{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T10:03:06Z","timestamp":1751104986224,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T00:00:00Z","timestamp":1695340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,9,22]]},"DOI":"10.1145\/3641584.3641812","type":"proceedings-article","created":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T22:44:43Z","timestamp":1718405083000},"page":"1511-1517","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Anomaly Detection Model for Process Resource Usage in Hybrid System based on eBPF and Isolation Forest"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-3582-0433","authenticated-orcid":false,"given":"Ziheng","family":"Zhang","sequence":"first","affiliation":[{"name":"Xi 'an University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4293-9245","authenticated-orcid":false,"given":"Lijun","family":"Chen","sequence":"additional","affiliation":[{"name":"Xi'an University of Posts and Telecommunications, China"}]}],"member":"320","published-online":{"date-parts":[[2024,6,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32813-9_10"},{"issue":"4","key":"e_1_3_2_1_2_1","first-page":"1264","article-title":"Process behavior anomaly detection based on Improved-HMM","volume":"32","author":"Dang X. C.","year":"2011","unstructured":"Dang, X. C., Ma, J., & Hao, Z. J. (2011). Process behavior anomaly detection based on Improved-HMM. Computer Engineering and Design, 32(4), 1264-1267.","journal-title":"Computer Engineering and Design"},{"issue":"6","key":"e_1_3_2_1_3_1","first-page":"21","article-title":"Incremental detection method for malware based on improved SOINN algorithm","volume":"5","author":"Zhang B.","year":"2019","unstructured":"Zhang, B., Li, L., & Dong, S. (2019). Incremental detection method for malware based on improved SOINN algorithm. Journal of Network and Information Security, 5(6), 21-30.","journal-title":"Journal of Network and Information Security"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2011.10.003"},{"key":"e_1_3_2_1_5_1","volume-title":"The next linux superpower: Ebpf primer","author":"Goldshtein S.","year":"2016","unstructured":"Goldshtein, S. (2016). The next linux superpower: Ebpf primer. USENIX Association: Dublin, Ireland."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-016-0738-0"},{"key":"e_1_3_2_1_8_1","volume-title":"2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS) (pp. 165-175)","author":"Suo K.","year":"2018","unstructured":"Suo, K., Zhao, Y., Chen, W., & Rao, J. (2018, July). vnettracer: Efficient and programmable packet tracing in virtualized networks. In 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS) (pp. 165-175). IEEE."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 2016 international conference on management of data (pp. 2201-2206)","author":"Chu X.","year":"2016","unstructured":"Chu, X., Ilyas, I. F., Krishnan, S., & Wang, J. (2016, June). Data cleaning: Overview and emerging challenges. In Proceedings of the 2016 international conference on management of data (pp. 2201-2206)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3573942.3574110"},{"volume-title":"December). Isolation forest. In 2008 eighth ieee international conference on data mining (pp. 413-422)","author":"Liu F. T.","key":"e_1_3_2_1_11_1","unstructured":"Liu, F. T., Ting, K. M., & Zhou, Z. H. (2008, December). Isolation forest. In 2008 eighth ieee international conference on data mining (pp. 413-422). IEEE."},{"key":"e_1_3_2_1_12_1","volume-title":"Isolation-based anomaly detection. ACM Transactions on Knowledge Discovery from Data (TKDD), 6(1), 1-39","author":"Liu F. T.","year":"2012","unstructured":"Liu, F. T., Ting, K. M., & Zhou, Z. H. (2012). Isolation-based anomaly detection. ACM Transactions on Knowledge Discovery from Data (TKDD), 6(1), 1-39."}],"event":{"name":"AIPR 2023: 2023 6th International Conference on Artificial Intelligence and Pattern Recognition","acronym":"AIPR 2023","location":"Xiamen China"},"container-title":["2023 6th International Conference on Artificial Intelligence and Pattern Recognition (AIPR)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3641584.3641812","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3641584.3641812","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:06Z","timestamp":1750291386000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3641584.3641812"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,22]]},"references-count":11,"alternative-id":["10.1145\/3641584.3641812","10.1145\/3641584"],"URL":"https:\/\/doi.org\/10.1145\/3641584.3641812","relation":{},"subject":[],"published":{"date-parts":[[2023,9,22]]},"assertion":[{"value":"2024-06-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}