{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T00:54:05Z","timestamp":1648947245460},"reference-count":21,"publisher":"Walter de Gruyter GmbH","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,1,1]]},"DOI":"10.2478\/v10143-010-0050-6","type":"journal-article","created":{"date-parts":[[2011,1,25]],"date-time":"2011-01-25T02:06:10Z","timestamp":1295921170000},"source":"Crossref","is-referenced-by-count":0,"title":["Non-Signature-Based Methods for Anomaly Detection"],"prefix":"10.2478","volume":"42","author":[{"given":"Pavel","family":"Osipov","sequence":"first","affiliation":[]},{"given":"Arkady","family":"Borisov","sequence":"additional","affiliation":[]}],"member":"374","reference":[{"key":"1","article-title":"Detecting Intruders in Computer Systems","author":"T. Lunt"},{"key":"2","article-title":"Expert Systems in Intrusion Detection: A Case Study","author":"M. Sebring","year":"1988"},{"key":"3","unstructured":"<b>T. Kohlenberg<\/b>, (Ed.), Alder, Raven, Carter, Dr. Everett F. (Skip), Jr., Esler, Joel., Foster, James C., Jonkman Marty, Raffael, and Poor, Mike, \"Snort IDS and IPS Toolkit,\" Syngress, 2007, ISBN 978-1-59749-099-3."},{"key":"4","article-title":"A Target-Centric Ontology for Intrusion Detection","author":"J. Undercoffer","year":"2003"},{"key":"5","article-title":"Detecting Intrusion Using System Calls: Alternative Data Models","author":"C. Warrender","year":"1999","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"6","first-page":"340","volume-title":"ICCSA 2006, LNCS 3981","author":"G. Mun","year":"2006"},{"key":"7","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1016\/j.cose.2005.01.004","article-title":"CIDS: An agent-based intrusion detection system","volume":"24","author":"D. Dasgupta","year":"2005","journal-title":"Computers & Security"},{"key":"8","volume-title":"Computational Intelligence in Security for Information Systems","author":"G. Isaza","year":"2009"},{"key":"9","unstructured":"<b>S. Jha, L. Kruger, T. Kurtz, Y. Lee, A. Smith.<\/b> A Filtering Approach To Anomaly Detection and Masquerade Detection. Technical report, University of Wisconsin, Madison."},{"issue":"1","key":"10","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/s11859-006-0245-4","article-title":"An Intrusion Detection Method Based on Hierarchical Hidden Markov Models","volume":"12","author":"J. Chunfu","year":"2007","journal-title":"Wuhan University Journal of Natural Sciences"},{"key":"11","unstructured":"<b>S. Jha, K. Tan, R. A. Maxion.<\/b> Markov Chains, Classifiers and Intrusion Detection \/\/Computer SecurityFoundations Workshop (CSFW), June 2001."},{"key":"12","doi-asserted-by":"crossref","first-page":"1554","DOI":"10.1214\/aoms\/1177699147","article-title":"Statistical inference for probabilistic functions of finite state Markov chains","volume":"37","author":"L. Baum","year":"1966","journal-title":"Annals of Mathematical Statistics"},{"issue":"1","key":"13","first-page":"41","article-title":"The Hierarchical Hidden Markov Model: Analysis and Applications[J]","volume":"32","author":"S. Fine","year":"1998","journal-title":"MachineLearning"},{"issue":"8","key":"14","doi-asserted-by":"crossref","first-page":"852","DOI":"10.1109\/34.868686","article-title":"Recognition of Visual Activities and Interactions by Stochastic Parsing[J]","volume":"22","author":"Y. Ivanov","year":"2000","journal-title":"IEEE Trans on Pattern Analysis and Machine Intelligence"},{"key":"15","volume-title":"Representation: Structuring Knowledge & Data in AI Programs","author":"M. Minsky"},{"key":"16","unstructured":"DARPA Agent Markup Language+Ontology Interface Layer. <a target=\"_blank\" href='http:\/\/www.daml.org\/2001\/03\/daml+oil-index'>http:\/\/www.daml.org\/2001\/03\/daml+oil-index<\/a>"},{"key":"17","unstructured":"<b>J. Kopena.<\/b> DAMLJessKB. <a target=\"_blank\" href='http:\/\/edge.mcs.drexel.edu\/assemblies\/software\/damljesskb\/articles\/DAMLJessKB-2002.pdf'>http:\/\/edge.mcs.drexel.edu\/assemblies\/software\/damljesskb\/articles\/DAMLJessKB-2002.pdf<\/a>"},{"key":"18","doi-asserted-by":"crossref","unstructured":"The Mitnick Case: How Bayes Could Have Helped. IFIP International Federation for Information Processing, 2005, Volume 194\/2005, 91-104, DOI: 10.1007\/0-387-31163-7_8.","DOI":"10.1007\/0-387-31163-7_8"},{"key":"19","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1007\/978-3-540-76848-7_41","article-title":"Experience with Dynamic Crosscutting in Cougaar","volume":"4803","author":"J. Zinky","year":"2010","journal-title":"Lecture Notes in Computer Science"},{"key":"20","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-642-04091-7_14","article-title":"Towards Ontology-Based Intelligent Model for Intrusion Detection and Prevention","volume":"63","author":"G. Isaza","year":"2009","journal-title":"Advances in Soft Computing"},{"key":"21","doi-asserted-by":"crossref","volume-title":"Web Ontology Language: OWL","author":"G. Antoniou","DOI":"10.4018\/978-1-59904-045-5.ch005"}],"container-title":["Scientific Journal of Riga Technical University. Computer Sciences"],"original-title":[],"link":[{"URL":"https:\/\/www.degruyter.com\/view\/j\/acss.2010.42.issue--1\/v10143-010-0050-6\/v10143-010-0050-6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,30]],"date-time":"2020-05-30T16:14:05Z","timestamp":1590855245000},"score":1,"resource":{"primary":{"URL":"https:\/\/content.sciendo.com\/doi\/10.2478\/v10143-010-0050-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1,1]]},"references-count":21,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.2478\/v10143-010-0050-6","relation":{},"ISSN":["1407-7493"],"issn-type":[{"value":"1407-7493","type":"print"}],"subject":[],"published":{"date-parts":[[2010,1,1]]}}}