{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:10:32Z","timestamp":1750306232061,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:00:00Z","timestamp":1490140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100002322","name":"Schlumberger Foundation","doi-asserted-by":"publisher","award":["Faculty For The Future Award"],"award-info":[{"award-number":["Faculty For The Future Award"]}],"id":[{"id":"10.13039\/100002322","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,22]]},"DOI":"10.1145\/3029806.3029809","type":"proceedings-article","created":{"date-parts":[[2017,3,20]],"date-time":"2017-03-20T12:34:59Z","timestamp":1490013299000},"page":"3-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Ghostbuster"],"prefix":"10.1145","author":[{"given":"Shagufta","family":"Mehnaz","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Security breach at sony-- here's what you need to know. http:\/\/www.forbes.com\/sites\/josephsteinberg\/2014\/12\/ 11\/massive-security-breach-at-sony-heres-what-you-need -to-know\/ December 2014.  Security breach at sony-- here's what you need to know. http:\/\/www.forbes.com\/sites\/josephsteinberg\/2014\/12\/ 11\/massive-security-breach-at-sony-heres-what-you-need -to-know\/ December 2014."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"first-page":"60","volume-title":"Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)","author":"Park J.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2371174"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966916"},{"volume-title":"Carnegie Mellon University, 2012","year":"2013","author":"Cybersecurity","key":"e_1_3_2_1_6_1"},{"volume-title":"Carnegie Mellon University, 2013","year":"2013","author":"Huth Carly","key":"e_1_3_2_1_7_1"},{"volume-title":"Carnegie Mellon University, 2013","year":"2013","author":"Collins Matthew","key":"e_1_3_2_1_8_1"},{"volume-title":"Carnegie Mellon University","year":"2012","author":"Moore David Mundie","key":"e_1_3_2_1_9_1"},{"volume-title":"Carnegie Mellon University, 2014","year":"2014","author":"Moore Andrew P.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-007-0051-4"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699111"},{"key":"e_1_3_2_1_13_1","first-page":"449","volume-title":"IPCCC 2007","author":"Bertino E.","year":"2007"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1894166.1894192"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775102"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.814797"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_22"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11425274_2"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2011.23"},{"key":"e_1_3_2_1_21_1","unstructured":"ZFS End-to-End Data Integrity. https:\/\/blogs.oracle.com\/bonwick\/entry\/ zfs\\_end\\_to\\_end\\_data.  ZFS End-to-End Data Integrity. https:\/\/blogs.oracle.com\/bonwick\/entry\/ zfs\\_end\\_to\\_end\\_data."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1052676.1052684"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23268"},{"key":"e_1_3_2_1_24_1","unstructured":"Blktrace. http:\/\/linux.die.net\/man\/8\/blktrace\/.  Blktrace. http:\/\/linux.die.net\/man\/8\/blktrace\/."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009748302351"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/645920.672836"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281238"},{"key":"e_1_3_2_1_28_1","unstructured":"Block I\/O Layer Tracing using blktrace. http:\/\/smackerelofopinion.blogspot.com\/2009\/10\/block-io-layer-tracing-using-blktrace.html.  Block I\/O Layer Tracing using blktrace. http:\/\/smackerelofopinion.blogspot.com\/2009\/10\/block-io-layer-tracing-using-blktrace.html."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Kaustubh Nyalkalkar Sushant Sinha Michael Bailey and Farnam Jahanian. A comparative study of two network-based anomaly detection methods 2011.  Kaustubh Nyalkalkar Sushant Sinha Michael Bailey and Farnam Jahanian. A comparative study of two network-based anomaly detection methods 2011.","DOI":"10.1109\/INFCOM.2011.5934975"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/784589.784633"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295168"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/2512538.2512545"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/597917.597923"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906928"},{"key":"e_1_3_2_1_35_1","first-page":"51","volume-title":"Baiting Inside Attackers Using Decoy Documents","author":"Bowen Brian M.","year":"2009"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741880"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2488213"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/11555827_14"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.362"},{"volume-title":"Springer International Publishing","year":"2014","author":"Cami\u00f1a J. Benito","key":"e_1_3_2_1_40_1"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.151"},{"first-page":"183","volume-title":"Proceedings of the 10th IEEE Workshop on Computer Security Foundations, CSFW '97","author":"Simon Richard","key":"e_1_3_2_1_42_1"}],"event":{"name":"CODASPY '17: Seventh ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Scottsdale Arizona USA","acronym":"CODASPY '17"},"container-title":["Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3029806.3029809","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3029806.3029809","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:14Z","timestamp":1750220594000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3029806.3029809"}},"subtitle":["A Fine-grained Approach for Anomaly Detection in File System Accesses"],"short-title":[],"issued":{"date-parts":[[2017,3,22]]},"references-count":42,"alternative-id":["10.1145\/3029806.3029809","10.1145\/3029806"],"URL":"https:\/\/doi.org\/10.1145\/3029806.3029809","relation":{},"subject":[],"published":{"date-parts":[[2017,3,22]]},"assertion":[{"value":"2017-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}