{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:23:56Z","timestamp":1725794636195},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319082189"},{"type":"electronic","value":"9783319082196"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-08219-6_12","type":"book-chapter","created":{"date-parts":[[2014,5,28]],"date-time":"2014-05-28T06:20:43Z","timestamp":1401258043000},"page":"170-184","source":"Crossref","is-referenced-by-count":0,"title":["Detecting Changes in the Scale of Dependent Gaussian Processes: A Large Deviations Approach"],"prefix":"10.1007","author":[{"given":"Julia","family":"Kuhn","sequence":"first","affiliation":[]},{"given":"Wendy","family":"Ellens","sequence":"additional","affiliation":[]},{"given":"Michel","family":"Mandjes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1002\/ett.4460130303","volume":"13","author":"R. Addie","year":"2002","unstructured":"Addie, R., Mannersalo, P., Norros, I.: Most probable paths and performance formulae for buffers with Gaussian input traffic. European Transactions on Telecommunications\u00a013, 183\u2013196 (2002)","journal-title":"European Transactions on Telecommunications"},{"key":"12_CR2","volume-title":"Detection of Abrupt Changes: Theory and Application","author":"M. Basseville","year":"1993","unstructured":"Basseville, M., Nikiforov, I.: Detection of Abrupt Changes: Theory and Application, vol.\u00a0104. Prentice Hall, Englewood Cliffs, NJ, USA (1993)"},{"key":"12_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-0004-3","volume-title":"Time Series: Theory and Methods","author":"P. Brockwell","year":"1987","unstructured":"Brockwell, P., Davis, R.: Time Series: Theory and Methods. Springer, Berlin (1987)"},{"key":"12_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-8163-9","volume-title":"Nonparametric Methods in Change-Point Problems","author":"B.E. Brodsky","year":"1993","unstructured":"Brodsky, B.E., Darkhovsky, B.S.: Nonparametric Methods in Change-Point Problems. Kluwer Academic Publishers, The Netherlands (1993)"},{"key":"12_CR5","series-title":"Wiley Series in Probability and Mathematical Statistics","volume-title":"Large Deviation Techniques in Decision, Simulation, and Estimation","author":"J. Bucklew","year":"1990","unstructured":"Bucklew, J.: Large Deviation Techniques in Decision, Simulation, and Estimation. Wiley Series in Probability and Mathematical Statistics. Wiley, New York (1990)"},{"key":"12_CR6","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-36784-7_7","volume-title":"Data Traffic Monitoring and Analysis","author":"C. Callegari","year":"2013","unstructured":"Callegari, C., Coluccia, A., D\u2019Alconzo, A., Ellens, W., Giordano, S., Mandjes, M., Pagano, M., Pepe, T., Ricciato, F., \u017buraniewski, P.: A methodological overview on anomaly detection. In: Biersack, E., Callegari, C., Matijasevic, M. (eds.) Data Traffic Monitoring and Analysis, pp. 148\u2013183. Springer, Berlin (2013)"},{"key":"12_CR7","volume-title":"Statistical Inference","author":"G. Casella","year":"1990","unstructured":"Casella, G., Berger, R.L.: Statistical Inference, vol.\u00a070. Duxbury Press, Belmont (1990)"},{"key":"12_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-8176-4801-5","volume-title":"Parametric Statistical Change Point Analysis: With Applications to Genetics, Medicine, and Finance","author":"J. Chen","year":"2012","unstructured":"Chen, J., Gupta, A.: Parametric Statistical Change Point Analysis: With Applications to Genetics, Medicine, and Finance. Springer, Berlin (2012)"},{"key":"12_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-5320-4","volume-title":"Large Deviations Techniques and Applications","author":"A. Dembo","year":"1998","unstructured":"Dembo, A., Zeitouni, O.: Large Deviations Techniques and Applications, 2nd edn. Springer, New York (1998)","edition":"2"},{"key":"12_CR10","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/BFb0006392","volume-title":"Detection of Abrupt Changes in Signals and Dynamical Systems","author":"J. Deshayes","year":"1986","unstructured":"Deshayes, J., Picard, D.: Off-line statistical analysis of change-point models using non parametric and likelihood methods. In: Basseville, M., Benveniste, A. (eds.) Detection of Abrupt Changes in Signals and Dynamical Systems. LNCS, vol.\u00a077, pp. 103\u2013168. Springer, Heidelberg (1986)"},{"key":"12_CR11","unstructured":"Ellens, W., Kuhn, J., Mandjes, M., \u017buraniewski, P.: Changepoint detection for dependent Gaussian sequences. arXiv:1307.0938 (2013) (submitted)"},{"key":"12_CR12","doi-asserted-by":"publisher","DOI":"10.1002\/9780470515099","volume-title":"Large Deviations for Gaussian Queues","author":"M. Mandjes","year":"2007","unstructured":"Mandjes, M.: Large Deviations for Gaussian Queues. John Wiley & Sons, Chichester (2007)"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Mandjes, M., \u017buraniewski, P.: M\/G\/\u221e transience, and its applications to overload detection. Performance Evaluation, 507\u2013527 (2011)","DOI":"10.1016\/j.peva.2011.01.008"},{"key":"12_CR14","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1093\/biomet\/41.1-2.100","volume":"41","author":"E. Page","year":"1954","unstructured":"Page, E.: Continuous inspection scheme. Biometrika\u00a041, 100\u2013115 (1954)","journal-title":"Biometrika"},{"key":"12_CR15","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1111\/j.1467-9892.2010.00707.x","volume":"32","author":"M. Robbins","year":"2011","unstructured":"Robbins, M., Gallagher, C., Lund, R., Aue, A.: Mean shift testing in correlated data. Journal of Time Series Analysis\u00a032, 498\u2013511 (2011)","journal-title":"Journal of Time Series Analysis"},{"key":"12_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-1862-1","volume-title":"Sequential Analysis","author":"D. Siegmund","year":"1985","unstructured":"Siegmund, D.: Sequential Analysis. Springer, New York (1985)"},{"key":"12_CR17","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1109\/TNSM.2012.031512.110146","volume":"9","author":"A. Sperotto","year":"2012","unstructured":"Sperotto, A., Mandjes, M., Sadre, R., de Boer, P.T., Pras, A.: Autonomic parameter tuning of anomaly-based IDSs: An SSH case study. IEEE Transactions on Network and Service Management\u00a09, 128\u2013141 (2012)","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"12_CR18","doi-asserted-by":"publisher","first-page":"3372","DOI":"10.1109\/TSP.2006.879308","volume":"54","author":"A.G. Tartakovsky","year":"2006","unstructured":"Tartakovsky, A.G., Rozovskii, B.L., Blazek, R.B., Kim, H.: A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods. IEEE Transactions on Signal Processing\u00a054, 3372\u20133382 (2006)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"12_CR19","first-page":"339","volume-title":"Applied Sequential Methodologies: Real-World Examples with Data Analysis","author":"A.G. Tartakovsky","year":"2004","unstructured":"Tartakovsky, A.G., Veeravalli, V.: Change-point detection in multichannel and distributed systems. In: Mukhopadhyay, N., Datta, S., Chattopadhyay, S. (eds.) Applied Sequential Methodologies: Real-World Examples with Data Analysis, pp. 339\u2013370. Marcel Dekker, NY (2004)"},{"key":"12_CR20","unstructured":"Wilson, M. (2006), A historical view of network traffic models. Unpublished survey paper, \n                  \n                    http:\/\/www.arl.wustl.edu\/~mlw2\/classpubs\/traffic_models\/"}],"container-title":["Lecture Notes in Computer Science","Analytical and Stochastic Modeling Techniques and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08219-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T19:09:50Z","timestamp":1558897790000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-08219-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319082189","9783319082196"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08219-6_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}