Rapid Detection of Attacks in Computer Networks by Quickest Changepoint Detection Methods
暂无分享,去创建一个
[1] G. Lorden. PROCEDURES FOR REACTING TO A CHANGE IN DISTRIBUTION , 1971 .
[2] Tze Leung Lai,et al. Information Bounds and Quick Detection of Parameter Changes in Stochastic Systems , 1998, IEEE Trans. Inf. Theory.
[3] John S. Heidemann,et al. A framework for classifying denial of service attacks , 2003, SIGCOMM '03.
[4] C. Fuh. Asymptotic operating characteristics of an optimal change point detection in hidden Markov models , 2004, math/0503682.
[5] E. S. Page. CONTINUOUS INSPECTION SCHEMES , 1954 .
[6] Alexander G. Tartakovsky,et al. On optimality of the Shiryaev-Roberts procedure for detecting a change in distribution , 2009, 0904.3370.
[7] Y. Mei. Efficient scalable schemes for monitoring a large number of data streams , 2010 .
[8] G. Moustakides. Optimal stopping times for detecting changes in distributions , 1986 .
[9] Juanita Ellis,et al. The Internet Security Guidebook: From Planning to Deployment , 2001 .
[10] Michèle Basseville,et al. Detection of abrupt changes: theory and application , 1993 .
[11] Aleksey S. Polunchenko,et al. State-of-the-Art in Sequential Change-Point Detection , 2011, 1109.2938.
[12] M. Basseville,et al. Sequential Analysis: Hypothesis Testing and Changepoint Detection , 2014 .
[13] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[14] Moshe Pollak,et al. ON OPTIMALITY PROPERTIES OF THE SHIRYAEV-ROBERTS PROCEDURE , 2007, 0710.5935.
[15] M. Pollak. Optimal Detection of a Change in Distribution , 1985 .
[16] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[17] Hongjoong Kim,et al. A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods , 2006, IEEE Transactions on Signal Processing.
[18] Georgios Loukas,et al. Protection Against Denial of Service Attacks: A Survey , 2010, Comput. J..
[19] S. Kent,et al. On the trail of intrusions into information systems , 2000 .
[20] V. Veeravalli,et al. General Asymptotic Bayesian Theory of Quickest Change Detection , 2005 .
[21] Cheng-Der Fuh,et al. SPRT and CUSUM in hidden Markov models , 2003 .
[22] Alexander G. Tartakovsky,et al. Efficient Computer Network Anomaly Detection by Changepoint Detection Methods , 2012, IEEE Journal of Selected Topics in Signal Processing.
[23] A. Shiryaev. On Optimum Methods in Quickest Detection Problems , 1963 .
[24] Rudolf B. Blazek,et al. Detection of intrusions in information systems by sequential change-point methods , 2005 .
[25] M. Pollak. Average Run Lengths of an Optimal Method of Detecting a Change in Distribution. , 1987 .
[26] Alexander G. Tartakovsky,et al. Quickest changepoint detection in distributed multisensor systems under unknown parameters , 2008, 2008 11th International Conference on Information Fusion.
[27] A. Tartakovsky. Asymptotic Performance of a Multichart CUSUM Test Under False Alarm Probability Constraint , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.
[28] Moshe Pollak,et al. Third-order Asymptotic Optimality of the Generalized Shiryaev-Roberts Changepoint Detection Procedures , 2010, 1005.1129.
[29] David Siegmund,et al. Change-Points: From Sequential Detection to Biology and Back , 2013 .
[30] George V. Moustakides,et al. A NUMERICAL APPROACH TO PERFORMANCE ANALYSIS OF QUICKEST CHANGE-POINT DETECTION PROCEDURES , 2009, 0907.3521.