{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T14:58:40Z","timestamp":1777733920241,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,4,21]],"date-time":"2015-04-21T00:00:00Z","timestamp":1429574400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Army Research Office","award":["W911NF-12-1-0086"],"award-info":[{"award-number":["W911NF-12-1-0086"]}]},{"name":"National Science Foundation","award":["CNS 10-185303 CISE"],"award-info":[{"award-number":["CNS 10-185303 CISE"]}]},{"name":"Air Force Office of Scientific Research","award":["FA8750-11-20084"],"award-info":[{"award-number":["FA8750-11-20084"]}]},{"name":"National Security Agency","award":["H98230-14-C-0141"],"award-info":[{"award-number":["H98230-14-C-0141"]}]},{"name":"Air Force Research Laboratory"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,4,21]]},"DOI":"10.1145\/2746194.2746199","type":"proceedings-article","created":{"date-parts":[[2015,4,17]],"date-time":"2015-04-17T22:11:35Z","timestamp":1429308695000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Preemptive intrusion detection"],"prefix":"10.1145","author":[{"given":"Phuong","family":"Cao","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana Champaign"}]},{"given":"Eric","family":"Badger","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana Champaign"}]},{"given":"Zbigniew","family":"Kalbarczyk","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana Champaign"}]},{"given":"Ravishankar","family":"Iyer","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana Champaign"}]},{"given":"Adam","family":"Slagell","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana Champaign"}]}],"member":"320","published-online":{"date-parts":[[2015,4,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Computer security threat monitoring and surveillance. Tech. rep","author":"Anderson J. P.","year":"1980","unstructured":"Anderson , J. P. Computer security threat monitoring and surveillance. Tech. rep ., 1980 . Anderson, J. P. Computer security threat monitoring and surveillance. Tech. rep., 1980."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1926258.1926300"},{"key":"e_1_3_2_1_3_1","unstructured":"Bro. Bro intrusion detection system. www.bro-ids.org.  Bro. Bro intrusion detection system. www.bro-ids.org."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2600176.2600197"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/81.3.541"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.924605"},{"key":"e_1_3_2_1_8_1","first-page":"666","volume-title":"Proceedings of the Annual Allerton Conference on Communication Control and Computing","author":"Frey B. J.","year":"1997","unstructured":"Frey , B. J. , Kschischang , F. R. , Loeliger , H.-A. , and Wiberg , N . Factor graphs and algorithms . In Proceedings of the Annual Allerton Conference on Communication Control and Computing ( 1997 ), pp. 666 -- 680 . Frey, B. J., Kschischang, F. R., Loeliger, H.-A., and Wiberg, N. Factor graphs and algorithms. In Proceedings of the Annual Allerton Conference on Communication Control and Computing (1997), pp. 666--680."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2009.4804323"},{"key":"e_1_3_2_1_10_1","unstructured":"Lafferty J. McCallum A. and Pereira F. C. Conditional random fields: Probabilistic models for segmenting and labeling sequence data.  Lafferty J. McCallum A. and Pereira F. C. Conditional random fields: Probabilistic models for segmenting and labeling sequence data."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.868904"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2011.24"},{"key":"e_1_3_2_1_14_1","first-page":"12","author":"Pedregosa F. e. a.","year":"2011","unstructured":"Pedregosa , F. e. a. Scikit -learn: Machine learning in python. JMLR 12 ( 2011 ). Pedregosa, F. e. a. Scikit-learn: Machine learning in python. JMLR 12 (2011).","journal-title":"JMLR"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.7"},{"key":"e_1_3_2_1_16_1","volume-title":"Monte Carlo Statistical Methods","author":"Robert C. P.","year":"2005","unstructured":"Robert , C. P. , and Casella , G . Monte Carlo Statistical Methods (Springer Texts in Statistics). Springer-Verlag New York , Inc., Secaucus, NJ, USA, 2005 . Robert, C. P., and Casella, G. Monte Carlo Statistical Methods (Springer Texts in Statistics). Springer-Verlag New York, Inc., Secaucus, NJ, USA, 2005."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1501434.1501479"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2011.5958263"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1529939"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(10)70022-1"}],"event":{"name":"HotSoS '15: Symposium and Bootcamp on the Science of Security","location":"Urbana Illinois","acronym":"HotSoS '15","sponsor":["US Army Research Office US Army Research Office","NSF National Science Foundation","University of Illinois at Urbana-Champaign","National Security Agency National Security Agency"]},"container-title":["Proceedings of the 2015 Symposium and Bootcamp on the Science of Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2746194.2746199","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2746194.2746199","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:44Z","timestamp":1750227404000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2746194.2746199"}},"subtitle":["theoretical framework and real-world measurements"],"short-title":[],"issued":{"date-parts":[[2015,4,21]]},"references-count":20,"alternative-id":["10.1145\/2746194.2746199","10.1145\/2746194"],"URL":"https:\/\/doi.org\/10.1145\/2746194.2746199","relation":{},"subject":[],"published":{"date-parts":[[2015,4,21]]},"assertion":[{"value":"2015-04-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}