{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:06:44Z","timestamp":1729678004260,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/dasc.2011.46","type":"proceedings-article","created":{"date-parts":[[2012,1,6]],"date-time":"2012-01-06T21:42:49Z","timestamp":1325886169000},"page":"145-150","source":"Crossref","is-referenced-by-count":2,"title":["A Bio-inspired Host-Based Multi-engine Detection System with Sequential Pattern Recognition"],"prefix":"10.1109","author":[{"given":"Frank","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Michael","family":"Frater","sequence":"additional","affiliation":[]},{"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/GCIS.2010.50"},{"journal-title":"Intelligent Optimisation Techniques Genetic Algorithms Tabu Search and Simulated Annealing","year":"2000","author":"pham","key":"17"},{"key":"18","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/ICSMC.2010.5642193","article-title":"Using differential evolution for combinatorial optimization: A general approach","author":"prado","year":"2010","journal-title":"IEEE International Conference on Systems Man and Cybernetics"},{"journal-title":"A Multi-layer Model for Anomaly Intrusion Detection Using Program Sequences of System Calls","year":"2003","author":"hoang","key":"15"},{"journal-title":"Swarm Intelligence From Natural to Artificial Systems","year":"1999","author":"bonabeau","key":"16","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195131581.001.0001"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.05.004"},{"key":"14","first-page":"42","article-title":"A simple and efficient data processing scheme for hmm based anomaly intrusion detection","volume":"23","author":"hu","year":"2009","journal-title":"Special Issue of Advances on Network Intrusion Detection IEEE Network"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2007.900662"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00026-2"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/4235.585892"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1142\/S1469026811003136"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2009.2038811"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/34.632989"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.832006"},{"key":"26","doi-asserted-by":"crossref","DOI":"10.1046\/j.1365-3083.2001.00974.x","article-title":"The danger model in it's historical context","volume":"54","author":"matzinger","year":"2001","journal-title":"Scandinavian Journal of Immunology"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2005.853419"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/NRSC.2000.838958"},{"journal-title":"Swarm Intelligence","year":"2001","author":"kennedy","key":"29"},{"key":"3","doi-asserted-by":"crossref","first-page":"1400","DOI":"10.1109\/INFOCOM.2008.198","article-title":"Optimal sleep-wake scheduling for quickest intrusion detection using wireless sensor networks","author":"premkumar","year":"2008","journal-title":"IEEE Conference on Computer Communications INFOCOM 2008"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2006.889480"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/LATINCOM.2010.5641013"},{"journal-title":"Computer Security Breaches Cost Australian Companies More Than 600m","year":"0","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/CICN.2010.66"},{"key":"7","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1109\/ICMLC.2002.1176698","article-title":"Using data mining to discover signatures in network-based intrusion detection","volume":"1","author":"hong","year":"2002","journal-title":"2002 International Conference on Machine Learning and Cybernetics"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2004.1414566"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCASM.2010.5620540"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2010.5484771"},{"key":"9","first-page":"200","article-title":"Intrusion detection using data mining techniques","author":"ektefa","year":"2010","journal-title":"Int Conference on Information Retrieval and Knowledge Management"},{"key":"8","first-page":"8","article-title":"Creation and deployment of data mining-based intrusion detection systems in oracle database l0g","author":"campos","year":"2005","journal-title":"Proceedings of the Fourth International Conference on Machine Learning and Applications"}],"event":{"name":"2011 IEEE 9th International Conference on Dependable, Autonomic and Secure Computing (DASC)","start":{"date-parts":[[2011,12,12]]},"location":"Sydney, Australia","end":{"date-parts":[[2011,12,14]]}},"container-title":["2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6118336\/6118342\/06118343.pdf?arnumber=6118343","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,25]],"date-time":"2021-12-25T10:33:04Z","timestamp":1640428384000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6118343\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/dasc.2011.46","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}