{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:55:09Z","timestamp":1729641309640,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1109\/dasc.2006.23","type":"proceedings-article","created":{"date-parts":[[2006,12,20]],"date-time":"2006-12-20T15:59:27Z","timestamp":1166630367000},"page":"333-340","source":"Crossref","is-referenced-by-count":3,"title":["Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring"],"prefix":"10.1109","author":[{"given":"Natalia","family":"Stakhanova","sequence":"first","affiliation":[]},{"given":"Samik","family":"Basu","sequence":"additional","affiliation":[]},{"given":"Robyn","family":"Lutz","sequence":"additional","affiliation":[]},{"given":"Johnny","family":"Wong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Statistical Learning Theory","year":"1998","author":"vapnik","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/586143.586146"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/366173.366197"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2004.1265713"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00514-X"},{"key":"14","first-page":"100","article-title":"Adaptive control software: Can we guarantee safety?","author":"liu","year":"2004","journal-title":"COMPSAC"},{"key":"11","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1145\/581376.581377","article-title":"Tracking Down Software Bugs using Automatic Anomaly Detection","author":"sudheendra hangal","year":"2002","journal-title":"Proceedings of the 24th International Conference on Software Engineering ICSE 2002"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/52.605929"},{"year":"0","key":"3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924296"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2004.1317470"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.1145\/1013886.1007539","article-title":"Active learning for automatic classification of software behavior","volume":"29","author":"bowring","year":"2004","journal-title":"SIGSOFT Softw Eng Notes"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ISRE.1995.512555"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932213"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/32.908957"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0055852","article-title":"Fixed vs. variable-length patterns for detecting suspicious process behavior","author":"debar","year":"1998","journal-title":"ESORICS '98"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502675"},{"journal-title":"Computer immune systems","year":"0","author":"forrest","key":"8"}],"event":{"name":"2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing","start":{"date-parts":[[2006,9,29]]},"location":"Indianapolis, IN, USA","end":{"date-parts":[[2006,10,1]]}},"container-title":["2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4030851\/4030852\/04030900.pdf?arnumber=4030900","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T08:26:22Z","timestamp":1497687982000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4030900\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/dasc.2006.23","relation":{},"subject":[],"published":{"date-parts":[[2006]]}}}