UQ Methods for HPDA and Cybersecurity Models, Data, and Use Cases

[1]  Lise Getoor,et al.  Subgraph pattern matching over uncertain graphs with identity linkage uncertainty , 2014, 2014 IEEE 30th International Conference on Data Engineering.

[2]  Konstantina Papagiannaki,et al.  Traffic matrices: balancing measurements, inference and modeling , 2005, SIGMETRICS '05.

[3]  Xinming Ou,et al.  Uncertainty and Risk Management in Cyber Situational Awareness , 2010, Cyber Situational Awareness.

[4]  Daniel Boley,et al.  A Scalable Hierarchical Algorithm for Unsupervised Clustering , 2001 .

[5]  Zhe Jiang,et al.  Spatial Statistics , 2013 .

[6]  George Kollios,et al.  k-nearest neighbors in uncertain graphs , 2010, Proc. VLDB Endow..

[7]  Zahir Tari,et al.  Toward an efficient and scalable feature selection approach for internet traffic classification , 2013, Comput. Networks.

[8]  Zoubin Ghahramani,et al.  Probabilistic graphical models for semi-supervised traffic classification , 2010, IWCMC.

[9]  Chris H. Q. Ding,et al.  On the Equivalence of Nonnegative Matrix Factorization and Spectral Clustering , 2005, SDM.

[10]  Michalis Faloutsos,et al.  Internet traffic classification demystified: myths, caveats, and the best practices , 2008, CoNEXT '08.

[11]  Kavé Salamatian,et al.  Combining filtering and statistical methods for anomaly detection , 2005, IMC '05.

[12]  Reza Azmi,et al.  Botnet Detection using NetFlow and Clustering , 2014 .

[13]  Matthew Roughan,et al.  Internet Traffic Matrices: A Primer , 2013 .

[14]  Ulrike von Luxburg,et al.  A tutorial on spectral clustering , 2007, Stat. Comput..

[15]  Hong Zhou,et al.  Energy-Based Hierarchical Edge Clustering of Graphs , 2008, 2008 IEEE Pacific Visualization Symposium.

[16]  Ludmil T. Zikatanov,et al.  A Cascadic Multigrid Algorithm for Computing the Fiedler Vector of Graph Laplacians , 2014, 1412.0565.

[17]  George Kollios,et al.  Clustering Large Probabilistic Graphs , 2013, IEEE Transactions on Knowledge and Data Engineering.

[18]  George Bebis,et al.  A survey of network flow applications , 2013, J. Netw. Comput. Appl..

[19]  Theodore B. Trafalis,et al.  Support vector machine classification of uncertain and imbalanced data using robust optimization , 2011 .

[20]  Vladimir N. Vapnik,et al.  The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.

[21]  Kavé Salamatian,et al.  Traffic matrix tracking using Kalman filters , 2005, PERV.

[22]  Jitendra Malik,et al.  Normalized cuts and image segmentation , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[23]  Dan Cornford,et al.  Neural Network Modelling with Input Uncertainty: Theory and Application , 2000, J. VLSI Signal Process..

[24]  Cliff Joslyn,et al.  Discrete Mathematical Approaches to Graph-Based Traffic Analysis , 2014 .

[25]  Chris H. Q. Ding,et al.  Orthogonal nonnegative matrix t-factorizations for clustering , 2006, KDD '06.

[26]  Georg Carle,et al.  Traffic Anomaly Detection Using K-Means Clustering , 2007 .

[27]  W. A. Wright,et al.  Bayesian approach to neural-network modeling with input uncertainty , 1999, IEEE Trans. Neural Networks.

[28]  Enrico Zio,et al.  Unsupervised spectral clustering for hierarchical modelling and criticality analysis of complex networks , 2013, Reliab. Eng. Syst. Saf..

[29]  Chris H. Q. Ding,et al.  Symmetric Nonnegative Matrix Factorization for Graph Clustering , 2012, SDM.

[30]  Vyas Sekar,et al.  An empirical evaluation of entropy-based traffic anomaly detection , 2008, IMC '08.

[31]  Charu C. Aggarwal,et al.  A Survey of Uncertain Data Clustering Algorithms , 2018, Data Clustering: Algorithms and Applications.

[32]  K.-H. Anders,et al.  A Hierarchical Graph-Clustering Approach to find Groups of Objects , 2003 .

[33]  Jugal K. Kalita,et al.  Network attacks: Taxonomy, tools and systems , 2014, J. Netw. Comput. Appl..