{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:52:56Z","timestamp":1762005176288,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":82,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["FA9550-14-1-0173"],"award-info":[{"award-number":["FA9550-14-1-0173"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007297","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-17-1-2995"],"award-info":[{"award-number":["N00014-17-1-2995"]}],"id":[{"id":"10.13039\/100007297","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100009226","name":"National Security Agency","doi-asserted-by":"publisher","award":["H98230-15-1-0271"],"award-info":[{"award-number":["H98230-15-1-0271"]}],"id":[{"id":"10.13039\/100009226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3359789.3359822","type":"proceedings-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:59Z","timestamp":1574448119000},"page":"245-256","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Improving intrusion detectors by crook-sourcing"],"prefix":"10.1145","author":[{"given":"Frederico","family":"Araujo","sequence":"first","affiliation":[{"name":"IBM Research"}]},{"given":"Gbadebo","family":"Ayoade","sequence":"additional","affiliation":[{"name":"The University of Texas at Dallas"}]},{"given":"Khaled","family":"Al-Naami","sequence":"additional","affiliation":[{"name":"The University of Texas at Dallas"}]},{"given":"Yang","family":"Gao","sequence":"additional","affiliation":[{"name":"The University of Texas at Dallas"}]},{"given":"Kevin W.","family":"Hamlen","sequence":"additional","affiliation":[{"name":"The University of Texas at Dallas"}]},{"given":"Latifur","family":"Khan","sequence":"additional","affiliation":[{"name":"The University of Texas at Dallas"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.016"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2015.19"},{"key":"e_1_3_2_1_3_1","first-page":"1","article-title":"Shadow Honeypots","volume":"2","author":"Anagnostakis Kostas G.","year":"2010","unstructured":"Kostas G. Anagnostakis , Stelios Sidiroglou , Periklis Akritidis , Michalis Polychronakis , Angelos D. Keromytis , and Evangelos P. Markatos . 2010 . Shadow Honeypots . International Journal of Computer and Network Security (IJCNS) 2 , 9 (2010), 1 -- 15 . Kostas G. Anagnostakis, Stelios Sidiroglou, Periklis Akritidis, Michalis Polychronakis, Angelos D. Keromytis, and Evangelos P. Markatos. 2010. Shadow Honeypots. International Journal of Computer and Network Security (IJCNS) 2, 9 (2010), 1--15.","journal-title":"International Journal of Computer and Network Security (IJCNS)"},{"volume-title":"Proceedings of the 24th USENIX Security Symposium.","author":"Araujo Frederico","key":"e_1_3_2_1_4_1","unstructured":"Frederico Araujo and Kevin W. Hamlen . 2015. Compiler-instrumented, Dynamic Secret-Redaction of Legacy Processes for Attacker Deception . In Proceedings of the 24th USENIX Security Symposium. Frederico Araujo and Kevin W. Hamlen. 2015. Compiler-instrumented, Dynamic Secret-Redaction of Legacy Processes for Attacker Deception. In Proceedings of the 24th USENIX Security Symposium."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660329"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831120.2831123"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2004.26"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319710"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2020.236"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241157"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(97)00063-5"},{"volume-title":"Proceedings of the 17th International Symposium on Recent Advances in Intrusion Detection (RAID). 234--254","author":"Boggs Nathaniel","key":"e_1_3_2_1_13_1","unstructured":"Nathaniel Boggs , Hang Zhao , Senyao Du , and Salvatore J. Stolfo . 2014. Synthetic Data Generation and Defense in Depth Measurement of Web Applications . In Proceedings of the 17th International Symposium on Recent Advances in Intrusion Detection (RAID). 234--254 . Nathaniel Boggs, Hang Zhao, Senyao Du, and Salvatore J. Stolfo. 2014. Synthetic Data Generation and Defense in Depth Measurement of Web Applications. In Proceedings of the 17th International Symposium on Recent Advances in Intrusion Detection (RAID). 234--254."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/646130.679965"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/604264.604269"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963436"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_2_1_18_1","article-title":"LIBSVM: A Library for Support Vector Machines","volume":"2","author":"Chang Chih-Chung","year":"2011","unstructured":"Chih-Chung Chang and Chih-Jen Lin . 2011 . LIBSVM: A Library for Support Vector Machines . ACM Transactions on Intelligent Systems and Technology (TIST) 2 , 3 (2011). Chih-Chung Chang and Chih-Jen Lin. 2011. LIBSVM: A Library for Support Vector Machines. ACM Transactions on Intelligent Systems and Technology (TIST) 2, 3 (2011).","journal-title":"ACM Transactions on Intelligent Systems and Technology (TIST)"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756006.1756042"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/GRC.2006.1635905"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/3091622.3091637"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232894"},{"key":"e_1_3_2_1_24_1","unstructured":"Jon DiMaggio. 2015. The Black Vine Cyberespionage Group. Symantec Security Response.  Jon DiMaggio. 2015. The Black Vine Cyberespionage Group. Symantec Security Response."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2013.13"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.28"},{"key":"e_1_3_2_1_27_1","unstructured":"Edgescan. 2019. Vulnerability Statistics Report.  Edgescan. 2019. Vulnerability Statistics Report."},{"volume-title":"Applications of Data Mining in Computer Security","author":"Eskin Eleazar","key":"e_1_3_2_1_28_1","unstructured":"Eleazar Eskin , Andrew Arnold , Michael Prerau , Leonid Portnoy , and Salvatore Stolfo . 2002. A Geometric Framework for Unsupervised Anomaly Detection . In Applications of Data Mining in Computer Security . Springer , 77--101. Eleazar Eskin, Andrew Arnold, Michael Prerau, Leonid Portnoy, and Salvatore Stolfo. 2002. A Geometric Framework for Unsupervised Anomaly Detection. In Applications of Data Mining in Computer Security. Springer, 77--101."},{"volume-title":"Proceedings of the 17th IEEE Symposium on Security & Privacy (S&P). 120--128","author":"Forrest Stephanie","key":"e_1_3_2_1_29_1","unstructured":"Stephanie Forrest , Steven A. Hofmeyr , Aniln Somayaji , and Thomas A. Longstaff . 1996. A Sense of Self for Unix Processes . In Proceedings of the 17th IEEE Symposium on Security & Privacy (S&P). 120--128 . Stephanie Forrest, Steven A. Hofmeyr, Aniln Somayaji, and Thomas A. Longstaff. 1996. A Sense of Self for Unix Processes. In Proceedings of the 17th IEEE Symposium on Security & Privacy (S&P). 120--128."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313503"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143892"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 30th Conference on Artificial Intelligence (AAAI). 1652--1658","author":"Haque Ahsanul","year":"2016","unstructured":"Ahsanul Haque , Latifur Khan , and Michael Baron . 2016 . SAND: Semi-supervised Adaptive Novel Class Detection and Classification Over Data Stream . In Proceedings of the 30th Conference on Artificial Intelligence (AAAI). 1652--1658 . Ahsanul Haque, Latifur Khan, and Michael Baron. 2016. SAND: Semi-supervised Adaptive Novel Class Detection and Classification Over Data Stream. In Proceedings of the 30th Conference on Artificial Intelligence (AAAI). 1652--1658."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1298081.1298084"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/2981780.2981875"},{"key":"e_1_3_2_1_38_1","volume-title":"Minimizing Damage From J.P. Morgan's Data Breach. InfoSec Reading Room","author":"Jeng Allen","year":"2015","unstructured":"Allen Jeng . 2015. Minimizing Damage From J.P. Morgan's Data Breach. InfoSec Reading Room ( 2015 ). Allen Jeng. 2015. Minimizing Damage From J.P. Morgan's Data Breach. InfoSec Reading Room (2015)."},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 22nd International Conference on Neural Information Processing Systems (NIPS). 862--870","author":"Jin Rong","year":"2009","unstructured":"Rong Jin , Shijun Wang , and Yang Zhou . 2009 . Regularized Distance Metric Learning: Theory and Algorithm . In Proceedings of the 22nd International Conference on Neural Information Processing Systems (NIPS). 862--870 . Rong Jin, Shijun Wang, and Yang Zhou. 2009. Regularized Distance Metric Learning: Theory and Algorithm. In Proceedings of the 22nd International Conference on Neural Information Processing Systems (NIPS). 862--870."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660368"},{"key":"e_1_3_2_1_41_1","unstructured":"Juniper Research. 2017. The Future of Cybercrime and Security: Key Takeaways and Juniper Leaderboard.  Juniper Research. 2017. The Future of Cybercrime and Security: Key Takeaways and Juniper Leaderboard."},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the 22nd USENIX Security Symposium. 637--652","author":"Kapravelos Alexandros","year":"2013","unstructured":"Alexandros Kapravelos , Yan Shoshitaishvili , Marco Cova , Christopher Kruegel , and Giovanni Vigna . 2013 . Revolver: An Automated Approach to the Detection of Evasive Web-based Malware . In Proceedings of the 22nd USENIX Security Symposium. 637--652 . Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, and Giovanni Vigna. 2013. Revolver: An Automated Approach to the Detection of Evasive Web-based Malware. In Proceedings of the 22nd USENIX Security Symposium. 637--652."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11047-006-9026-4"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46301-8_23"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2003.1254306"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948144"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/1090583.1648612"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/508791.508835"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"volume-title":"Proceedings of the 7th USENIX Security Symposium. 79--93","author":"Lee Wenke","key":"e_1_3_2_1_50_1","unstructured":"Wenke Lee and Salvatore J. Stolfo . 1998. Data Mining Approaches for Intrusion Detection . In Proceedings of the 7th USENIX Security Symposium. 79--93 . Wenke Lee and Salvatore J. Stolfo. 1998. Data Mining Approaches for Intrusion Detection. In Proceedings of the 7th USENIX Security Symposium. 79--93."},{"key":"e_1_3_2_1_51_1","volume-title":"Proceedings of the 22nd IEEE Symposium on Security & Privacy (S&P). 130--143","author":"Lee Wenke","year":"2001","unstructured":"Wenke Lee and Dong Xiang . 2001 . Information-theoretic Measures for Anomaly Detection . In Proceedings of the 22nd IEEE Symposium on Security & Privacy (S&P). 130--143 . Wenke Lee and Dong Xiang. 2001. Information-theoretic Measures for Anomaly Detection. In Proceedings of the 22nd IEEE Symposium on Security & Privacy (S&P). 130--143."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.03.016"},{"key":"e_1_3_2_1_53_1","unstructured":"LXC. 2019. Linux Containers. http:\/\/linuxcontainers.org.  LXC. 2019. Linux Containers. http:\/\/linuxcontainers.org."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10085-2_14"},{"key":"e_1_3_2_1_55_1","volume-title":"Proceedings of the New Security Paradigms Workshop (NSPW). 101--110","author":"Marceau Carla","year":"2001","unstructured":"Carla Marceau . 2001 . Characterizing the Behavior of a Program Using Multiple-length N-grams . In Proceedings of the New Security Paradigms Workshop (NSPW). 101--110 . Carla Marceau. 2001. Characterizing the Behavior of a Program Using Multiple-length N-grams. In Proceedings of the New Security Paradigms Workshop (NSPW). 101--110."},{"volume-title":"Data Mining Tools for Malware Detection","author":"Masud Mehedy","key":"e_1_3_2_1_56_1","unstructured":"Mehedy Masud , Latifur Khan , and Bhavani Thuraisingham . 2011. Data Mining Tools for Malware Detection . CRC Press . Mehedy Masud, Latifur Khan, and Bhavani Thuraisingham. 2011. Data Mining Tools for Malware Detection. CRC Press."},{"key":"e_1_3_2_1_57_1","article-title":"Cloud-based Malware Detection for Evolving Data Streams","volume":"2","author":"Masud Mohammad M.","year":"2008","unstructured":"Mohammad M. Masud , Tahseen M. Al-Khateeb , Kevin W. Hamlen , Jing Gao , Latifur Khan , Jiawei Han , and Bhavani Thuraisingham . 2008 . Cloud-based Malware Detection for Evolving Data Streams . ACM Transactions on Management Information Systems (TMIS) 2 , 3 (2008). Mohammad M. Masud, Tahseen M. Al-Khateeb, Kevin W. Hamlen, Jing Gao, Latifur Khan, Jiawei Han, and Bhavani Thuraisingham. 2008. Cloud-based Malware Detection for Evolving Data Streams. ACM Transactions on Management Information Systems (TMIS) 2, 3 (2008).","journal-title":"ACM Transactions on Management Information Systems (TMIS)"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13672-6_31"},{"key":"e_1_3_2_1_59_1","unstructured":"MinIO. 2019. MinIO Object Storage. https:\/\/min.io\/.  MinIO. 2019. MinIO Object Storage. https:\/\/min.io\/."},{"key":"e_1_3_2_1_60_1","unstructured":"Mockaroo. 2018. Product data set. https:\/\/www.mockaroo.com.  Mockaroo. 2018. Product data set. https:\/\/www.mockaroo.com."},{"key":"e_1_3_2_1_61_1","volume-title":"Operation Blockbuster: Unraveling the Long Thread of the Sony Attack.","author":"Novetta Threat Research Group","year":"2016","unstructured":"Novetta Threat Research Group . 2016 . Operation Blockbuster: Unraveling the Long Thread of the Sony Attack. Novetta Threat Research Group. 2016. Operation Blockbuster: Unraveling the Long Thread of the Sony Attack."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046570"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.001"},{"volume-title":"Advances in Large Margin Classifiers","author":"Platt John C.","key":"e_1_3_2_1_64_1","unstructured":"John C. Platt . 1999. Probabilistic Outputs for Support Vector Machines and Comparisons to Regularized Likelihood Methods . In Advances in Large Margin Classifiers . MIT Press , 61--74. John C. Platt. 1999. Probabilistic Outputs for Support Vector Machines and Comparisons to Regularized Likelihood Methods. In Advances in Large Margin Classifiers. MIT Press, 61--74."},{"key":"e_1_3_2_1_65_1","unstructured":"PyTorch. 2019. Open Source Deep Learning Platform. https:\/\/pytorch.org.  PyTorch. 2019. Open Source Deep Learning Platform. https:\/\/pytorch.org."},{"key":"e_1_3_2_1_66_1","volume-title":"Killing Advanced Threats in Their Tracks: An Intelligent Approach to Attack Prevention. InfoSec Reading Room","author":"Sager Tony","year":"2014","unstructured":"Tony Sager . 2014. Killing Advanced Threats in Their Tracks: An Intelligent Approach to Attack Prevention. InfoSec Reading Room ( 2014 ). Tony Sager. 2014. Killing Advanced Threats in Their Tracks: An Intelligent Approach to Attack Prevention. InfoSec Reading Room (2014)."},{"key":"e_1_3_2_1_67_1","unstructured":"Selenium. 2019. Selenium Browser Automation. http:\/\/www.seleniumhq.org.  Selenium. 2019. Selenium Browser Automation. http:\/\/www.seleniumhq.org."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813654"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"e_1_3_2_1_70_1","unstructured":"Steve Souders. 2007. High Performance Web Sites: Essential Knowledge for Front-End Engineers. O'Reilly.  Steve Souders. 2007. High Performance Web Sites: Essential Knowledge for Front-End Engineers. O'Reilly."},{"key":"e_1_3_2_1_71_1","volume-title":"Honeypots: Tracking Hackers","author":"Spitzner Lance","year":"2002","unstructured":"Lance Spitzner . 2002 . Honeypots: Tracking Hackers . Addison-Wesley . Lance Spitzner. 2002. Honeypots: Tracking Hackers. Addison-Wesley."},{"volume-title":"Internet Security Threat Report","key":"e_1_3_2_1_72_1","unstructured":"Symantec. 2018. Internet Security Threat Report , Vol. 23 . Symantec. 2018. Internet Security Threat Report, Vol. 23."},{"key":"e_1_3_2_1_73_1","unstructured":"Sysdig. 2019. Universal System Visibility Tool. https:\/\/github.com\/draios\/sysdig.  Sysdig. 2019. Universal System Visibility Tool. https:\/\/github.com\/draios\/sysdig."},{"key":"e_1_3_2_1_74_1","unstructured":"tcpdump. 2019. Tcpdump and Libpcap. https:\/\/www.tcpdump.org\/.  tcpdump. 2019. Tcpdump and Libpcap. https:\/\/www.tcpdump.org\/."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.05.029"},{"key":"e_1_3_2_1_76_1","volume-title":"Taxonomy and Survey of Collaborative Intrusion Detection. Comput. Surveys 47, 4","author":"Vasilomanolakis Emmanouil","year":"2015","unstructured":"Emmanouil Vasilomanolakis , Shankar Karuppayah , Max M\u00fchlh\u00e4user , and Mathias Fischer . 2015. Taxonomy and Survey of Collaborative Intrusion Detection. Comput. Surveys 47, 4 ( 2015 ). Emmanouil Vasilomanolakis, Shankar Karuppayah, Max M\u00fchlh\u00e4user, and Mathias Fischer. 2015. Taxonomy and Survey of Collaborative Intrusion Detection. Comput. Surveys 47, 4 (2015)."},{"key":"e_1_3_2_1_77_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium.","author":"Wang Tao","year":"2014","unstructured":"Tao Wang , Xiang Cai , Rishab Nithyanand , Rob Johnson , and Ian Goldberg . 2014 . Effective Attacks and Provable Defenses for Website Fingerprinting . In Proceedings of the 23rd USENIX Security Symposium. Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, and Ian Goldberg. 2014. Effective Attacks and Provable Defenses for Website Fingerprinting. In Proceedings of the 23rd USENIX Security Symposium."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.05.018"},{"volume-title":"Anomaly Detection as a Service: Challenges, Advances, and Opportunities","author":"Yao Danfeng","key":"e_1_3_2_1_80_1","unstructured":"Danfeng Yao , Xiaokui Shu , Long Cheng , Salvatore J. Stolfo , Elisa Bertino , and Ravi Sandhu . 2017. Anomaly Detection as a Service: Challenges, Advances, and Opportunities . Morgan & Claypool Publishers . Danfeng Yao, Xiaokui Shu, Long Cheng, Salvatore J. Stolfo, Elisa Bertino, and Ravi Sandhu. 2017. Anomaly Detection as a Service: Challenges, Advances, and Opportunities. Morgan & Claypool Publishers."},{"key":"e_1_3_2_1_81_1","first-page":"26","article-title":"Using Deception to Hide Things From Hackers: Processes, Principles, and Techniques","volume":"5","author":"Yuill Jim","year":"2006","unstructured":"Jim Yuill , Dorothy Denning , and Fred Feer . 2006 . Using Deception to Hide Things From Hackers: Processes, Principles, and Techniques . Journal of Information Warfare 5 , 3 (2006), 26 -- 40 . Jim Yuill, Dorothy Denning, and Fred Feer. 2006. Using Deception to Hide Things From Hackers: Processes, Principles, and Techniques. Journal of Information Warfare 5, 3 (2006), 26--40.","journal-title":"Journal of Information Warfare"},{"key":"e_1_3_2_1_82_1","volume-title":"Proceedings of the 11th International Conference on Collaborative Computing: Networking, Applications, and Worksharing (CollaborateCom). 267--278","author":"Zhang Ming","year":"2015","unstructured":"Ming Zhang , Boyi Xu , and Dongxia Wang . 2015 . An Anomaly Detection Model for Network Intrusions Using One-class SVM and Scaling Strategy . In Proceedings of the 11th International Conference on Collaborative Computing: Networking, Applications, and Worksharing (CollaborateCom). 267--278 . Ming Zhang, Boyi Xu, and Dongxia Wang. 2015. An Anomaly Detection Model for Network Intrusions Using One-class SVM and Scaling Strategy. In Proceedings of the 11th International Conference on Collaborative Computing: Networking, Applications, and Worksharing (CollaborateCom). 267--278."}],"event":{"name":"ACSAC '19: 2019 Annual Computer Security Applications Conference","acronym":"ACSAC '19","location":"San Juan Puerto Rico USA"},"container-title":["Proceedings of the 35th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359822","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359822","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359822","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:45:04Z","timestamp":1750203904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359822"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":82,"alternative-id":["10.1145\/3359789.3359822","10.1145\/3359789"],"URL":"https:\/\/doi.org\/10.1145\/3359789.3359822","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}