-
1
-
-
28244467214
-
A scientific approach to cyberattack detection
-
Ye N, Farley T. A scientific approach to cyberattack detection. IEEE Computer 2005; 38(11):55-61.
-
(2005)
IEEE Computer
, vol.38
, Issue.11
, pp. 55-61
-
-
Ye, N.1
Farley, T.2
-
2
-
-
0035402112
-
Probabilistic techniques for intrusion detection based on computer audit data
-
Ye N, Li X, Chen Q, Emran SM, Xu M. Probabilistic techniques for intrusion detection based on computer audit data. IEEE Transactions on Systems, Man, and Cybernetics 2001; 31(4):266-274.
-
(2001)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.31
, Issue.4
, pp. 266-274
-
-
Ye, N.1
Li, X.2
Chen, Q.3
Emran, S.M.4
Xu, M.5
-
3
-
-
1942436335
-
Robustness of the Markov-chain model for cyber-attack detection
-
Ye N, Zhang Y, Borror CM. Robustness of the Markov-chain model for cyber-attack detection. IEEE Transactions on Reliability 2004; 53(1):116-123.
-
(2004)
IEEE Transactions on Reliability
, vol.53
, Issue.1
, pp. 116-123
-
-
Ye, N.1
Zhang, Y.2
Borror, C.M.3
-
4
-
-
0346960125
-
Scalable chi square distance versus conventional statistical distance for process monitoring with uncorrelated data variables
-
Ye N, Borror C, Parmar D. Scalable chi square distance versus conventional statistical distance for process monitoring with uncorrelated data variables. Quality and Reliability Engineering International 2003; 19(6):505-515.
-
(2003)
Quality and Reliability Engineering International
, vol.19
, Issue.6
, pp. 505-515
-
-
Ye, N.1
Borror, C.2
Parmar, D.3
-
5
-
-
0036122767
-
Robustness of chi-square and Canberra techniques in detecting intrusions into information systems
-
Emran SM, Ye N. Robustness of chi-square and Canberra techniques in detecting intrusions into information systems. Quality and Reliability Engineering International 2002; 18(1):19-28.
-
(2002)
Quality and Reliability Engineering International
, vol.18
, Issue.1
, pp. 19-28
-
-
Emran, S.M.1
Ye, N.2
-
6
-
-
0036647172
-
Multivariate statistical analysis of audit trails for host-based intrusion detection
-
Ye N, Emran SM, Chen Q, Vilbert S. Multivariate statistical analysis of audit trails for host-based intrusion detection. IEEE Transactions on Computers 2002; 51(7):810-820.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.7
, pp. 810-820
-
-
Ye, N.1
Emran, S.M.2
Chen, Q.3
Vilbert, S.4
-
8
-
-
0003807773
-
-
Prentice-Hall: Upper Saddle River, NJ
-
Haykin S. Adaptive Filter Theory. Prentice-Hall: Upper Saddle River, NJ, 1996.
-
(1996)
Adaptive Filter Theory
-
-
Haykin, S.1
-
9
-
-
0003881196
-
Time-domain approach using multi Kalman filters and EM algorithm to speech enhancement with nonstationary noise
-
Lee KY, Jung S. Time-domain approach using multi Kalman filters and EM algorithm to speech enhancement with nonstationary noise. IEEE Transactions on Speech and Audio Processing 2000; 8(3):282-291.
-
(2000)
IEEE Transactions on Speech and Audio Processing
, vol.8
, Issue.3
, pp. 282-291
-
-
Lee, K.Y.1
Jung, S.2
-
11
-
-
0036575252
-
First-order versus high-order stochastic models for computer intrusion detection
-
Ye N, Ehiabor T, Zhang Y. First-order versus high-order stochastic models for computer intrusion detection. Quality and Reliability Engineering International 2002; 18(3):243-250.
-
(2002)
Quality and Reliability Engineering International
, vol.18
, Issue.3
, pp. 243-250
-
-
Ye, N.1
Ehiabor, T.2
Zhang, Y.3
|