Statistical Network Surveillance
暂无分享,去创建一个
Alexander G. Tartakovsky | James D. Wilson | Daniel R. Jeske | Nathaniel T. Stevens | James D. Wilson | A. Tartakovsky | D. Jeske
[1] Alexander G. Tartakovsky,et al. Statistical methods for network surveillance , 2018 .
[2] Daniel R. Jeske,et al. Determining the Reference Sample Size Needed to Control the Accuracy of the Conditional in‐control ARL of a Normal‐theory CUSUM , 2016, Qual. Reliab. Eng. Int..
[3] P. Santhi Thilagam,et al. Mining social networks for anomalies: Methods and challenges , 2016, J. Netw. Comput. Appl..
[4] William H. Woodall,et al. An overview and perspective on social network monitoring , 2016, ArXiv.
[5] George C. Runger,et al. Monitoring Temporal Homogeneity in Attributed Network Streams , 2016 .
[6] Steve Harenberg,et al. Anomaly detection in dynamic networks: a survey , 2015 .
[7] Yingzhuo Fu,et al. SPC methods for nonstationary correlated count data with application to network surveillance , 2014 .
[8] Xiuzhen Zhang,et al. Anomaly detection in online social networks , 2014, Soc. Networks.
[9] Stefan H. Steiner,et al. An Overview of Phase I Analysis for Process Improvement and Monitoring , 2014 .
[10] Alexander G. Tartakovsky,et al. Rapid Detection of Attacks in Computer Networks by Quickest Changepoint Detection Methods , 2014 .
[11] Peter J. Mucha,et al. Portrait of Political Party Polarization1 , 2013, Network Science.
[12] Alexander G. Tartakovsky,et al. Efficient Computer Network Anomaly Detection by Changepoint Detection Methods , 2012, IEEE Journal of Selected Topics in Signal Processing.
[13] Wei Jiang,et al. Likelihood-Based EWMA Charts for Monitoring Poisson Count Data With Time-Varying Sample Sizes , 2012 .
[14] Alexander G. Tartakovsky,et al. Nearly Optimal Change-Point Detection with an Application to Cybersecurity , 2012, 1202.2849.
[15] Yajun Mei,et al. Quickest detection in censoring sensor networks , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[16] Kathleen M. Carley,et al. Detecting Change in Longitudinal Social Networks , 2011, J. Soc. Struct..
[17] Ross Sparks,et al. Early warning CUSUM plans for surveillance of negative binomial daily disease counts , 2010 .
[18] Qi Zhang,et al. A cusum change-point detection algorithm for non-stationary sequences with application to data network surveillance , 2010, J. Syst. Softw..
[19] Tomoki Nakaya,et al. Visualising Crime Clusters in a Space‐time Cube: An Exploratory Data‐analysis Approach Using Space‐time Kernel Density Estimation and Scan Statistics , 2010, Trans. GIS.
[20] Mazda A. Marvasti,et al. Cusum techniques for timeslot sequences with applications to network surveillance , 2009, Comput. Stat. Data Anal..
[21] Ross Sparks,et al. Improving EWMA Plans for Detecting Unusual Increases in Poisson Counts , 2009, Adv. Decis. Sci..
[22] Daniel B. Neill,et al. Expectation-based scan statistics for monitoring spatial time series data , 2009 .
[23] Jin Cao,et al. Monitoring Time-Varying Network Streams Using State-Space Models , 2009, IEEE INFOCOM 2009.
[24] Urbashi Mitra,et al. Remote detection of bottleneck links using spectral and statistical methods , 2009, Comput. Networks.
[25] David Warde-Farley,et al. Dynamic modularity in protein interaction networks predicts breast cancer outcome , 2009, Nature Biotechnology.
[26] Christian H. Weiß,et al. EWMA Monitoring of Correlated Processes of Poisson Counts , 2009 .
[27] V. Veeravalli,et al. Asymptotically Optimal Quickest Change Detection in Distributed Sensor Systems , 2008 .
[28] Jelena Mirkovic,et al. Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise , 2008, IEEE Transactions on Computers.
[29] Morton E. O'Kelly,et al. A bootstrap based space–time surveillance model with an application to crime occurrences , 2008, J. Geogr. Syst..
[30] John S. Heidemann,et al. Understanding passive and active service discovery , 2007, IMC '07.
[31] Christian H. Weiß,et al. Controlling correlated processes of Poisson counts , 2007, Qual. Reliab. Eng. Int..
[32] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[33] Urbashi Mitra,et al. Detecting and identifying malware: a new signal processing goal , 2006, IEEE Signal Process. Mag..
[34] Hongjoong Kim,et al. A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods , 2006, IEEE Transactions on Signal Processing.
[35] Rudolf B. Blazek,et al. Detection of intrusions in information systems by sequential change-point methods , 2005 .
[36] John S. Heidemann,et al. Identification of Repeated Denial of Service Attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[37] Chuanhai Liu,et al. Adaptive Thresholds , 2006 .
[38] David J. Marchette,et al. Scan Statistics on Enron Graphs , 2005, Comput. Math. Organ. Theory.
[39] Mark Crovella,et al. Mining anomalies using traffic feature distributions , 2005, SIGCOMM '05.
[40] Rajesh Krishnan,et al. Using signal processing to analyze wireless data traffic , 2002, WiSE '02.
[41] Anja Feldmann,et al. A non-instrusive, wavelet-based approach to detecting network performance problems , 2001, IMW '01.
[42] S. Kent,et al. On the trail of intrusions into information systems , 2000 .
[43] Marc Dacier,et al. Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.
[44] Frank Feather,et al. Fault detection in an Ethernet network using anomaly signature matching , 1993, SIGCOMM '93.
[45] David J. Marchette,et al. Computer Intrusion Detection and Network Monitoring , 2001, Statistics for Engineering and Information Science.