Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods - MaRDI portal

A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods

From MaRDI portal
Publication:4587923

DOI10.1109/TSP.2006.879308zbMath1373.68144OpenAlexW2142851111MaRDI QIDQ4587923

Hongjoong Kim, Rudolf B. Blažek, Alexander G. Tartakovsky, Boris L. Rosovskii

Publication date: 30 October 2017

Published in: IEEE Transactions on Signal Processing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1109/tsp.2006.879308




Related Items (20)

Large-Scale Datastreams Surveillance via Pattern-Oriented-SamplingSequential change point detection in high dimensional time seriesNetwork intrusion detection in covariance feature spaceOptimal change point detection in Gaussian processesStochastic discretized learning-based weak estimation: a novel estimation method for non-stationary environmentsA Bayesian detection of structural changes in autoregressive time series modelsBayesian Models Applied to Cyber Security Anomaly Detection ProblemsDetecting an intermittent change of unknown durationSequential algorithms for moving anomaly detection in networksData-adaptive symmetric CUSUM for sequential change detectionAsymptotically optimal pointwise and minimax quickest change-point detection for dependent dataTail-greedy bottom-up data decompositions and fast multiple change-point detectionSequential Anomaly Detection in Wireless Sensor Networks and Effects of Long-Range Dependent DataDetection and localization of change-points in high-dimensional network traffic dataDetection of intrusions in information systems by sequential change-point methodsAuthors' responseNonparametric multiple change-point estimation for analyzing large Hi-C data matricesByzantine Fault Tolerant Distributed Quickest Change DetectionAsymptotic properties of semiparametric \(M\)-estimators with multiple change pointsSequential change detection in the presence of unknown parameters




This page was built for publication: A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods