{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:54:11Z","timestamp":1730224451554,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/grid.2011.23","type":"proceedings-article","created":{"date-parts":[[2011,11,17]],"date-time":"2011-11-17T16:16:56Z","timestamp":1321546616000},"page":"114-120","source":"Crossref","is-referenced-by-count":0,"title":["Detecting Credential Abuse in the Grid Using Bayesian Networks"],"prefix":"10.1109","author":[{"given":"Christopher","family":"Kunz","sequence":"first","affiliation":[]},{"given":"Nina","family":"Tahmasebi","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Risse","sequence":"additional","affiliation":[]},{"given":"Matthew","family":"Smith","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"A Brief Introduction to Graphical Models and Bayesian Networks","year":"1998","author":"murphy","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.2009.99"},{"key":"ref13","volume":"10","author":"hommel","year":"2010","journal-title":"Architekturkonzept furein grid-basiertes ids"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC.2008.425"},{"journal-title":"A bayesian approach to filtering junk e-mail","year":"1998","author":"sahami","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-6264-3_67"},{"key":"ref17","first-page":"335","article-title":"Detecting spam bots in online social networking sites: A machine learning approach","volume":"6166","author":"wang","year":"2010","journal-title":"Data and Applications Security and Privacy XXIV ser Lecture Notes in Computer Science S Foresti and S Jajodia Eds Springer Berlin I Heidelberg"},{"journal-title":"A proxy credential auditing infrastructure for the uk e-science national grid service - project web page","year":"2010","author":"jie","key":"ref18"},{"journal-title":"Recommendation X S09 - The Directory Public-key and attribute certificate frameworks International Telecommunication Union Std","year":"2005","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WCINS.2010.5541857"},{"key":"ref6","first-page":"83","article-title":"A security architecture for computational grids","author":"foster","year":"0","journal-title":"Proceedings of the 5th ACM Conference on Computer and Communications Security"},{"journal-title":"The EGEE Project “glite - lightweight middleware for grid comnutinu","year":"2008","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-332-5.50055-9"},{"journal-title":"The WS-Resource Framework","year":"2004","author":"czajkowski","key":"ref7"},{"key":"ref2","first-page":"505","article-title":"A concept for grid credential lifecycle management and heuristic credential abuse detection","author":"kunz","year":"0","journal-title":"2009 Fifth International Conference on Networking and Services icns"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1177\/109434209701100205"},{"key":"ref9","article-title":"Bayesian networks","author":"pearl","year":"1996","journal-title":"MIT Encyclopedia of Cognitive Science"}],"event":{"name":"2011 12th IEEE\/ACM International Conference on Grid Computing (GRID)","start":{"date-parts":[[2011,9,21]]},"location":"Lyon, France","end":{"date-parts":[[2011,9,23]]}},"container-title":["2011 IEEE\/ACM 12th International Conference on Grid Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6075048\/6076475\/06076506.pdf?arnumber=6076506","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T13:33:05Z","timestamp":1490103185000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6076506\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/grid.2011.23","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]}}}