Statistical Network Surveillance

[1]  Alexander G. Tartakovsky,et al.  Statistical methods for network surveillance , 2018 .

[2]  Daniel R. Jeske,et al.  Determining the Reference Sample Size Needed to Control the Accuracy of the Conditional in‐control ARL of a Normal‐theory CUSUM , 2016, Qual. Reliab. Eng. Int..

[3]  P. Santhi Thilagam,et al.  Mining social networks for anomalies: Methods and challenges , 2016, J. Netw. Comput. Appl..

[4]  William H. Woodall,et al.  An overview and perspective on social network monitoring , 2016, ArXiv.

[5]  George C. Runger,et al.  Monitoring Temporal Homogeneity in Attributed Network Streams , 2016 .

[6]  Steve Harenberg,et al.  Anomaly detection in dynamic networks: a survey , 2015 .

[7]  Yingzhuo Fu,et al.  SPC methods for nonstationary correlated count data with application to network surveillance , 2014 .

[8]  Xiuzhen Zhang,et al.  Anomaly detection in online social networks , 2014, Soc. Networks.

[9]  Stefan H. Steiner,et al.  An Overview of Phase I Analysis for Process Improvement and Monitoring , 2014 .

[10]  Alexander G. Tartakovsky,et al.  Rapid Detection of Attacks in Computer Networks by Quickest Changepoint Detection Methods , 2014 .

[11]  Peter J. Mucha,et al.  Portrait of Political Party Polarization1 , 2013, Network Science.

[12]  Alexander G. Tartakovsky,et al.  Efficient Computer Network Anomaly Detection by Changepoint Detection Methods , 2012, IEEE Journal of Selected Topics in Signal Processing.

[13]  Wei Jiang,et al.  Likelihood-Based EWMA Charts for Monitoring Poisson Count Data With Time-Varying Sample Sizes , 2012 .

[14]  Alexander G. Tartakovsky,et al.  Nearly Optimal Change-Point Detection with an Application to Cybersecurity , 2012, 1202.2849.

[15]  Yajun Mei,et al.  Quickest detection in censoring sensor networks , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.

[16]  Kathleen M. Carley,et al.  Detecting Change in Longitudinal Social Networks , 2011, J. Soc. Struct..

[17]  Ross Sparks,et al.  Early warning CUSUM plans for surveillance of negative binomial daily disease counts , 2010 .

[18]  Qi Zhang,et al.  A cusum change-point detection algorithm for non-stationary sequences with application to data network surveillance , 2010, J. Syst. Softw..

[19]  Tomoki Nakaya,et al.  Visualising Crime Clusters in a Space‐time Cube: An Exploratory Data‐analysis Approach Using Space‐time Kernel Density Estimation and Scan Statistics , 2010, Trans. GIS.

[20]  Mazda A. Marvasti,et al.  Cusum techniques for timeslot sequences with applications to network surveillance , 2009, Comput. Stat. Data Anal..

[21]  Ross Sparks,et al.  Improving EWMA Plans for Detecting Unusual Increases in Poisson Counts , 2009, Adv. Decis. Sci..

[22]  Daniel B. Neill,et al.  Expectation-based scan statistics for monitoring spatial time series data , 2009 .

[23]  Jin Cao,et al.  Monitoring Time-Varying Network Streams Using State-Space Models , 2009, IEEE INFOCOM 2009.

[24]  Urbashi Mitra,et al.  Remote detection of bottleneck links using spectral and statistical methods , 2009, Comput. Networks.

[25]  David Warde-Farley,et al.  Dynamic modularity in protein interaction networks predicts breast cancer outcome , 2009, Nature Biotechnology.

[26]  Christian H. Weiß,et al.  EWMA Monitoring of Correlated Processes of Poisson Counts , 2009 .

[27]  V. Veeravalli,et al.  Asymptotically Optimal Quickest Change Detection in Distributed Sensor Systems , 2008 .

[28]  Jelena Mirkovic,et al.  Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise , 2008, IEEE Transactions on Computers.

[29]  Morton E. O'Kelly,et al.  A bootstrap based space–time surveillance model with an application to crime occurrences , 2008, J. Geogr. Syst..

[30]  John S. Heidemann,et al.  Understanding passive and active service discovery , 2007, IMC '07.

[31]  Christian H. Weiß,et al.  Controlling correlated processes of Poisson counts , 2007, Qual. Reliab. Eng. Int..

[32]  Karen A. Scarfone,et al.  Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .

[33]  Urbashi Mitra,et al.  Detecting and identifying malware: a new signal processing goal , 2006, IEEE Signal Process. Mag..

[34]  Hongjoong Kim,et al.  A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods , 2006, IEEE Transactions on Signal Processing.

[35]  Rudolf B. Blazek,et al.  Detection of intrusions in information systems by sequential change-point methods , 2005 .

[36]  John S. Heidemann,et al.  Identification of Repeated Denial of Service Attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[37]  Chuanhai Liu,et al.  Adaptive Thresholds , 2006 .

[38]  David J. Marchette,et al.  Scan Statistics on Enron Graphs , 2005, Comput. Math. Organ. Theory.

[39]  Mark Crovella,et al.  Mining anomalies using traffic feature distributions , 2005, SIGCOMM '05.

[40]  Rajesh Krishnan,et al.  Using signal processing to analyze wireless data traffic , 2002, WiSE '02.

[41]  Anja Feldmann,et al.  A non-instrusive, wavelet-based approach to detecting network performance problems , 2001, IMW '01.

[42]  S. Kent,et al.  On the trail of intrusions into information systems , 2000 .

[43]  Marc Dacier,et al.  Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.

[44]  Frank Feather,et al.  Fault detection in an Ethernet network using anomaly signature matching , 1993, SIGCOMM '93.

[45]  David J. Marchette,et al.  Computer Intrusion Detection and Network Monitoring , 2001, Statistics for Engineering and Information Science.