe-2009-Lineberry-code-injection-via-dev-mem.pdf, 2009."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127348"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315260"},{"key":"e_1_3_2_1_13_1","first-page":"94","article-title":"Guide to intrusion detection and prevention systems (idps)","volume":"800","author":"Scarfone K.","year":"2007","unstructured":"K. Scarfone and P. Mell . Guide to intrusion detection and prevention systems (idps) . NIST Special Publication , 800 (2007): 94 , 2007 . K. Scarfone and P. Mell. Guide to intrusion detection and prevention systems (idps). NIST Special Publication, 800(2007):94, 2007.","journal-title":"NIST Special Publication"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653728"},{"key":"e_1_3_2_1_15_1","volume-title":"A comparison of several host\/file integrity monitoring programs","author":"Wichmann R.","year":"2009","unstructured":"R. Wichmann . A comparison of several host\/file integrity monitoring programs . Dec 29, 2009 . R. Wichmann. A comparison of several host\/file integrity monitoring programs. Dec 29, 2009."}],"event":{"name":"CCSEIT '12: The Second International Conference on Computational Science, Engineering","sponsor":["Avinashilingam University Avinashilingam University"],"location":"Coimbatore UNK India","acronym":"CCSEIT '12"},"container-title":["Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393218","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2393216.2393218","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:19:11Z","timestamp":1750234751000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393218"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,26]]},"references-count":15,"alternative-id":["10.1145\/2393216.2393218","10.1145\/2393216"],"URL":"https:\/\/doi.org\/10.1145\/2393216.2393218","relation":{},"subject":[],"published":{"date-parts":[[2012,10,26]]},"assertion":[{"value":"2012-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}