• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4631613)   Today's Articles (332)   Subscriber (49890)
For: Xu J, Shelton CR. Intrusion Detection using Continuous Time Bayesian Networks. J ARTIF INTELL RES 2010. [DOI: 10.1613/jair.3050] [Citation(s) in RCA: 38] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/04/2022]  Open
Number Cited by Other Article(s)
1
Faruqui SHA, Alaeddini A, Wang J, Jaramillo CA, Pugh MJ. A Functional Model for Structure Learning and Parameter Estimation in Continuous Time Bayesian Network: An Application in Identifying Patterns of Multiple Chronic Conditions. IEEE ACCESS : PRACTICAL INNOVATIONS, OPEN SOLUTIONS 2021;9:148076-148089. [PMID: 35371895 PMCID: PMC8975131 DOI: 10.1109/access.2021.3122912] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Indexed: 06/14/2023]
2
Delcroix V, Grislin-Le Strugeon E, Puisieux F. A knowledge based system for the management of a time stamped uncertain observation set with application on preserving mobility. Int J Approx Reason 2021. [DOI: 10.1016/j.ijar.2021.04.003] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
3
A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies. ENTROPY 2021;23:e23050529. [PMID: 33923125 PMCID: PMC8145138 DOI: 10.3390/e23050529] [Citation(s) in RCA: 9] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/15/2021] [Revised: 04/11/2021] [Accepted: 04/20/2021] [Indexed: 12/03/2022]
4
Badman RP, Hills TT, Akaishi R. Multiscale Computation and Dynamic Attention in Biological and Artificial Intelligence. Brain Sci 2020;10:E396. [PMID: 32575758 PMCID: PMC7348831 DOI: 10.3390/brainsci10060396] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/04/2020] [Revised: 05/23/2020] [Accepted: 06/17/2020] [Indexed: 11/16/2022]  Open
5
Zhang B, Rao V. Efficient Parameter Sampling for Markov Jump Processes. J Comput Graph Stat 2020. [DOI: 10.1080/10618600.2020.1763807] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
6
Zamini M, Hasheminejad SMH. A comprehensive survey of anomaly detection in banking, wireless sensor networks, social networks, and healthcare. INTELLIGENT DECISION TECHNOLOGIES 2019. [DOI: 10.3233/idt-170155] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
7
Ensembles of density estimators for positive-unlabeled learning. J Intell Inf Syst 2019. [DOI: 10.1007/s10844-019-00549-w] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
8
Liu M, Stella F, Hommersom A, Lucas PJF, Boer L, Bischoff E. A comparison between discrete and continuous time Bayesian networks in learning from clinical time series data with irregularity. Artif Intell Med 2019;95:104-117. [PMID: 30683464 DOI: 10.1016/j.artmed.2018.10.002] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/19/2017] [Revised: 09/12/2018] [Accepted: 10/03/2018] [Indexed: 12/13/2022]
9
Belouch M, Elhadaj S, Idhammad M. A hybrid filter-wrapper feature selection method for DDoS detection in cloud computing. INTELL DATA ANAL 2018. [DOI: 10.3233/ida-173624] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
10
Mamalakis G, Diou C, Symeonidis AL, Georgiadis L. Of daemons and men: reducing false positive rate in intrusion detection systems with file system footprint analysis. Neural Comput Appl 2018. [DOI: 10.1007/s00521-018-3550-x] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/28/2022]
11
Wu J, Zeng W, Yan F. Hierarchical Temporal Memory method for time-series-based anomaly detection. Neurocomputing 2018. [DOI: 10.1016/j.neucom.2017.08.026] [Citation(s) in RCA: 19] [Impact Index Per Article: 3.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
12
Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT. SENSORS 2017;17:s17091967. [PMID: 28846608 PMCID: PMC5621014 DOI: 10.3390/s17091967] [Citation(s) in RCA: 36] [Impact Index Per Article: 5.1] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/16/2017] [Revised: 08/22/2017] [Accepted: 08/22/2017] [Indexed: 11/28/2022]
13
Aleroud A, Karabatis G. Contextual information fusion for intrusion detection: a survey and taxonomy. Knowl Inf Syst 2017. [DOI: 10.1007/s10115-017-1027-3] [Citation(s) in RCA: 20] [Impact Index Per Article: 2.9] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
14
Sturlaugson L, Sheppard JW. Uncertain and negative evidence in continuous time Bayesian networks. Int J Approx Reason 2016. [DOI: 10.1016/j.ijar.2015.12.013] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
15
Ranshous S, Shen S, Koutra D, Harenberg S, Faloutsos C, Samatova NF. Anomaly detection in dynamic networks: a survey. ACTA ACUST UNITED AC 2015. [DOI: 10.1002/wics.1347] [Citation(s) in RCA: 185] [Impact Index Per Article: 20.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/10/2022]
16
Mamalakis G, Diou C, Symeonidis A, Georgiadis L. Of daemons and men: A file system approach towards intrusion detection. Appl Soft Comput 2014. [DOI: 10.1016/j.asoc.2014.07.026] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
17
Le AV, Le Thi HA, Nguyen MC, Zidna A. Network Intrusion Detection Based on Multi-Class Support Vector Machine. ACTA ACUST UNITED AC 2012. [DOI: 10.1007/978-3-642-34630-9_55] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/23/2023]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA