{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:06:32Z","timestamp":1759133192470,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,2,18]],"date-time":"2017-02-18T00:00:00Z","timestamp":1487376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,2,18]]},"DOI":"10.1145\/3057039.3057051","type":"proceedings-article","created":{"date-parts":[[2017,5,19]],"date-time":"2017-05-19T18:17:22Z","timestamp":1495217842000},"page":"104-110","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Compromised User Credentials Detection Using Temporal Features"],"prefix":"10.1145","author":[{"given":"Adnan","family":"Amin","sequence":"first","affiliation":[{"name":"Center of Excellence in Information Technology, Institute of Management Sciences, Peshawar, Pakistan"}]},{"given":"Sajid","family":"Anwar","sequence":"additional","affiliation":[{"name":"Center of Excellence in Information Technology, Institute of Management Sciences, Peshawar, Pakistan"}]},{"given":"Babar","family":"Shah","sequence":"additional","affiliation":[{"name":"College of Technological Innovation, Zayed University, Abu Dhabi, UAE"}]},{"given":"Asad Masood","family":"Khattak","sequence":"additional","affiliation":[{"name":"College of Technological Innovation, Zayed University, Abu Dhabi, UAE"}]}],"member":"320","published-online":{"date-parts":[[2017,2,18]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","volume-title":"COMPA: Detecting Compromised Accounts on Social Networks,\" in 20th Annual Network & Distributed System Security Symposium","author":"Egele M.","year":"2013","unstructured":"M. Egele , C. Kruegel , and G. Vigna , \" COMPA: Detecting Compromised Accounts on Social Networks,\" in 20th Annual Network & Distributed System Security Symposium , San Diego, CA United States ., 2013 , pp. 1 -- 17 . M. Egele, C. Kruegel, and G. Vigna, \"COMPA: Detecting Compromised Accounts on Social Networks,\" in 20th Annual Network & Distributed System Security Symposium, San Diego, CA United States., 2013, pp. 1--17."},{"key":"e_1_3_2_1_2_1","first-page":"223","volume-title":"Towards Detecting Anomalous User Behavior in Online Social Networks,\" in Proceedings of the 23rd USENIX Security Symposium (USENIX Security)","author":"Viswanath B.","year":"2014","unstructured":"B. Viswanath , B. Muhammad Ahmad , M. Crovella , S. Guha , K. Gummadi , B. Krishnamurthy , and A. Mislove , \" Towards Detecting Anomalous User Behavior in Online Social Networks,\" in Proceedings of the 23rd USENIX Security Symposium (USENIX Security) , 2014 , pp. 223 -- 238 . B. Viswanath, B. Muhammad Ahmad, M. Crovella, S. Guha, K. Gummadi, B. Krishnamurthy, and A. Mislove, \"Towards Detecting Anomalous User Behavior in Online Social Networks,\" in Proceedings of the 23rd USENIX Security Symposium (USENIX Security), 2014, pp. 223--238."},{"issue":"1","key":"e_1_3_2_1_3_1","first-page":"307","article-title":"Outlier Detection: Applications And Techniques","volume":"9","author":"Singh K.","year":"2012","unstructured":"K. Singh and M. Cantt , \" Outlier Detection: Applications And Techniques ,\" Int. J. Comput. Sci. Issues , vol. 9 , no. 1 , pp. 307 -- 323 , 2012 . K. Singh and M. Cantt, \"Outlier Detection: Applications And Techniques,\" Int. J. Comput. Sci. Issues, vol. 9, no. 1, pp. 307--323, 2012.","journal-title":"Int. J. Comput. Sci. Issues"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2014.06.012"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.02.047"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526784"},{"key":"e_1_3_2_1_7_1","first-page":"150","volume-title":"Temporal sequence learning and data reduction for anomaly detection,\" in ACM","author":"Lane T.","unstructured":"T. Lane and C. E. Brodley , \" Temporal sequence learning and data reduction for anomaly detection,\" in ACM , pp. 150 -- 158 . T. Lane and C. E. Brodley, \"Temporal sequence learning and data reduction for anomaly detection,\" in ACM, pp. 150--158."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-3994-4"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2010.021510.00088"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.2200\/S00573ED1V01Y201403DMK008"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00962234"},{"key":"e_1_3_2_1_12_1","volume-title":"IN.","author":"Kumar S.","year":"1995","unstructured":"S. Kumar , \"Classification and detection of computer intrusions,\" Dr. Diss. Dep. Comput. Sci. Purdue Univ. W. Lafayette , IN. , 1995 . S. Kumar, \"Classification and detection of computer intrusions,\" Dr. Diss. Dep. Comput. Sci. Purdue Univ. W. Lafayette, IN., 1995."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924295"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660282"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.matcom.2010.02.007"},{"key":"e_1_3_2_1_16_1","volume-title":"Detecting and characterizing social spam campaigns,\" in Proceedings of the 10th annual conference on Internet measurement - IMC '10","author":"Gao H.","year":"2010","unstructured":"H. Gao , J. Hu , C. Wilson , Z. Li , Y. Chen , and B. Y. Zhao , \" Detecting and characterizing social spam campaigns,\" in Proceedings of the 10th annual conference on Internet measurement - IMC '10 , 2010 , p. 35. H. Gao, J. Hu, C. Wilson, Z. Li, Y. Chen, and B. Y. Zhao, \"Detecting and characterizing social spam campaigns,\" in Proceedings of the 10th annual conference on Internet measurement - IMC '10, 2010, p. 35."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/604264.604269"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1998.738647"},{"key":"e_1_3_2_1_19_1","first-page":"141","article-title":"A study in using neural networks for anomaly and misuse detection,\" in Proceedings of the 8th USENIX Security Symposium, Washington","author":"Ghosh A. K.","year":"1999","unstructured":"A. K. Ghosh and A. Schwartzbard , \" A study in using neural networks for anomaly and misuse detection,\" in Proceedings of the 8th USENIX Security Symposium, Washington , D.C. , 1999 , pp. 141 -- 152 . A. K. Ghosh and A. Schwartzbard, \"A study in using neural networks for anomaly and misuse detection,\" in Proceedings of the 8th USENIX Security Symposium, Washington, D.C., 1999, pp. 141--152.","journal-title":"D.C."},{"key":"e_1_3_2_1_20_1","first-page":"511","volume-title":"3rd IEEE Intl. Conf. Intell. Secur. Informatics","author":"Kang D.","year":"2005","unstructured":"D. Kang , D. Fuller , and V. Honavar , \" Learning Classifiers for Misuse Detection Using,\" Proc . 3rd IEEE Intl. Conf. Intell. Secur. Informatics , pp. 511 -- 516 , 2005 . D. Kang, D. Fuller, and V. Honavar, \"Learning Classifiers for Misuse Detection Using,\" Proc. 3rd IEEE Intl. Conf. Intell. Secur. Informatics, pp. 511--516, 2005."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SUTC.2006.1636219"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1353343.1353424"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-52062-7_86"},{"key":"e_1_3_2_1_24_1","first-page":"366","article-title":"Maintaining an expert system","volume":"2","author":"Pau C.","year":"1989","unstructured":"C. Pau , K. A. Horn , Quinlan, and L. Lazarus , \" Maintaining an expert system ,\" Quinlan, J.R. Appl. Expert Syst. Addison-Wesley , vol. 2 , pp. 366 -- 385 , 1989 . C. Pau, K. A. Horn, Quinlan, and L. Lazarus, \"Maintaining an expert system,\" Quinlan, J.R. Appl. Expert Syst. Addison-Wesley, vol. 2, pp. 366--385, 1989.","journal-title":"Quinlan, J.R. Appl. Expert Syst. Addison-Wesley"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1998.0231"},{"key":"e_1_3_2_1_26_1","first-page":"23","article-title":"Algebraic Foundation and Improved Methods of Induction of Ripple Down Rules","author":"Tobias S.","year":"1996","unstructured":"S. Tobias , \" Algebraic Foundation and Improved Methods of Induction of Ripple Down Rules ,\" Pasific Knowl. Acquis. Work. Sydney , pp. 23 -- 25 , 1996 . S. Tobias, \"Algebraic Foundation and Improved Methods of Induction of Ripple Down Rules,\" Pasific Knowl. Acquis. Work. Sydney, pp. 23--25, 1996.","journal-title":"Pasific Knowl. Acquis. Work. Sydney"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.2307\/1252074"},{"key":"e_1_3_2_1_28_1","first-page":"7","volume-title":"Australasian Conference on Robotics and Automation","author":"Pham K. C.","year":"2005","unstructured":"K. C. Pham and C. Sammut , \" Rdrvision-learning vision recognition with ripple down rules,\" in Proc . Australasian Conference on Robotics and Automation , 2005 , pp. 7 -- 8 . K. C. Pham and C. Sammut, \"Rdrvision-learning vision recognition with ripple down rules,\" in Proc. Australasian Conference on Robotics and Automation, 2005, pp. 7--8."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18422-7_29"},{"key":"e_1_3_2_1_30_1","volume-title":"Acquis. Knowledge-Based Syst. Work.","author":"Compton P.","year":"1996","unstructured":"P. Compton , P. Preston , G. Edwards , and K. B , \" Knowledge based systems that have some idea of their limits,\" Tenth Knowl . Acquis. Knowledge-Based Syst. Work. , 1996 . P. Compton, P. Preston, G. Edwards, and K. B, \"Knowledge based systems that have some idea of their limits,\" Tenth Knowl. Acquis. Knowledge-Based Syst. Work., 1996."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32541-0_16"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CTC.2012.13"}],"event":{"name":"ICCAE '17: 9th International Conference on Computer and Automation Engineering","sponsor":["Macquarie U., Austarlia"],"location":"Sydney Australia","acronym":"ICCAE '17"},"container-title":["Proceedings of the 9th International Conference on Computer and Automation Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3057039.3057051","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3057039.3057051","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:23Z","timestamp":1750217423000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3057039.3057051"}},"subtitle":["A Prudent Based Approach"],"short-title":[],"issued":{"date-parts":[[2017,2,18]]},"references-count":32,"alternative-id":["10.1145\/3057039.3057051","10.1145\/3057039"],"URL":"https:\/\/doi.org\/10.1145\/3057039.3057051","relation":{},"subject":[],"published":{"date-parts":[[2017,2,18]]},"assertion":[{"value":"2017-02-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}