<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Alan Karr</style></author><author><style face="normal" font="default" size="100%">William DuMouchel</style></author><author><style face="normal" font="default" size="100%">Wen-Hua Ju</style></author><author><style face="normal" font="default" size="100%">Martin Theus</style></author><author><style face="normal" font="default" size="100%">Yehuda Vardi</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Computer intrusion: detecting masqueraders</style></title><secondary-title><style face="normal" font="default" size="100%">Statistical Science</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Anomaly</style></keyword><keyword><style  face="normal" font="default" size="100%">Bayes</style></keyword><keyword><style  face="normal" font="default" size="100%">compression</style></keyword><keyword><style  face="normal" font="default" size="100%">computer security</style></keyword><keyword><style  face="normal" font="default" size="100%">high-orderMarkov</style></keyword><keyword><style  face="normal" font="default" size="100%">profiling</style></keyword><keyword><style  face="normal" font="default" size="100%">Unix</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2001</style></year></dates><number><style face="normal" font="default" size="100%">1</style></number><volume><style face="normal" font="default" size="100%">16</style></volume><pages><style face="normal" font="default" size="100%">1-17</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Masqueraders in computer intrusion detection are people who use somebody else?s computer account. We investigate a number of statistical approaches for detecting masqueraders. To evaluate them, we collected UNIX command data from 50 users and then contaminated the data with masqueraders. The experiment was blinded. We show results from six methods, including two approaches from the computer science community.&lt;/p&gt;
</style></abstract></record></records></xml>