-
1
-
-
34548728119
-
Activity monitoring: Anomaly detection as on-line classification
-
May
-
T. Fawcett, “Activity monitoring: Anomaly detection as on-line classification,” in Proc. Symp. Mach. Learn. Anomaly Detection, May 2004.
-
(2004)
Proc. Symp. Mach. Learn. Anomaly Detection
-
-
Fawcett, T.1
-
2
-
-
0002916530
-
Continuous inspection schemes
-
Jun.
-
E. Page, “Continuous inspection schemes,” Biometrika, vol. 41, no. 1/2, pp. 100–115, Jun. 1954.
-
(1954)
Biometrika
, vol.41
, Issue.1/2
, pp. 100-115
-
-
Page, E.1
-
3
-
-
0034313590
-
A hidden Markov model-based algorithm for fault diagnosis with partial and imperfect tests
-
Nov.
-
J. Ying, T. Kirubarajan, K. R. Pattipati, and A. Patterson-Hine, “A hidden Markov model-based algorithm for fault diagnosis with partial and imperfect tests,” IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 30, no. 4, pp. 463–473, Nov. 2000.
-
(2000)
IEEE Trans. Syst., Man, Cybern. C, Appl. Rev.
, vol.30
, Issue.4
, pp. 463-473
-
-
Ying, J.1
Kirubarajan, T.2
Pattipati, K.R.3
Patterson-Hine, A.4
-
4
-
-
0034291424
-
Detection of hidden Markov model transient signals
-
Dec.
-
B. Chen and P. Willett, “Detection of hidden Markov model transient signals,” IEEE Trans. Aerosp. Electron. Syst., vol. 36, no. 4, pp. 1253–1268, Dec. 2000.
-
(2000)
IEEE Trans. Aerosp. Electron. Syst.
, vol.36
, Issue.4
, pp. 1253-1268
-
-
Chen, B.1
Willett, P.2
-
5
-
-
0035401426
-
Superimposed HMM transient detection via target tracking ideas
-
Jul.
-
B. Chen and P. Willett, “Superimposed HMM transient detection via target tracking ideas,” IEEE Trans. Aerosp. Electron. Syst., vol. 37, no. 3, pp. 946–956, Jul. 2001.
-
(2001)
IEEE Trans. Aerosp. Electron. Syst.
, vol.37
, Issue.3
, pp. 946-956
-
-
Chen, B.1
Willett, P.2
-
6
-
-
0022594196
-
An introduction to hidden Markov models
-
Jan.
-
L. R. Rabiner and B. H. Juang, “An introduction to hidden Markov models,” IEEE ASSP Mag., vol. 3, no. 1, pp. 4–16, Jan. 1986.
-
(1986)
IEEE ASSP Mag.
, vol.3
, Issue.1
, pp. 4-16
-
-
Rabiner, L.R.1
Juang, B.H.2
-
7
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
Feb.
-
L. R. Rabiner, “A tutorial on hidden Markov models and selected applications in speech recognition,” Proc. IEEE, vol. 77, no. 2, pp. 257–286, Feb. 1989.
-
(1989)
Proc. IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.R.1
-
8
-
-
0028724758
-
Markov monitoring with unknown states
-
Dec.
-
P. Smyth, “Markov monitoring with unknown states,” IEEE J. Sel. Areas Commun., vol. 12, no. 9, pp. 1600–1612, Dec. 1994.
-
(1994)
IEEE J. Sel. Areas Commun.
, vol.12
, Issue.9
, pp. 1600-1612
-
-
Smyth, P.1
-
9
-
-
80053040271
-
Investigating hidden Markov model for anomaly detection
-
Kennesaw, GA
-
S. Joshi and V. V. Phoha, “Investigating hidden Markov model for anomaly detection,” in Proc. 43rd ACM South East Conf., Kennesaw, GA, 2005.
-
(2005)
Proc. 43rd ACM South East Conf.
-
-
Joshi, S.1
Phoha, V.V.2
-
10
-
-
10044227402
-
Learning states and rules for time series anomaly detection
-
S. Salvador, P. Chan, and J. Brodie, “Learning states and rules for time series anomaly detection,” in Proc. 17th Int. FLAIRS Conf., 2004, pp. 300–305.
-
(2004)
Proc. 17th Int. FLAIRS Conf.
, pp. 300-305
-
-
Salvador, S.1
Chan, P.2
Brodie, J.3
-
11
-
-
62649158797
-
Monitoring massive streams simultaneously: A holistic approach
-
D. Agarwal, J. Feng, and V. Torres, “Monitoring massive streams simultaneously: A holistic approach,” in Proc. Interface, 2006.
-
(2006)
Proc. Interface
-
-
Agarwal, D.1
Feng, J.2
Torres, V.3
-
12
-
-
34548706637
-
A framework for discovering anomalous regimes in multivariate time-series data with local models
-
May
-
S. Bay, K. Saito, N. Ueda, and P. Langley, “A framework for discovering anomalous regimes in multivariate time-series data with local models,” in Proc. Symp. Mach. Learn. Anomaly Detection, May 2004.
-
(2004)
Proc. Symp. Mach. Learn. Anomaly Detection
-
-
Bay, S.1
Saito, K.2
Ueda, N.3
Langley, P.4
-
13
-
-
85008056245
-
-
Metron. [Online]. Available: http://www.metsci.com/about/terralert.html
-
G. Godfrey, TerrorAlert System, Metron. [Online]. Available: http://www.metsci.com/about/terralert.html
-
TerrorAlert System
-
-
Godfrey, G.1
-
14
-
-
34548718291
-
-
[Online]. Available: http://www. inet.saic.com/docs/docs/inet-for-planning.pdf
-
J. A. Rosen, Influence Net Modeling. [Online]. Available: http://www. inet.saic.com/docs/docs/inet-for-planning.pdf
-
Influence Net Modeling.
-
-
Rosen, J.A.1
-
15
-
-
85059287846
-
Pattern recognition of international crises using hidden Markov models
-
D. Richards, Ed. Ann Arbor, MI: Univ. of Michigan Press
-
P. Schrodt, “Pattern recognition of international crises using hidden Markov models,” in Political Complexity: Nonlinear Models of Politics, D. Richards, Ed. Ann Arbor, MI: Univ. of Michigan Press, 2000, pp. 296–328.
-
(2000)
Political Complexity: Nonlinear Models of Politics
, pp. 296-328
-
-
Schrodt, P.1
-
16
-
-
0034551311
-
Using cluster analysis to derive early warning indicators for political change in the Middle East, 1979–1996
-
Dec.
-
P. A. Schrodt and D. J. Gerner, “Using cluster analysis to derive early warning indicators for political change in the Middle East, 1979–1996,” Amer. Polit. Sci. Rev., vol. 94, no. 4, pp. 803–818, Dec. 2000.
-
(2000)
Amer. Polit. Sci. Rev.
, vol.94
, Issue.4
, pp. 803-818
-
-
Schrodt, P.A.1
Gerner, D.J.2
-
17
-
-
34548142205
-
An advanced system for modeling asymmetric threats
-
Taipei, Taiwan, Oct.
-
S. Singh, W. Donat, H. Tu, J. Lu, K. Pattipati, and P. Willett, “An advanced system for modeling asymmetric threats,” in Proc. IEEE Int. Conf. Syst., Man Cybern., Taipei, Taiwan, Oct. 2006, pp. 3943–3948.
-
(2006)
Proc. IEEE Int. Conf. Syst., Man Cybern.
, pp. 3943-3948
-
-
Singh, S.1
Donat, W.2
Tu, H.3
Lu, J.4
Pattipati, K.5
Willett, P.6
-
18
-
-
15744378078
-
Stochastic modeling of a terrorist event via the ASAM system
-
Hague, The Netherlands, Oct.
-
S. Singh, J. Allanach, H. Tu, K. Pattipati, and P. Willett, “Stochastic modeling of a terrorist event via the ASAM system,” in Proc. IEEE Int. Conf. Syst., Man Cybern., Hague, The Netherlands, Oct. 2004, pp. 5673–5678.
-
(2004)
Proc. IEEE Int. Conf. Syst., Man Cybern.
, pp. 5673-5678
-
-
Singh, S.1
Allanach, J.2
Tu, H.3
Pattipati, K.4
Willett, P.5
-
19
-
-
30444455042
-
Modeling threats
-
Aug./Sep.
-
S. Singh, H. Tu, J. Allanach, K. Pattipati, and P. Willett, “Modeling threats,” IEEE Potentials, vol. 23, no. 3, pp. 18–21, Aug./Sep. 2004.
-
(2004)
IEEE Potentials
, vol.23
, Issue.3
, pp. 18-21
-
-
Singh, S.1
Tu, H.2
Allanach, J.3
Pattipati, K.4
Willett, P.5
-
20
-
-
30444433374
-
Information integration via hierarchical and hybrid Bayesian networks
-
Jan.
-
H. Tu, J. Allanach, S. Singh, P. Willett, and K. Pattipati, “Information integration via hierarchical and hybrid Bayesian networks,” IEEE Trans. Syst., Man Cybern. A, Syst., Humans—Special Issue on Advances in Heterogeneous and Complex System Integration, vol. 1, no. 1, pp. 19–34, Jan. 2006.
-
(2006)
IEEE Trans. Syst., Man Cybern. A, Syst., Humans—Special Issue on Advances in Heterogeneous and Complex System Integration
, vol.1
, Issue.1
, pp. 19-34
-
-
Tu, H.1
Allanach, J.2
Singh, S.3
Willett, P.4
Pattipati, K.5
-
21
-
-
0000353178
-
A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains
-
L. Baum, T. Petrie, G. Soules, and N. Weiss, “A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains,” Ann. Math. Stat., vol. 41, no. 1, pp. 164–171, 1970.
-
(1970)
Ann. Math. Stat.
, vol.41
, Issue.1
, pp. 164-171
-
-
Baum, L.1
Petrie, T.2
Soules, G.3
Weiss, N.4
-
22
-
-
0030287048
-
The expectation-maximization algorithm
-
Nov.
-
T. Moon, “The expectation-maximization algorithm,” IEEE Signal Process. Mag., vol. 13, no. 6, pp. 47–60, Nov. 1996.
-
(1996)
IEEE Signal Process. Mag.
, vol.13
, Issue.6
, pp. 47-60
-
-
Moon, T.1
-
24
-
-
34548109488
-
-
[Online]. Available: http://www.chemcases.com/2003version/nuclear/nc-12.htm
-
F. Settle, Nuclear Chemistry—Nuclear Proliferation. [Online]. Available: http://www.chemcases.com/2003version/nuclear/nc-12.htm
-
Nuclear Chemistry—Nuclear Proliferation.
-
-
Settle, F.1
-
27
-
-
0039190131
-
-
Office Technol. Assess., U.S. Printing Office, U.S. Congr., Washington, DC, OTA-BPISC-115, Dec.
-
“Technologies underlying weapons of mass destruction,” Office Technol. Assess., U.S. Printing Office, U.S. Congr., Washington, DC, OTA-BPISC-115, Dec. 1993.
-
(1993)
Technologies underlying weapons of mass destruction
-
-
-
31
-
-
0031268341
-
Factorial hidden Markov models
-
Boston, MA: Kluwer
-
Z. Ghahramani and M. I. Jordan, “Factorial hidden Markov models,” in Machine Learning. Boston, MA: Kluwer, 1997.
-
(1997)
Machine Learning.
-
-
Ghahramani, Z.1
Jordan, M.I.2
|