Detection of intrusions in information systems by sequential change-point methods

From MaRDI portal
Revision as of 10:59, 30 January 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:713713

DOI10.1016/j.stamet.2005.05.003zbMath1248.94032OpenAlexW2091083310MaRDI QIDQ713713

Alexander G. Tartakovsky, Rudolf B. Blažek, Hongjoong Kim, Boris L. Rosovskii

Publication date: 19 October 2012

Published in: Statistical Methodology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/j.stamet.2005.05.003




Related Items

Adaptive likelihood ratio approaches for the detection of space-time disease clustersMonitoring a Bernoulli process subject to gradual changes in the success rates of a sequence of Bernoulli random variablesOn the strategy of supply chain collaboration based on dynamic inventory target level management: a theory of constraint perspectiveAsymptotically optimal quickest change detection in multistream data -- Part 1: General stochastic modelsBayesian Models Applied to Cyber Security Anomaly Detection ProblemsA setwise EWMA scheme for monitoring high-dimensional datastreamsDetecting an intermittent change of unknown durationUnnamed ItemMultidecision Quickest Change-Point Detection: Previous Achievements and Open ProblemsDecision and game theory for security. Second international conference, GameSec 2011, College Park, MD, Maryland, USA, November 14--15, 2011. ProceedingsIs Average Run Length to False Alarm Always an Informative Criterion?Asymptotically Optimal Quickest Change Detection in Distributed Sensor SystemsAsymptotic statistical properties of communication-efficient quickest detection schemes in sensor networksAsymptotically optimal pointwise and minimax quickest change-point detection for dependent dataMonitoring a Poisson process in several categories subject to changes in the arrival ratesSequential Anomaly Detection in Wireless Sensor Networks and Effects of Long-Range Dependent DataBayesian Quickest Detection in Sensor ArraysAn Accurate Method for Determining the Pre-Change Run Length Distribution of the Generalized Shiryaev-Roberts Detection ProcedureDiscussion on “Change-Points: From Sequential Detection to Biology and Back” by David SiegmundHypothesis designs for three-hypothesis test problemsTheory and applications of a new methodology for the random sequential probability ratio testStatistical Control of Multiple-Stream Processes: A Literature ReviewOn the Wiener disorder problemMonitoring a Poisson process subject to gradual changes in the arrival ratesDiscussion on “Sequential detection/isolation of abrupt changes” by Igor V. NikiforovQuickest change point detection with multiple postchange modelsDistributed detection/localization of change-points in high-dimensional network traffic dataA discussion on ``Detection of intrusions in information systems by sequential change-point methods by Tartakovsky, Rozovskii, Blažek, and KimSequential tracking of a hidden Markov chain using point process observationsAdaptive threshold computation for CUSUM-type procedures in change detection and isolation problemsOnline multivariate changepoint detection with type I error control and constant time/memory updates per seriesOptimal detection of transition probability change in random sequenceMalware Family Discovery Using Reversible Jump MCMC Sampling of RegimesMonitoring a Poisson process subject to gradual changes in the arrival rates where the arrival rates are unknown



Cites Work