{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T16:26:42Z","timestamp":1772296002125,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100000761","name":"Imperial College London","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100000761","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Stat Comput"],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s11222-019-09875-z","type":"journal-article","created":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T02:35:56Z","timestamp":1557801356000},"page":"209-220","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Nonparametric self-exciting models for computer network traffic"],"prefix":"10.1007","volume":"30","author":[{"given":"Matthew","family":"Price-Williams","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8767-0810","authenticated-orcid":false,"given":"Nicholas A.","family":"Heard","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,13]]},"reference":[{"key":"9875_CR1","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.jfineco.2018.04.008","volume":"129","author":"S Azizpour","year":"2017","unstructured":"Azizpour, S., Giesecke, K., Schwenkler, G.: Exploring the sources of default clustering. J. Financ. Econ. 129, 154\u2013183 (2017)","journal-title":"J. Financ. Econ."},{"issue":"6","key":"9875_CR2","doi-asserted-by":"publisher","first-page":"1564","DOI":"10.1214\/aoms\/1177699148","volume":"37","author":"MT Boswell","year":"1966","unstructured":"Boswell, M.T.: Estimating and testing trend in a stochastic process of Poisson type. Ann. Math. Stat. 37(6), 1564\u20131573 (1966)","journal-title":"Ann. Math. Stat."},{"key":"9875_CR3","volume-title":"Classification and Regression Trees","author":"L Breiman","year":"1984","unstructured":"Breiman, L.: Classification and Regression Trees. CRC Press, Boca Raton (1984)"},{"issue":"2","key":"9875_CR4","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1162\/08997660252741149","volume":"14","author":"EN Brown","year":"2002","unstructured":"Brown, E.N., Barbieri, R., Ventura, V., Kass, R.E., Frank, L.M.: The time-rescaling theorem and its application to neural spike train data analysis. Neural Comput. 14(2), 325\u2013346 (2002)","journal-title":"Neural Comput."},{"key":"9875_CR5","volume-title":"An Introduction to the Theory of Point Processes: volume II: General Theory and Structure","author":"DJ Daley","year":"2007","unstructured":"Daley, D.J., Vere-Jones, D.: An Introduction to the Theory of Point Processes: volume II: General Theory and Structure. Springer, Berlin (2007)"},{"key":"9875_CR6","unstructured":"Etesami, J., Kiyavash, N., Zhang, K., Singhal, K.: Learning network of multivariate Hawkes processes: A time series approach (2016). arXiv:1603.04319"},{"issue":"514","key":"9875_CR7","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1080\/01621459.2015.1135802","volume":"111","author":"EW Fox","year":"2016","unstructured":"Fox, E.W., Short, M.B., Schoenberg, F.P., Coronges, K.D., Bertozzi, A.L.: Modeling e-mail networks and inferring leadership using self-exciting point processes. J Am. Stat. Assoc. 111(514), 564\u2013584 (2016)","journal-title":"J Am. Stat. Assoc."},{"issue":"3","key":"9875_CR8","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1080\/10485252.2010.482154","volume":"23","author":"JD Habiger","year":"2011","unstructured":"Habiger, J.D., Pena, E.A.: Randomised p values and nonparametric procedures in multiple testing. J. Nonparametric Stat. 23(3), 583\u2013604 (2011)","journal-title":"J. Nonparametric Stat."},{"issue":"3","key":"9875_CR9","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1111\/j.2517-6161.1971.tb01530.x","volume":"33","author":"AG Hawkes","year":"1971","unstructured":"Hawkes, A.G.: Point spectra of some mutually exciting point processes. J. R. Stat. Soc. Ser. B 33(3), 438\u2013443 (1971)","journal-title":"J. R. Stat. Soc. Ser. B"},{"key":"9875_CR10","doi-asserted-by":"crossref","unstructured":"Heard, N., Rubin-Delanchy, P.: Network-wide anomaly detection via the dirichlet process. In: IEEE Big Data Analytics for Cybersecurity Computing (BDAC2016). IEEE (2016)","DOI":"10.1109\/ISI.2016.7745478"},{"key":"9875_CR11","doi-asserted-by":"crossref","unstructured":"Jin, C., Wang, H., Shin, K.G.: Hop-count filtering: an effective defense against spoofed DDoS traffic. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 30\u201341. ACM (2003)","DOI":"10.1145\/948109.948116"},{"issue":"500","key":"9875_CR12","doi-asserted-by":"publisher","first-page":"1590","DOI":"10.1080\/01621459.2012.737745","volume":"107","author":"R Killick","year":"2012","unstructured":"Killick, R., Fearnhead, P., Eckley, I.: Optimal detection of changepoints with a linear computational cost. J. Am. Stat. Assoc. 107(500), 1590\u20131598 (2012)","journal-title":"J. Am. Stat. Assoc."},{"issue":"473","key":"9875_CR13","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1198\/016214505000000943","volume":"101","author":"D Lambert","year":"2006","unstructured":"Lambert, D., Liu, C.: Adaptive thresholds. J. Am. Stat. Assoc. 101(473), 78\u201388 (2006)","journal-title":"J. Am. Stat. Assoc."},{"issue":"453","key":"9875_CR14","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1198\/016214501750332884","volume":"96","author":"D Lambert","year":"2001","unstructured":"Lambert, D., Pinheiro, J., Sun, D.X.: Estimating millions of dynamic timing patterns in real time. J. Am. Stat. Assoc. 96(453), 316\u2013330 (2001)","journal-title":"J. Am. Stat. Assoc."},{"key":"9875_CR15","unstructured":"Laub, P.J., Taimre, T., Pollett, P.K.: Hawkes processes (2015). arXiv:1507.02822"},{"key":"9875_CR16","doi-asserted-by":"crossref","unstructured":"Lazarevic, A., Ertoz, L., Kumar, V., Ozgur, A., Srivastava, J.: A comparative study of anomaly detection schemes in network intrusion detection. In: Proceedings of the 2003 SIAM International Conference on Data Mining, pp. 25\u201336 (2003)","DOI":"10.1137\/1.9781611972733.3"},{"key":"9875_CR17","unstructured":"Linderman, S., Adams, R.: Discovering latent network structure in point process data. In: International Conference on Machine Learning, pp. 1413\u20131421 (2014)"},{"issue":"253","key":"9875_CR18","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1080\/01621459.1951.10500769","volume":"46","author":"FJ Massey Jr","year":"1951","unstructured":"Massey Jr., F.J.: The Kolmogorov\u2013Smirnov test for goodness of fit. J. Am. Stat. Assoc. 46(253), 68\u201378 (1951)","journal-title":"J. Am. Stat. Assoc."},{"issue":"4","key":"9875_CR19","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1080\/00401706.2013.822830","volume":"55","author":"J Neil","year":"2013","unstructured":"Neil, J., Hash, C., Brugh, A., Fisk, M., Storlie, C.B.: Scan statistics for the online detection of locally anomalous subgraphs. Technometrics 55(4), 403\u2013414 (2013)","journal-title":"Technometrics"},{"issue":"401","key":"9875_CR20","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1080\/01621459.1988.10478560","volume":"83","author":"Y Ogata","year":"1988","unstructured":"Ogata, Y.: Statistical models for earthquake occurrences and residual analysis for point processes. J. Am. Stat. Assoc. 83(401), 9\u201327 (1988)","journal-title":"J. Am. Stat. Assoc."},{"issue":"1","key":"9875_CR21","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/BF02480272","volume":"31","author":"T Ozaki","year":"1979","unstructured":"Ozaki, T.: Maximum likelihood estimation of Hawkes\u2019 self-exciting point processes. Ann. Inst. Stat. Math. 31(1), 145\u2013155 (1979)","journal-title":"Ann. Inst. Stat. Math."},{"key":"9875_CR22","unstructured":"Price-Williams, M., Heard, N.A., Turcotte, M.: Detecting periodic subsequences in cyber security data (2017). arXiv:1707.00640"},{"key":"9875_CR23","unstructured":"Rubin-Delanchy, P., Heard, N.A.: On the mid-p value of a test statistic with arbitrary real support (2015). arXiv:1505.05068"},{"issue":"2","key":"9875_CR24","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1214\/aos\/1176344136","volume":"6","author":"G Schwarz","year":"1978","unstructured":"Schwarz, G.: Estimating the dimension of a model. Ann. Stat. 6(2), 461\u2013464 (1978)","journal-title":"Ann. Stat."},{"issue":"11","key":"9875_CR25","first-page":"27","volume":"5","author":"NK Singh","year":"2010","unstructured":"Singh, N.K., Tomar, D.S., Roy, B.N.: An approach to understand the end user behavior through log analysis. Int. J. Comput. Appl. 5(11), 27\u201334 (2010)","journal-title":"Int. J. Comput. Appl."},{"key":"9875_CR26","unstructured":"Thatte, G., Mitra, U., Heidemann, J.: Detection of low-rate attacks in computer networks. In: INFOCOM Workshops 2008, IEEE, pp. 321\u2013332. IEEE (2008)"},{"key":"9875_CR27","doi-asserted-by":"crossref","unstructured":"Turcotte, M., Heard, N.A., Kent, A.D.: Modelling user behaviour in a network using computer event logs. In: Dynamic Networks in Cybersecurity, pp. 67\u201377. Imperial College Press (2016)","DOI":"10.1142\/9781786340757_0003"},{"key":"9875_CR28","doi-asserted-by":"crossref","unstructured":"Turcotte, M., Heard, N.A., Neil, J.: Detecting localised anomalous behaviour in a computer network. In: International Symposium on Intelligent Data Analysis, pp. 321\u2013332. Springer (2014)","DOI":"10.1007\/978-3-319-12571-8_28"},{"key":"9875_CR29","doi-asserted-by":"crossref","unstructured":"Turcotte, M., Kent, A.D., Hash, C.: Unified host and network data set (2017)","DOI":"10.1142\/9781786345646_001"},{"issue":"4","key":"9875_CR30","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1214\/aoms\/1177730151","volume":"19","author":"HOA Wold","year":"1948","unstructured":"Wold, H.O.A.: On prediction in stationary time series. Ann. Math. Stat. 19(4), 558\u2013567 (1948)","journal-title":"Ann. Math. Stat."},{"key":"9875_CR31","unstructured":"Xu, H., Farajtabar, M., Zha, H.: Learning granger causality for hawkes processes. In: International Conference on Machine Learning, pp. 1717\u20131726 (2016)"},{"key":"9875_CR32","unstructured":"Yang, Y., Etesami, J., He, N., Kiyavash, N.: Nonparametric hawkes processes: online estimation and generalization bounds (2018). arXiv preprint arXiv:1801.08273"}],"container-title":["Statistics and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11222-019-09875-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11222-019-09875-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11222-019-09875-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,18]],"date-time":"2024-07-18T00:05:49Z","timestamp":1721261149000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11222-019-09875-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,13]]},"references-count":32,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["9875"],"URL":"https:\/\/doi.org\/10.1007\/s11222-019-09875-z","relation":{},"ISSN":["0960-3174","1573-1375"],"issn-type":[{"value":"0960-3174","type":"print"},{"value":"1573-1375","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,13]]},"assertion":[{"value":"29 June 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 April 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}