{"id":"https://openalex.org/W2128289936","doi":"https://doi.org/10.1109/fuzz.2003.1206606","title":"Classification of anomalous traces of privileged and parallel programs by neural networks","display_name":"Classification of anomalous traces of privileged and parallel programs by neural networks","publication_year":2004,"publication_date":"2004-03-02","ids":{"openalex":"https://openalex.org/W2128289936","doi":"https://doi.org/10.1109/fuzz.2003.1206606","mag":"2128289936"},"language":"en","primary_location":{"id":"doi:10.1109/fuzz.2003.1206606","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fuzz.2003.1206606","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100741995","display_name":"Zhen Liu","orcid":"https://orcid.org/0000-0002-9359-9889"},"institutions":[{"id":"https://openalex.org/I99041443","display_name":"Mississippi State University","ror":"https://ror.org/0432jq872","country_code":"US","type":"education","lineage":["https://openalex.org/I4210141039","https://openalex.org/I99041443"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Zhen Liu","raw_affiliation_strings":["Department of Computer Science, Center For Computer Security Research, Mississippi State University, MS, USA","Dept. of Comput. Sci., Mississippi State Univ., MS, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Center For Computer Security Research, Mississippi State University, MS, USA","institution_ids":["https://openalex.org/I99041443"]},{"raw_affiliation_string":"Dept. of Comput. Sci., Mississippi State Univ., MS, USA#TAB#","institution_ids":["https://openalex.org/I99041443"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111501188","display_name":"S.M. Bridges","orcid":null},"institutions":[{"id":"https://openalex.org/I99041443","display_name":"Mississippi State University","ror":"https://ror.org/0432jq872","country_code":"US","type":"education","lineage":["https://openalex.org/I4210141039","https://openalex.org/I99041443"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"S.M. Bridges","raw_affiliation_strings":["Department of Computer Science, Center For Computer Security Research, Mississippi State University, MS, USA","Dept. of Comput. Sci., Mississippi State Univ., MS, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Center For Computer Security Research, Mississippi State University, MS, USA","institution_ids":["https://openalex.org/I99041443"]},{"raw_affiliation_string":"Dept. of Comput. Sci., Mississippi State Univ., MS, USA#TAB#","institution_ids":["https://openalex.org/I99041443"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087064145","display_name":"Rayford B. Vaughn","orcid":null},"institutions":[{"id":"https://openalex.org/I99041443","display_name":"Mississippi State University","ror":"https://ror.org/0432jq872","country_code":"US","type":"education","lineage":["https://openalex.org/I4210141039","https://openalex.org/I99041443"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"R.B. Vaughn","raw_affiliation_strings":["Department of Computer Science, Center For Computer Security Research, Mississippi State University, MS, USA","Dept. of Comput. Sci., Mississippi State Univ., MS, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Center For Computer Security Research, Mississippi State University, MS, USA","institution_ids":["https://openalex.org/I99041443"]},{"raw_affiliation_string":"Dept. of Comput. Sci., Mississippi State Univ., MS, USA#TAB#","institution_ids":["https://openalex.org/I99041443"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100741995"],"corresponding_institution_ids":["https://openalex.org/I99041443"],"apc_list":null,"apc_paid":null,"fwci":1.2617,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.84661226,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"2","issue":null,"first_page":"1225","last_page":"1230"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7805463671684265},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7056293487548828},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.6835762858390808},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.6698775291442871},{"id":"https://openalex.org/keywords/locality","display_name":"Locality","score":0.6627612709999084},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.6218333840370178},{"id":"https://openalex.org/keywords/system-call","display_name":"System call","score":0.5555734634399414},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5251064896583557},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4875189960002899},{"id":"https://openalex.org/keywords/locality-of-reference","display_name":"Locality of reference","score":0.4531155824661255},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.41445767879486084},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.39548182487487793},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.38735082745552063},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3495895564556122},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.09680527448654175},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.07308319211006165}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7805463671684265},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7056293487548828},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.6835762858390808},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.6698775291442871},{"id":"https://openalex.org/C2779808786","wikidata":"https://www.wikidata.org/wiki/Q6664603","display_name":"Locality","level":2,"score":0.6627612709999084},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.6218333840370178},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.5555734634399414},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5251064896583557},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4875189960002899},{"id":"https://openalex.org/C27602214","wikidata":"https://www.wikidata.org/wiki/Q1868547","display_name":"Locality of reference","level":3,"score":0.4531155824661255},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.41445767879486084},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.39548182487487793},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.38735082745552063},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3495895564556122},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.09680527448654175},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.07308319211006165},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fuzz.2003.1206606","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fuzz.2003.1206606","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320320875","display_name":"Deutscher Akademischer Austauschdienst","ror":"https://ror.org/039djdh30"},{"id":"https://openalex.org/F4320337345","display_name":"Office of Naval Research","ror":"https://ror.org/00rk2pe57"},{"id":"https://openalex.org/F4320338295","display_name":"Army Research Laboratory","ror":"https://ror.org/011hc8f90"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1530582330","https://openalex.org/W1583975142","https://openalex.org/W1592090113","https://openalex.org/W1670263352","https://openalex.org/W1941427975","https://openalex.org/W2036548030","https://openalex.org/W2123180327","https://openalex.org/W2123886726","https://openalex.org/W2124776405","https://openalex.org/W2125109784","https://openalex.org/W2129860818","https://openalex.org/W2155653793","https://openalex.org/W6634829514","https://openalex.org/W6635409250","https://openalex.org/W6678329373","https://openalex.org/W6678648185"],"related_works":["https://openalex.org/W1555349535","https://openalex.org/W2583128298","https://openalex.org/W2053359564","https://openalex.org/W2161159383","https://openalex.org/W1495260638","https://openalex.org/W1511204342","https://openalex.org/W2369125128","https://openalex.org/W2369223577","https://openalex.org/W2010020348","https://openalex.org/W4238138329"],"abstract_inverted_index":{"The":[0,47],"focus":[1],"of":[2,24,40,49,55,71,75,82,87,91,108,121],"intrusion":[3,14],"detection":[4,86],"has":[5,18],"recently":[6],"shifted":[7],"from":[8],"user-based":[9],"and":[10],"connection-based":[11],"to":[12],"process-based":[13],"detection.":[15],"Substantial":[16],"research":[17],"been":[19],"done":[20],"in":[21,89],"the":[22,38,53,56,61,69,106,119],"analysis":[23],"system":[25,92],"call":[26],"logs":[27],"using":[28],"different":[29,77],"methods":[30,78,101],"including":[31],"neural":[32,95],"networks.":[33,96],"Detection":[34],"is":[35,52],"based":[36,85],"on":[37],"classification":[39,48,81],"short":[41,62],"sequences":[42,90],"as":[43],"anomalous":[44],"or":[45],"normal.":[46],"interest,":[50],"however,":[51],"status":[54],"program":[57,83],"trace,":[58],"not":[59],"just":[60],"sequences.":[63],"In":[64],"this":[65],"paper":[66],"we":[67],"report":[68],"results":[70,98],"a":[72],"comparative":[73],"study":[74],"three":[76],"for":[79],"on-line":[80],"traces":[84],"anomalies":[88,109],"calls":[93],"by":[94],"These":[97],"demonstrate":[99],"that":[100,102,115],"use":[103],"information":[104],"about":[105],"locality":[107],"are":[110],"more":[111],"effective":[112],"than":[113],"those":[114],"only":[116],"look":[117],"at":[118],"number":[120],"anomalies.":[122]},"counts_by_year":[{"year":2015,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
