메뉴 건너뛰기




Volumn 128, Issue , 2003, Pages 175-190

Mining malicious corruption of data with hidden markov models

Author keywords

[No Author keywords available]

Indexed keywords

DATA MINING; DATABASE SYSTEMS; PROBABILITY DISTRIBUTIONS; TIME SERIES ANALYSIS;

EID: 84904308067     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-35697-6_14     Document Type: Conference Paper
Times cited : (20)

References (17)
  • 10
    • 0031383168 scopus 로고    scopus 로고
    • On atypical database transactions: Identification of probable frauds using machine learning for user profiling
    • A. Kokkinaki, On atypical database transactions: Identification of probable frauds using machine learning for user profiling, Proceedings of the Knowledge and Data Engineering Exchange Workshop, pp. 107-113, 1997.
    • (1997) Proceedings of the Knowledge and Data Engineering Exchange Workshop , pp. 107-113
    • Kokkinaki, A.1
  • 13
    • 0024610919 scopus 로고
    • A tutorial on hidden Markov models and selected applications in speech recognition
    • L. Rabiner, A tutorial on hidden Markov models and selected applications in speech recognition, Proceedings of the IEEE, pp. 257-285, 1989.
    • (1989) Proceedings of the IEEE , pp. 257-285
    • Rabiner, L.1
  • 14
    • 0028667329 scopus 로고
    • Hidden Markov monitoring for fault detection in dynamic systems
    • P. Smyth, Hidden Markov monitoring for fault detection in dynamic systems, Pattern Recognition, pp. 149-164, 1994.
    • (1994) Pattern Recognition , pp. 149-164
    • Smyth, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.