A discussion on ``Detection of intrusions in information systems by sequential change-point methods by Tartakovsky, Rozovskii, Blažek, and Kim
DOI10.1016/j.stamet.2005.06.006zbMath1248.94028OpenAlexW2047392306MaRDI QIDQ5966163
James R. Wilson, Seong-Hee Kim
Publication date: 19 October 2012
Published in: Statistical Methodology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.stamet.2005.06.006
Applications of statistics in engineering and industry; control charts (62P30) Communication networks in operations research (90B18) Network design and communication in computer systems (68M10) Detection theory in information and communication theory (94A13) Channel models (including quantum) in information and communication theory (94A40)
Cites Work
This page was built for publication: A discussion on ``Detection of intrusions in information systems by sequential change-point methods by Tartakovsky, Rozovskii, Blažek, and Kim