Entry Ali:2013:AAD from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Ali:2013:AAD,
author = "Muhammad Qasim Ali and Ehab Al-Shaer and Hassan Khan
and Syed Ali Khayam",
title = "Automated Anomaly Detector Adaptation using Adaptive
Threshold Tuning",
journal = j-TISSEC,
volume = "15",
number = "4",
pages = "17:1--17:??",
month = apr,
year = "2013",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/2445566.2445569",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Thu Apr 4 18:18:20 MDT 2013",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "Real-time network- and host-based Anomaly Detection
Systems (ADSs) transform a continuous stream of input
data into meaningful and quantifiable anomaly scores.
These scores are subsequently compared to a fixed
detection threshold and classified as either benign or
malicious. We argue that a real-time ADS' input changes
considerably over time and a fixed threshold value
cannot guarantee good anomaly detection accuracy for
such a time-varying input. In this article, we propose
a simple and generic technique to adaptively tune the
detection threshold of any ADS that works on threshold
method. To this end, we first perform statistical and
information-theoretic analysis of network- and
host-based ADSs' anomaly scores to reveal a consistent
time correlation structure during benign activity
periods. We model the observed correlation structure
using Markov chains, which are in turn used in a
stochastic target tracking framework to adapt an ADS'
detection threshold in accordance with real-time
measurements. We also use statistical techniques to
make the proposed algorithm resilient to sporadic
changes and evasion attacks. In order to evaluate the
proposed approach, we incorporate the proposed adaptive
thresholding module into multiple ADSs and evaluate
those ADSs over comprehensive and independently
collected network and host attack datasets. We show
that, while reducing the need of human threshold
configuration, the proposed technique provides
considerable and consistent accuracy improvements for
all evaluated ADSs.",
acknowledgement = ack-nhfb,
articleno = "17",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
}
Related entries
- accuracy,
2(3)295,
11(2)2,
12(1)4,
12(2)13,
12(3)17,
13(4)35,
13(4)38,
15(2)7,
15(3)12,
17(3)12,
18(4)12
- activity,
2(1)65,
11(4)20,
12(1)4,
12(2)13,
16(4)14,
17(3)12
- adapt,
1(1)93,
15(3)13
- adaptive,
10(4)6,
11(4)19,
18(4)12
- Al-Shaer, Ehab,
18(2)7
- algorithm,
1(1)26,
2(1)3,
2(1)65,
2(1)105,
2(3)295,
9(2)162,
9(4)391,
9(4)421,
10(1)4,
10(4)3,
11(1)4,
11(3)12,
12(2)8,
12(3)17,
12(4)20,
13(1)10,
13(3)20,
13(3)22,
13(3)24,
13(3)26,
13(3)27,
13(3)28,
13(4)36,
13(4)41,
14(1)3,
14(1)13,
14(3)25,
15(3)11,
15(4)15,
16(1)4,
17(3)11,
17(4)13,
18(1)1,
18(1)4,
18(4)14
- Ali, Muhammad Qasim,
18(2)7
- all,
1(1)93,
2(2)159,
2(3)332,
2(4)416,
10(1)4,
10(2)5,
10(4)2,
10(4)4,
11(2)1,
11(2)3,
11(2)4,
11(2)5,
11(2)6,
11(3)13,
11(4)18,
11(4)20,
11(4)22,
12(2)10,
12(3)18,
13(1)10,
13(3)25,
13(3)28,
13(4)38,
13(4)41,
14(1)6,
14(1)14,
14(3)27,
15(1)4,
15(2)9,
15(3)14,
15(4)16,
16(1)4,
17(1)2,
17(3)9,
17(3)11,
18(1)2,
18(2)5
- analysis,
1(1)66,
2(1)34,
2(2)138,
2(3)230,
2(3)332,
4(1)1,
6(4)443,
7(2)175,
7(4)489,
8(3)312,
9(3)292,
9(4)391,
10(1)2,
10(3)9,
10(3)10,
10(3)11,
10(4)2,
10(4)6,
11(2)3,
11(3)13,
11(3)15,
11(4)17,
11(4)18,
11(4)23,
12(1)4,
12(2)10,
12(3)16,
13(1)10,
13(3)25,
13(3)26,
13(3)27,
13(4)41,
14(1)6,
14(1)8,
14(1)13,
14(2)15,
14(4)28,
15(3)14,
15(4)18,
16(1)2,
16(1)4,
16(2)8,
16(3)10,
16(3)11,
16(4)14,
16(4)17,
17(1)1,
17(1)4,
17(2)7,
17(3)9,
17(4)14,
18(1)1,
18(1)4,
18(2)6
- anomaly,
2(3)295,
5(3)203,
12(2)12
- any,
1(1)66,
1(1)93,
2(4)390,
9(4)461,
10(3)10,
10(3)12,
10(4)1,
10(4)4,
11(2)4,
11(2)6,
11(3)13,
11(3)16,
11(4)20,
12(1)3,
12(1)5,
12(1)6,
12(2)8,
12(2)9,
12(2)10,
12(3)14,
12(3)18,
12(3)19,
12(4)20,
13(1)10,
13(3)28,
13(4)33,
13(4)39,
14(1)6,
14(1)8,
14(1)9,
14(4)32,
15(1)2,
15(2)9,
15(2)10,
16(2)6,
16(2)7,
16(3)12,
16(4)13,
16(4)15,
17(2)8,
17(3)9,
17(3)11,
18(1)1
- approach,
1(1)3,
1(1)26,
2(1)34,
2(2)138,
2(3)269,
2(3)295,
5(2)119,
5(3)203,
6(1)128,
7(3)392,
9(4)391,
9(4)421,
10(1)2,
10(1)4,
10(3)11,
10(3)12,
10(4)4,
11(1)3,
11(3)15,
11(3)16,
11(4)17,
11(4)19,
12(1)1,
12(1)4,
12(2)11,
12(3)14,
13(3)20,
13(3)24,
13(4)31,
13(4)35,
13(4)36,
14(1)8,
14(3)23,
14(4)29,
15(1)4,
15(3)12,
15(3)13,
15(4)15,
15(4)18,
16(2)5,
16(2)7,
16(2)8,
16(4)15,
16(4)16,
17(3)12,
17(4)14,
18(2)5,
18(2)7,
18(3)11
- argue,
12(2)8,
14(4)28,
15(3)12
- article,
10(1)3,
11(1)3,
11(1)4,
11(2)5,
11(3)12,
11(3)14,
11(3)15,
11(3)16,
11(4)20,
11(4)22,
11(4)23,
12(1)1,
12(1)2,
12(1)4,
12(1)6,
12(2)8,
12(2)10,
12(2)13,
12(3)14,
12(3)16,
12(3)17,
12(3)19,
12(4)21,
12(4)22,
13(3)22,
13(3)24,
13(3)25,
13(3)27,
13(3)28,
13(4)29,
13(4)31,
13(4)32,
13(4)34,
13(4)36,
13(4)41,
14(1)2,
14(1)3,
14(1)4,
14(1)10,
14(1)13,
14(1)14,
14(3)23,
14(3)25,
14(4)30,
15(2)9,
15(2)10,
15(3)11,
15(3)12,
15(3)13,
15(4)15,
15(4)16,
16(1)1,
16(1)4,
16(2)6,
16(2)7,
16(2)8,
16(3)10,
16(4)14,
16(4)15,
17(2)8,
17(3)9,
17(3)11,
17(3)12,
17(4)13,
17(4)16,
18(1)3,
18(2)5,
18(2)7,
18(3)9,
18(3)10,
18(3)11,
18(4)12,
18(4)14
- automated,
6(1)1,
9(3)352,
10(3)12,
12(1)4,
13(1)2,
15(1)3,
15(3)12,
17(4)14,
18(3)9
- based, host-,
6(2)173
- benign,
11(4)22
- cannot,
1(1)66,
2(2)177,
10(2)7,
11(3)12,
11(3)13,
12(1)5,
12(2)9,
12(3)14,
13(3)20,
13(4)39,
14(3)27,
15(2)6,
15(2)9,
16(1)3,
16(4)16
- chain,
2(2)159,
10(4)3,
12(3)15,
14(1)5,
15(1)2,
18(2)7
- change,
2(3)332,
12(3)14,
13(4)30,
13(4)34,
14(1)2,
15(3)13,
15(4)16,
16(4)17,
17(4)15,
18(3)9
- collected,
11(2)3,
12(2)8,
16(2)8,
17(3)10,
17(4)14,
18(2)7,
18(3)11,
18(4)13
- compared,
2(3)269,
11(3)14,
12(1)3,
12(3)18,
16(2)7,
17(3)10
- comprehensive,
10(1)2,
10(4)2,
11(3)12,
13(3)24,
15(4)18,
17(3)12,
18(1)4
- configuration,
2(2)177,
12(3)14,
15(3)13,
15(4)15,
17(2)5,
18(1)4,
18(2)7
- considerable,
10(2)6,
14(1)14,
17(4)14,
18(1)2
- considerably,
16(2)8
- consistent,
2(1)34,
12(2)8,
13(3)25,
14(1)2,
14(4)32
- continuous,
18(3)11,
18(4)14
- correlation,
10(1)4,
16(3)12
- dataset,
10(1)4,
10(4)4,
12(1)4,
13(4)32,
15(4)15,
16(2)8,
16(4)14,
17(3)12,
18(2)7,
18(4)12,
18(4)14
- detection,
2(2)159,
2(3)295,
3(1)1,
3(3)186,
3(4)227,
3(4)262,
4(4)407,
5(3)203,
6(2)173,
6(4)443,
7(4)591,
9(1)61,
10(1)4,
11(2)2,
11(3)12,
11(3)15,
11(4)19,
11(4)20,
12(2)11,
12(2)12,
12(2)13,
12(4)22,
13(2)12,
13(4)30,
14(1)13,
14(3)27,
15(2)6,
15(3)11,
17(4)13,
17(4)15,
18(1)2,
18(2)7,
18(3)9
- during,
1(1)26,
9(4)421,
11(1)3,
11(4)18,
12(2)8,
13(3)25,
15(3)13,
17(2)6,
17(3)10
- either,
2(4)390,
10(1)2,
11(1)2,
11(2)3,
11(4)18,
11(4)23,
12(1)2,
13(4)33,
14(1)9,
15(3)14,
16(4)15,
16(4)16,
16(4)17,
17(1)2,
18(2)5
- end,
9(4)461,
10(2)8,
14(2)19,
15(1)2,
17(3)10,
18(1)1,
18(2)7
- evaluate,
2(2)138,
2(4)354,
10(4)3,
11(2)3,
11(3)12,
11(3)14,
13(3)26,
13(4)30,
13(4)35,
14(1)3,
15(3)13,
16(1)2,
16(2)6,
17(1)1,
17(2)8,
17(4)14,
18(4)14
- evaluated,
10(4)3,
11(4)17,
13(3)26,
16(4)16,
16(4)17
- evasion,
18(2)7
- first,
2(1)34,
2(1)105,
2(4)354,
9(2)181,
10(4)6,
11(2)3,
11(2)4,
11(3)13,
11(4)18,
11(4)22,
12(1)3,
12(1)5,
12(3)18,
12(4)22,
13(4)31,
13(4)32,
14(1)13,
14(3)25,
14(4)30,
14(4)31,
15(4)18,
16(3)10,
17(1)4,
17(2)6,
17(3)11,
18(1)4,
18(3)9,
18(4)12,
18(4)13
- fixed,
11(2)3
- framework,
2(3)295,
3(4)227,
6(1)71,
6(3)404,
7(2)175,
8(2)187,
9(2)181,
9(4)391,
10(1)2,
10(3)10,
11(1)3,
11(3)12,
11(4)19,
11(4)20,
12(1)2,
12(1)4,
12(1)5,
12(3)19,
12(4)21,
13(3)24,
13(3)28,
14(1)9,
14(1)11,
14(2)21,
14(4)31,
15(2)10,
15(3)12,
15(3)14,
16(1)2,
16(3)9,
16(4)15,
16(4)17,
17(1)3,
17(2)5,
17(2)7,
17(3)11,
17(3)12,
17(4)13,
17(4)14,
17(4)15,
18(1)4,
18(3)10,
18(4)12
- generic,
11(2)4,
13(4)33,
16(2)6,
16(4)15,
18(3)9
- good,
11(4)18,
12(1)2,
12(1)4,
12(3)17,
13(4)32,
13(4)38,
18(1)1,
18(1)2
- guarantee,
2(2)159,
10(3)11,
10(4)4,
11(2)4,
11(2)5,
12(2)8,
12(2)9,
12(4)21,
13(3)21,
15(1)3,
18(1)4,
18(4)12
- host,
2(2)177,
11(2)2,
11(3)16,
12(2)12,
12(3)14,
13(4)38,
15(2)6,
15(4)16
- host-based,
6(2)173
- human,
12(1)1,
15(3)12,
16(2)8,
16(4)16,
18(1)3
- improvement,
10(2)6,
11(4)17,
13(4)33,
15(1)5
- incorporate,
15(1)4
- independently,
10(2)8,
12(1)6,
14(3)27
- input,
10(4)3,
10(4)4,
12(2)10,
14(1)7,
14(3)27,
14(4)32,
15(4)15,
16(1)4,
16(2)6,
18(1)4
- make,
2(3)332,
9(1)31,
10(1)2,
10(3)11,
10(4)6,
11(1)4,
11(3)13,
11(3)14,
11(4)22,
11(4)23,
12(1)1,
12(3)15,
13(3)22,
13(3)26,
13(3)28,
13(4)35,
14(4)29,
15(1)3,
15(1)4,
16(3)10,
17(3)10,
18(1)1,
18(2)7,
18(4)13
- malicious,
2(2)177,
2(3)295,
10(3)11,
10(4)6,
11(2)2,
11(3)13,
11(3)14,
11(3)15,
11(4)22,
11(4)23,
12(2)12,
12(3)14,
14(1)13,
15(1)2,
16(2)6,
16(3)12,
16(4)13,
16(4)14,
17(3)10,
17(3)12,
17(4)13,
18(2)5
- Markov,
13(4)35,
18(2)7
- meaningful,
11(4)19,
15(2)10
- measurement,
2(4)416,
10(4)4,
14(1)13,
18(4)12
- method,
1(1)3,
1(1)26,
2(2)159,
2(3)295,
2(3)332,
2(4)416,
9(3)259,
10(1)3,
10(3)10,
10(4)4,
10(4)5,
11(2)2,
11(3)16,
11(4)19,
11(4)22,
12(1)2,
12(1)6,
12(2)13,
12(3)16,
13(2)15,
13(4)35,
15(1)4,
15(2)10,
15(3)12,
15(4)15,
17(3)12,
18(3)9
- module,
7(2)175,
13(3)28,
17(2)6,
18(2)7
- multiple,
2(2)138,
2(2)177,
2(4)390,
11(1)4,
11(4)18,
11(4)22,
11(4)23,
12(1)3,
13(4)32,
13(4)36,
14(1)4,
14(1)6,
14(3)25,
14(4)31,
15(1)2,
15(3)13,
15(4)16,
18(4)13
- need,
2(2)177,
2(3)230,
2(4)390,
9(4)421,
10(4)2,
10(4)3,
12(3)17,
13(3)22,
15(4)18,
16(2)6,
17(3)10,
18(2)6,
18(2)7
- observed,
14(3)25,
16(2)8,
17(2)8
- order,
1(1)3,
9(2)181,
9(4)391,
9(4)461,
10(1)4,
10(2)5,
10(3)12,
11(2)6,
12(1)1,
12(1)3,
12(3)18,
13(3)24,
16(1)4,
17(2)6,
17(3)11,
18(1)2
- perform,
2(2)177,
2(3)269,
9(4)461,
12(2)11,
13(4)40,
15(2)6,
15(2)10,
15(3)14,
16(1)4,
16(2)8,
17(2)6
- period,
11(2)5,
12(2)8,
13(4)37,
15(2)7,
16(2)8,
16(4)13
- propose,
1(1)26,
2(1)65,
2(2)138,
2(3)269,
9(2)162,
9(4)391,
9(4)421,
10(1)3,
10(1)4,
10(3)12,
10(4)1,
10(4)3,
10(4)4,
10(4)6,
11(1)3,
11(1)4,
11(3)12,
11(3)15,
11(4)18,
11(4)19,
11(4)23,
12(1)4,
12(2)8,
12(2)11,
12(2)13,
12(3)18,
13(3)28,
13(4)32,
13(4)36,
13(4)40,
13(4)41,
14(1)5,
14(1)10,
14(1)11,
14(3)24,
14(3)26,
14(4)30,
15(2)7,
16(1)2,
16(4)15,
16(4)16,
17(1)1,
17(3)10,
17(3)11,
17(3)12,
17(4)13,
17(4)14,
18(1)2,
18(2)7
- proposed,
1(1)93,
2(2)138,
2(3)269,
2(4)416,
4(3)224,
9(2)162,
9(4)421,
10(1)2,
10(3)12,
10(4)4,
11(1)2,
11(1)3,
11(2)5,
11(3)14,
11(4)22,
11(4)23,
12(1)2,
12(1)3,
12(3)18,
12(4)21,
13(3)20,
13(3)27,
13(3)28,
13(4)36,
13(4)38,
13(4)39,
14(3)24,
14(3)27,
15(1)5,
15(3)11,
15(3)13,
15(4)15,
16(3)10,
16(3)11,
16(4)14,
16(4)16,
17(1)3,
17(4)14,
18(3)11
- provide,
1(1)3,
1(1)93,
2(1)3,
2(1)34,
2(1)65,
2(1)105,
2(3)230,
2(4)390,
7(2)319,
10(1)3,
10(2)8,
10(3)10,
10(4)2,
10(4)6,
11(1)3,
11(1)4,
11(2)2,
11(3)12,
11(3)13,
11(4)17,
11(4)20,
11(4)23,
12(1)2,
12(1)3,
12(2)8,
12(2)9,
12(3)14,
12(3)15,
12(3)16,
12(4)22,
13(3)22,
13(3)24,
13(4)31,
13(4)34,
13(4)38,
13(4)41,
14(1)4,
14(1)7,
14(1)8,
14(3)25,
14(4)28,
15(2)6,
15(2)10,
15(4)18,
16(1)3,
16(2)5,
16(3)9,
16(3)11,
16(4)17,
17(2)5,
17(3)11,
17(3)12,
17(4)16,
18(1)1,
18(1)2,
18(2)5,
18(2)7,
18(4)13,
18(4)14
- real-time,
14(4)31,
18(2)5
- reducing,
2(3)295,
11(4)18,
14(1)3,
15(2)6,
18(2)5
- resilient,
10(4)6,
11(3)13,
11(4)22,
12(4)20,
17(4)13
- reveal,
12(1)6,
12(2)13,
13(1)10,
13(4)30,
17(1)1
- score,
12(1)6,
17(1)1
- Shaer, Ehab, Al-,
18(2)7
- simple,
2(3)230,
5(3)203,
9(2)181,
10(1)4,
10(3)11,
12(2)9,
12(2)13,
12(3)18,
12(4)21,
12(4)22,
13(3)26,
13(4)33,
14(3)27,
15(2)9,
17(1)2,
18(1)1
- statistical,
9(1)31,
12(2)13,
14(3)27,
16(2)8
- stream,
6(2)258,
7(2)319,
10(4)4,
12(3)16,
13(3)28,
14(1)5,
14(3)26,
16(3)10,
17(4)16,
18(1)4
- structure,
2(4)354,
9(2)113,
9(4)421,
10(3)11,
12(1)4,
12(3)15,
13(4)32,
14(1)4,
18(2)8
- subsequently,
16(4)15
- target,
2(4)416,
11(4)23,
13(3)20,
13(3)28,
13(4)35,
15(2)10,
16(4)14,
17(4)13,
17(4)16
- technique,
1(1)3,
2(2)138,
2(3)230,
2(3)295,
2(4)416,
7(2)274,
9(4)391,
9(4)461,
10(2)6,
10(3)9,
10(4)6,
11(2)2,
11(3)12,
11(3)16,
11(4)17,
11(4)18,
11(4)22,
12(1)4,
12(2)11,
12(2)13,
12(3)16,
12(3)18,
13(3)22,
13(3)25,
13(3)28,
13(4)32,
13(4)33,
13(4)35,
13(4)36,
13(4)39,
14(1)3,
14(1)5,
14(1)6,
14(1)13,
14(3)24,
14(4)32,
15(1)2,
15(1)5,
15(2)7,
15(2)8,
15(3)12,
15(4)18,
16(1)2,
16(2)6,
16(2)7,
16(3)11,
16(4)13,
16(4)14,
17(3)9,
17(3)12,
17(4)16,
18(1)2,
18(2)6,
18(3)11
- threshold,
10(4)1,
12(1)6
- time,
2(1)105,
2(3)332,
2(4)390,
2(4)416,
9(4)461,
10(1)3,
10(2)8,
11(2)3,
11(2)4,
11(2)5,
11(3)13,
11(4)17,
11(4)20,
11(4)21,
11(4)23,
12(2)8,
12(3)17,
12(3)18,
12(3)19,
12(4)20,
12(4)21,
12(4)22,
13(4)37,
13(4)39,
14(1)2,
14(1)11,
14(1)14,
14(3)26,
14(4)31,
15(2)7,
15(3)12,
16(1)4,
16(4)13,
16(4)14,
16(4)17,
17(3)9,
17(3)10,
17(3)11,
17(4)13,
18(1)2,
18(1)4,
18(3)10
- time, real-,
14(4)31,
18(2)5
- tracking,
2(4)354,
12(2)11,
15(2)7
- transform,
2(3)295,
15(2)10
- turn,
11(2)1,
11(2)6,
12(1)6,
18(2)7
- use,
2(1)3,
2(1)105,
2(2)138,
2(2)177,
2(3)230,
2(3)269,
2(3)332,
2(4)354,
2(4)390,
4(2)103,
7(1)21,
9(4)391,
9(4)421,
9(4)461,
10(1)4,
10(2)5,
10(3)11,
10(4)1,
10(4)3,
10(4)5,
10(4)6,
11(1)2,
11(1)3,
11(1)4,
11(2)1,
11(2)4,
11(3)13,
11(3)14,
11(4)18,
11(4)19,
11(4)21,
11(4)22,
12(2)10,
12(3)16,
12(3)18,
13(3)22,
13(3)24,
13(3)25,
13(4)29,
13(4)31,
13(4)36,
14(1)6,
14(1)8,
14(1)10,
14(1)11,
14(4)31,
14(4)32,
15(1)3,
15(1)4,
15(1)5,
15(2)7,
15(3)12,
15(4)15,
15(4)16,
16(2)8,
16(4)15,
16(4)17,
17(2)5,
17(2)6,
17(2)7,
17(2)8,
17(4)15,
17(4)16,
18(1)1,
18(2)6,
18(3)9,
18(4)14
- used,
1(1)3,
2(1)65,
2(4)416,
7(2)319,
9(2)181,
10(1)2,
10(2)5,
10(2)7,
10(2)8,
10(4)2,
11(1)2,
11(1)3,
11(2)3,
11(3)14,
11(3)15,
11(3)16,
11(4)21,
11(4)22,
12(2)8,
12(3)15,
13(1)10,
13(3)22,
13(3)25,
13(4)29,
13(4)34,
14(1)3,
14(1)12,
14(1)13,
14(3)27,
15(1)3,
15(1)5,
15(3)12,
15(4)18,
16(2)7,
16(2)8,
16(3)10,
17(1)1,
17(2)7,
17(3)9,
17(4)13,
18(1)3,
18(2)5,
18(2)6,
18(3)9,
18(4)13,
18(4)14
- using,
2(2)138,
2(2)177,
2(3)332,
4(3)289,
6(2)258,
6(3)327,
9(2)113,
9(2)162,
9(2)181,
9(3)292,
9(3)325,
9(4)461,
10(1)4,
10(2)8,
10(3)11,
10(4)3,
10(4)6,
11(1)2,
11(2)1,
11(2)2,
11(2)3,
11(3)14,
11(4)19,
11(4)21,
12(2)10,
12(2)11,
13(1)2,
13(1)8,
13(3)20,
13(3)26,
13(4)31,
13(4)35,
13(4)39,
14(1)3,
14(1)12,
14(1)14,
14(3)27,
15(1)2,
15(3)11,
15(3)12,
15(4)15,
16(1)1,
16(1)2,
16(1)4,
16(2)5,
16(2)6,
16(3)10,
16(4)17,
17(1)1,
17(2)5,
17(3)10,
17(3)11,
17(4)13,
17(4)14,
17(4)16,
18(2)7,
18(2)8,
18(3)10,
18(3)11,
18(4)14
- value,
10(3)10,
10(4)1,
10(4)4,
11(2)5,
11(4)18,
12(1)6,
12(2)10,
13(1)10,
14(1)9,
14(1)14,
15(1)4,
15(2)9,
16(1)1,
17(3)10,
18(1)1,
18(2)5,
18(3)10
- while,
2(3)230,
2(4)354,
9(4)391,
9(4)421,
9(4)461,
10(2)5,
10(4)2,
11(1)4,
11(2)2,
11(2)6,
11(4)18,
11(4)19,
11(4)22,
12(2)9,
12(3)16,
13(1)5,
13(3)22,
13(3)25,
13(4)39,
13(4)41,
14(3)25,
14(3)26,
14(4)31,
15(3)12,
15(4)15,
16(3)9,
16(3)12,
16(4)16,
17(1)4,
17(3)9,
17(4)15,
18(1)1,
18(2)7
- work,
2(2)138,
2(3)269,
2(4)416,
10(3)10,
10(4)6,
11(2)2,
11(2)3,
11(3)15,
11(4)17,
11(4)19,
12(2)10,
12(2)11,
12(2)12,
12(3)16,
12(3)17,
12(3)18,
13(3)25,
13(4)38,
14(1)2,
14(1)14,
15(2)7,
15(2)10,
15(3)12,
15(4)15,
16(1)3,
16(1)4,
16(2)8,
16(3)10,
16(3)11,
16(4)13,
16(4)15,
17(3)12,
18(2)6,
18(4)13