메뉴 건너뛰기




Volumn 39, Issue 1, 2009, Pages 144-159

Anomaly Detection via Feature-Aided Tracking and Hidden Markov Models

Author keywords

Anomaly detection; asymmetric threats; change detection; hidden Markov models

Indexed keywords


EID: 85008036607     PISSN: 10834427     EISSN: 15582426     Source Type: Journal    
DOI: 10.1109/TSMCA.2008.2007944     Document Type: Article
Times cited : (34)

References (31)
  • 1
    • 34548728119 scopus 로고    scopus 로고
    • Activity monitoring: Anomaly detection as on-line classification
    • May
    • T. Fawcett, “Activity monitoring: Anomaly detection as on-line classification,” in Proc. Symp. Mach. Learn. Anomaly Detection, May 2004.
    • (2004) Proc. Symp. Mach. Learn. Anomaly Detection
    • Fawcett, T.1
  • 2
    • 0002916530 scopus 로고
    • Continuous inspection schemes
    • Jun.
    • E. Page, “Continuous inspection schemes,” Biometrika, vol. 41, no. 1/2, pp. 100–115, Jun. 1954.
    • (1954) Biometrika , vol.41 , Issue.1/2 , pp. 100-115
    • Page, E.1
  • 4
    • 0034291424 scopus 로고    scopus 로고
    • Detection of hidden Markov model transient signals
    • Dec.
    • B. Chen and P. Willett, “Detection of hidden Markov model transient signals,” IEEE Trans. Aerosp. Electron. Syst., vol. 36, no. 4, pp. 1253–1268, Dec. 2000.
    • (2000) IEEE Trans. Aerosp. Electron. Syst. , vol.36 , Issue.4 , pp. 1253-1268
    • Chen, B.1    Willett, P.2
  • 5
    • 0035401426 scopus 로고    scopus 로고
    • Superimposed HMM transient detection via target tracking ideas
    • Jul.
    • B. Chen and P. Willett, “Superimposed HMM transient detection via target tracking ideas,” IEEE Trans. Aerosp. Electron. Syst., vol. 37, no. 3, pp. 946–956, Jul. 2001.
    • (2001) IEEE Trans. Aerosp. Electron. Syst. , vol.37 , Issue.3 , pp. 946-956
    • Chen, B.1    Willett, P.2
  • 6
    • 0022594196 scopus 로고
    • An introduction to hidden Markov models
    • Jan.
    • L. R. Rabiner and B. H. Juang, “An introduction to hidden Markov models,” IEEE ASSP Mag., vol. 3, no. 1, pp. 4–16, Jan. 1986.
    • (1986) IEEE ASSP Mag. , vol.3 , Issue.1 , pp. 4-16
    • Rabiner, L.R.1    Juang, B.H.2
  • 7
    • 0024610919 scopus 로고
    • A tutorial on hidden Markov models and selected applications in speech recognition
    • Feb.
    • L. R. Rabiner, “A tutorial on hidden Markov models and selected applications in speech recognition,” Proc. IEEE, vol. 77, no. 2, pp. 257–286, Feb. 1989.
    • (1989) Proc. IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.R.1
  • 8
    • 0028724758 scopus 로고
    • Markov monitoring with unknown states
    • Dec.
    • P. Smyth, “Markov monitoring with unknown states,” IEEE J. Sel. Areas Commun., vol. 12, no. 9, pp. 1600–1612, Dec. 1994.
    • (1994) IEEE J. Sel. Areas Commun. , vol.12 , Issue.9 , pp. 1600-1612
    • Smyth, P.1
  • 9
    • 80053040271 scopus 로고    scopus 로고
    • Investigating hidden Markov model for anomaly detection
    • Kennesaw, GA
    • S. Joshi and V. V. Phoha, “Investigating hidden Markov model for anomaly detection,” in Proc. 43rd ACM South East Conf., Kennesaw, GA, 2005.
    • (2005) Proc. 43rd ACM South East Conf.
    • Joshi, S.1    Phoha, V.V.2
  • 10
    • 10044227402 scopus 로고    scopus 로고
    • Learning states and rules for time series anomaly detection
    • S. Salvador, P. Chan, and J. Brodie, “Learning states and rules for time series anomaly detection,” in Proc. 17th Int. FLAIRS Conf., 2004, pp. 300–305.
    • (2004) Proc. 17th Int. FLAIRS Conf. , pp. 300-305
    • Salvador, S.1    Chan, P.2    Brodie, J.3
  • 11
    • 62649158797 scopus 로고    scopus 로고
    • Monitoring massive streams simultaneously: A holistic approach
    • D. Agarwal, J. Feng, and V. Torres, “Monitoring massive streams simultaneously: A holistic approach,” in Proc. Interface, 2006.
    • (2006) Proc. Interface
    • Agarwal, D.1    Feng, J.2    Torres, V.3
  • 12
    • 34548706637 scopus 로고    scopus 로고
    • A framework for discovering anomalous regimes in multivariate time-series data with local models
    • May
    • S. Bay, K. Saito, N. Ueda, and P. Langley, “A framework for discovering anomalous regimes in multivariate time-series data with local models,” in Proc. Symp. Mach. Learn. Anomaly Detection, May 2004.
    • (2004) Proc. Symp. Mach. Learn. Anomaly Detection
    • Bay, S.1    Saito, K.2    Ueda, N.3    Langley, P.4
  • 13
    • 85008056245 scopus 로고    scopus 로고
    • Metron. [Online]. Available: http://www.metsci.com/about/terralert.html
    • G. Godfrey, TerrorAlert System, Metron. [Online]. Available: http://www.metsci.com/about/terralert.html
    • TerrorAlert System
    • Godfrey, G.1
  • 14
    • 34548718291 scopus 로고    scopus 로고
    • [Online]. Available: http://www. inet.saic.com/docs/docs/inet-for-planning.pdf
    • J. A. Rosen, Influence Net Modeling. [Online]. Available: http://www. inet.saic.com/docs/docs/inet-for-planning.pdf
    • Influence Net Modeling.
    • Rosen, J.A.1
  • 15
    • 85059287846 scopus 로고    scopus 로고
    • Pattern recognition of international crises using hidden Markov models
    • D. Richards, Ed. Ann Arbor, MI: Univ. of Michigan Press
    • P. Schrodt, “Pattern recognition of international crises using hidden Markov models,” in Political Complexity: Nonlinear Models of Politics, D. Richards, Ed. Ann Arbor, MI: Univ. of Michigan Press, 2000, pp. 296–328.
    • (2000) Political Complexity: Nonlinear Models of Politics , pp. 296-328
    • Schrodt, P.1
  • 16
    • 0034551311 scopus 로고    scopus 로고
    • Using cluster analysis to derive early warning indicators for political change in the Middle East, 1979–1996
    • Dec.
    • P. A. Schrodt and D. J. Gerner, “Using cluster analysis to derive early warning indicators for political change in the Middle East, 1979–1996,” Amer. Polit. Sci. Rev., vol. 94, no. 4, pp. 803–818, Dec. 2000.
    • (2000) Amer. Polit. Sci. Rev. , vol.94 , Issue.4 , pp. 803-818
    • Schrodt, P.A.1    Gerner, D.J.2
  • 21
    • 0000353178 scopus 로고
    • A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains
    • L. Baum, T. Petrie, G. Soules, and N. Weiss, “A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains,” Ann. Math. Stat., vol. 41, no. 1, pp. 164–171, 1970.
    • (1970) Ann. Math. Stat. , vol.41 , Issue.1 , pp. 164-171
    • Baum, L.1    Petrie, T.2    Soules, G.3    Weiss, N.4
  • 22
    • 0030287048 scopus 로고    scopus 로고
    • The expectation-maximization algorithm
    • Nov.
    • T. Moon, “The expectation-maximization algorithm,” IEEE Signal Process. Mag., vol. 13, no. 6, pp. 47–60, Nov. 1996.
    • (1996) IEEE Signal Process. Mag. , vol.13 , Issue.6 , pp. 47-60
    • Moon, T.1
  • 24
    • 34548109488 scopus 로고    scopus 로고
    • [Online]. Available: http://www.chemcases.com/2003version/nuclear/nc-12.htm
    • F. Settle, Nuclear Chemistry—Nuclear Proliferation. [Online]. Available: http://www.chemcases.com/2003version/nuclear/nc-12.htm
    • Nuclear Chemistry—Nuclear Proliferation.
    • Settle, F.1
  • 27
    • 0039190131 scopus 로고
    • Office Technol. Assess., U.S. Printing Office, U.S. Congr., Washington, DC, OTA-BPISC-115, Dec.
    • “Technologies underlying weapons of mass destruction,” Office Technol. Assess., U.S. Printing Office, U.S. Congr., Washington, DC, OTA-BPISC-115, Dec. 1993.
    • (1993) Technologies underlying weapons of mass destruction
  • 31
    • 0031268341 scopus 로고    scopus 로고
    • Factorial hidden Markov models
    • Boston, MA: Kluwer
    • Z. Ghahramani and M. I. Jordan, “Factorial hidden Markov models,” in Machine Learning. Boston, MA: Kluwer, 1997.
    • (1997) Machine Learning.
    • Ghahramani, Z.1    Jordan, M.I.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.