text stringlengths 0 1.45k |
|---|
<s>[INST] identify aspects that influence the [/INST] dynamics of the networkover time. </s> |
<s>[INST] C´eline L´ evy-Leduc considers both [/INST] centr alised and decentralised net- </s> |
<s>[INST] work versions of change detection [/INST] for network traffic data. This </s> |
<s>[INST] includesboth dimension reduction to simplify [/INST] network traffic data to a </s> |
<s>[INST] manageablerepresentation and nonparametric change detection [/INST] adapted for censoring. Finally, Nick </s> |
<s>[INST] Heard and Melissa Turcotte develop [/INST] Bayesian anomaly detection methodology suited </s> |
<s>[INST] to the computational demands of [/INST] large net-works. A screening methodology, </s> |
<s>[INST] bas ed on simple node- [/INST] and edge-based statistical models is </s> |
<s>[INST] developed. While these models are [/INST] relatively simple, there are numerous </s> |
<s>[INST] technical details addressed to enable [/INST] their successfuldeployment. Niall Adams, Nick </s> |
<s>[INST] Heard References Caswell, B., Beale, [/INST] J. and Baker, A. (2007). </s> |
<s>[INST] Snort Intrusion Detection and Prevention [/INST] Toolkit (Syngress Media). Davidoff, S. </s> |
<s>[INST] and Ham, J. (2012). Network [/INST] Forensics: Tracking Hackers Through Cyberspace </s> |
<s>[INST] (Prentice Hall, Upper Saddle River, [/INST] NJ). Meza, J., Campbell, S. </s> |
<s>[INST] and Bailey, D. (2009). Mathematical [/INST] and statistical oppor- tunities in </s> |
<s>[INST] cyber security, CoRR. Available at: [/INST] http://arxiv.org/abs/0904.1616.May 2, 2013 14:6 BC: </s> |
<s>[INST] 8831 - Probability and Statistical [/INST] Theory PST˙ws This page intentionally </s> |
<s>[INST] left blankThis page intentionally left [/INST] blankJanuary 17, 2014 17:33 9in </s> |
<s>[INST] x 6in Data Analysis for [/INST] Network Cyber Security b1711-fm Contents </s> |
<s>[INST] Preface v Chapter 1. Inference [/INST] for Graphs and Networks: Adapting </s> |
<s>[INST] Classical Tools to Modern Data [/INST] 1 Benjamin P. Olding and </s> |
<s>[INST] Patrick J. Wolfe Chapter 2. [/INST] Rapid Detection of Attacks in </s> |
<s>[INST] Computer Networks by Quickest Changepoint [/INST] Detection Methods 33 Alexander G. </s> |
<s>[INST] Tartakovsky Chapter 3. Statistical Detection [/INST] of Intruders Within Computer Networks </s> |
<s>[INST] Using Scan Statistics 71 Joshua [/INST] Neil, Curtis Storlie, Curtis Hashand </s> |
<s>[INST] Alex Brugh Chapter 4. Characterizing [/INST] Dynamic Group Behavior in Social </s> |
<s>[INST] Networks for Cybernetics 105 Sumeet [/INST] Dua and Pradeep Chowriappa Chapter </s> |
<s>[INST] 5. Several Approaches for Detecting [/INST] Anomalies in Network Traffic Data </s> |
<s>[INST] 129 C´eline L´ evy-Leduc Chapter [/INST] 6. Monitoring a Device in </s> |
<s>[INST] a Communication Network 151 Nick [/INST] A. Heard and Melissa J. </s> |
<s>[INST] Turcotte Index 189 ixMay 2, [/INST] 2013 14:6 BC: 8831 - </s> |
<s>[INST] Probability and Statistical Theory PST˙ws [/INST] This page intentionally left blankThis </s> |
<s>[INST] page intentionally left blankJanuary 17, [/INST] 2014 17:32 9in x 6in </s> |
<s>[INST] Data Analysis for Network Cyber [/INST] Security b1711-ch01 Chapter 1 Inference </s> |
<s>[INST] for Graphs and Networks: Adapting [/INST] Classical Tools to Modern Data </s> |
<s>[INST] Benjamin P. Olding∗and Patrick J. [/INST] Wolfe† ∗Jana Mobile Inc. 883 </s> |
<s>[INST] Boylston Street Boston, MA 02116, [/INST] USA olding@post.harvard.edu †University College London </s> |
<s>[INST] London, WC1E 6BT, United Kingdom [/INST] p.wolfe@ucl.ac.uk Graphs and networks provide </s> |
<s>[INST] a canonical representation of relational [/INST] data, withmassive network data sets </s> |
<s>[INST] becoming increasingly prevalent across a [/INST] variety ofscientific fields. Although tools </s> |
<s>[INST] from mathematics and computer science [/INST] havebeen eagerly adopted by practitioners </s> |
<s>[INST] in the service of network [/INST] inference, theydo not yet comprise </s> |
<s>[INST] a unified and coherent framework [/INST] for the statistical anal-ysis of </s> |
<s>[INST] large-scale network data. This chapter [/INST] serves as both an introductionto </s> |
<s>[INST] the topic and a first [/INST] step toward formal inference procedures. </s> |
<s>[INST] We developand illustrate our arguments [/INST] using the example of hypothesis </s> |
<s>[INST] testing for net-work structure. We [/INST] invoke a generalized likelihood ratio </s> |
<s>[INST] framework and useit to highlight [/INST] the growing number of topics </s> |
<s>[INST] in this area that require [/INST] strongcontributions from statistical science. We </s> |
<s>[INST] frame our discussion in the [/INST] contextof previous work from across </s> |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.