메뉴 건너뛰기




Volumn 5, Issue 10, 2012, Pages 1052-1063

Mining statistically significant substrings using the chi-square statistic

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; INTRUSION DETECTION;

EID: 84873152625     PISSN: None     EISSN: 21508097     Source Type: Conference Proceeding    
DOI: 10.14778/2336664.2336677     Document Type: Article
Times cited : (10)

References (27)
  • 2
    • 79956291864 scopus 로고    scopus 로고
    • On finding the most statistically significant substring using the chi-square measure
    • Indian Institute of Technology, Kanpur
    • S. Agarwal. On finding the most statistically significant substring using the chi-square measure. Master's thesis, Indian Institute of Technology, Kanpur, 2009.
    • (2009) Master's thesis
    • Agarwal, S.1
  • 5
    • 0000917558 scopus 로고
    • The use of maximum likelihood estimates in chi-square tests for goodness of fit
    • H. Chernoff and E. Lehmann. The use of maximum likelihood estimates in chi-square tests for goodness of fit. The Annals of Mathematical Statistics, 25(3):579-586, 1954.
    • (1954) The Annals of Mathematical Statistics , vol.25 , Issue.3 , pp. 579-586
    • Chernoff, H.1    Lehmann, E.2
  • 8
    • 84873116402 scopus 로고    scopus 로고
    • Probability: Theory and Examples. Cambridge University Press
    • R. Durrett. Probability: Theory and Examples. Cambridge University Press, 2010.
    • (2010)
    • Durrett, R.1
  • 11
    • 84873100741 scopus 로고    scopus 로고
    • Red Sox vs Yankees: The Great Rivalry
    • Sports Publishing LLC
    • H. Frommer and F. Frommer. Red Sox vs Yankees: The Great Rivalry. Sports Publishing LLC, 2004.
    • (2004)
    • Frommer, H.1    Frommer, F.2
  • 13
    • 60949087605 scopus 로고    scopus 로고
    • Intrusion detection using the chi-square goodness-of-fit test for information assurance, network, forensics and software security
    • R. Goonatilake, A. Herath, S. Herath, S. Herath, and J. Herath. Intrusion detection using the chi-square goodness-of-fit test for information assurance, network, forensics and software security. J. Computing Sciences, 23(1):255-263, 2007.
    • (2007) J. Computing Sciences , vol.23 , Issue.1 , pp. 255-263
    • Goonatilake, R.1    Herath, A.2    Herath, S.3    Herath, S.4    Herath, J.5
  • 15
    • 23844441860 scopus 로고    scopus 로고
    • Reliable detection of episodes in event sequences
    • R. Gwadera, M. Atallah, and W. Szpankowski. Reliable detection of episodes in event sequences. Knowl. Inf. Syst., 7(4):415-437, 2005.
    • (2005) Knowl. Inf. Syst. , vol.7 , Issue.4 , pp. 415-437
    • Gwadera, R.1    Atallah, M.2    Szpankowski, W.3
  • 16
    • 84947403595 scopus 로고
    • Probability inequalities for sums of bounded random variables
    • W. Hoeffding. Probability inequalities for sums of bounded random variables. J. American Statistical Association, 58(301):13-30, 1963.
    • (1963) J. American Statistical Association , vol.58 , Issue.301 , pp. 13-30
    • Hoeffding, W.1
  • 17
    • 0346750898 scopus 로고    scopus 로고
    • Genetic programming prediction of stock prices
    • M. Kaboudan. Genetic programming prediction of stock prices. Computational Economics, 16(3):207-236, 2000.
    • (2000) Computational Economics , vol.16 , Issue.3 , pp. 207-236
    • Kaboudan, M.1
  • 21
    • 84898703507 scopus 로고
    • Quality control methods for multivariate binomial and poisson distributions
    • H. Patel. Quality control methods for multivariate binomial and poisson distributions. Technometrics, 15(1):103-112, 1973.
    • (1973) Technometrics , vol.15 , Issue.1 , pp. 103-112
    • Patel, H.1
  • 22
    • 0037339886 scopus 로고    scopus 로고
    • Identifying temporal patterns for characterization and prediction of financial time series events
    • R. Povinelli. Identifying temporal patterns for characterization and prediction of financial time series events. IEEE Trans. Knowl. Data Eng., 15(2):339-352, 2003.
    • (2003) IEEE Trans. Knowl. Data Eng. , vol.15 , Issue.2 , pp. 339-352
    • Povinelli, R.1
  • 23
    • 33748690244 scopus 로고    scopus 로고
    • Dynamic programming algorithms for two statistical problems in computational biology
    • In WABI, pages
    • S. Rahmann. Dynamic programming algorithms for two statistical problems in computational biology. In WABI, pages 151-164, 2003.
    • (2003) , pp. 151-164
    • Rahmann, S.1
  • 26
    • 0035271352 scopus 로고    scopus 로고
    • Aanomaly detection technique based on a chi-square statistic for detecting intrusions into information systems
    • N. Ye and Q. Chen. An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems. Quality and Reliability Engineering International, 17:105-112, 2001.
    • (2001) Quality and Reliability Engineering International , vol.17 , pp. 105-112
    • Ye, N.1    Chen, Q.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.