{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:27:07Z","timestamp":1725809227062},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/hase.2012.13","type":"proceedings-article","created":{"date-parts":[[2012,12,12]],"date-time":"2012-12-12T22:01:50Z","timestamp":1355349710000},"page":"32-39","source":"Crossref","is-referenced-by-count":7,"title":["Real-Time Anomaly Detection in Streams of Execution Traces"],"prefix":"10.1109","author":[{"given":"Wenke","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Favyen","family":"Bastani","sequence":"additional","affiliation":[]},{"given":"I-Ling","family":"Yen","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Hulin","sequence":"additional","affiliation":[]},{"given":"Farokh","family":"Bastani","sequence":"additional","affiliation":[]},{"given":"Latifur","family":"Khan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","first-page":"66","article-title":"Using finite automata to mine execution data for intrusion detection: A preliminary report","author":"michael","year":"2000","journal-title":"RAID"},{"key":"16","first-page":"975","article-title":"Probabilistic DFA inference using Kullback-Leibler divergence and minimality","author":"thollard","year":"2000","journal-title":"ICML"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1109\/SECPRI.2001.924295"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1145\/545186.545187"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/ICPR.2004.1334558"},{"year":"2002","author":"papadimitriou","journal-title":"LOCI Fast Outlier Detection Using the Local Correlation Integral","key":"12"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1145\/1188895.1188911"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1137\/1.9781611972757.26"},{"key":"1","first-page":"45","article-title":"Data mining approaches to software fault diagnosis","author":"bose","year":"2005","journal-title":"RIDE-SDMA"},{"key":"10","first-page":"535","article-title":"Enhancing effectiveness of outlier detections for low density patterns","author":"tang","year":"2002","journal-title":"PAKDD"},{"key":"7","first-page":"1200","article-title":"Multi-objective evolutionary clustering using variable-length real jumping genes genetic algorithm","author":"ripon","year":"0","journal-title":"ICPR'06"},{"key":"6","article-title":"A unified notion of outliers: Properties and computation","author":"knorr","year":"1997","journal-title":"KDD"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1137\/S0097539701398363"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1145\/1287624.1287632"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1145\/342009.335388"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/TEVC.2006.877146"}],"event":{"name":"2012 IEEE 14th International Symposium on High-Assurance Systems Engineering (HASE)","start":{"date-parts":[[2012,10,25]]},"location":"Omaha, NE, USA","end":{"date-parts":[[2012,10,27]]}},"container-title":["2012 IEEE 14th International Symposium on High-Assurance Systems Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6374352\/6375604\/06375634.pdf?arnumber=6375634","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T01:57:48Z","timestamp":1490147868000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6375634\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/hase.2012.13","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}