{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T05:25:36Z","timestamp":1734153936025,"version":"3.30.2"},"reference-count":23,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2004,2,1]],"date-time":"2004-02-01T00:00:00Z","timestamp":1075593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computational Statistics &amp; Data Analysis"],"published-print":{"date-parts":[[2004,2]]},"DOI":"10.1016\/s0167-9473(03)00177-4","type":"journal-article","created":{"date-parts":[[2003,9,3]],"date-time":"2003-09-03T13:54:17Z","timestamp":1062597257000},"page":"69-83","source":"Crossref","is-referenced-by-count":44,"title":["A Bayesian paradigm for designing intrusion detection systems"],"prefix":"10.1016","volume":"45","author":[{"given":"Steven L","family":"Scott","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-9473(03)00177-4_BIB1","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1214\/aoms\/1177697196","article-title":"A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains","volume":"41","author":"Baum","year":"1970","journal-title":"Ann. Math. Statist."},{"key":"10.1016\/S0167-9473(03)00177-4_BIB2","doi-asserted-by":"crossref","unstructured":"Cahill, M., Chen, F., Lambert, D., Pinheiro, J., Sun, D., 2002. Detecting fraud in the real world. In: Abello, J., Pardalos, P.M., Resende, M.G.C., Handbook of Massive Datasets. Kluwer Academic Publishers, Dordrecht","DOI":"10.1007\/978-1-4615-0005-6_26"},{"year":"1999","series-title":"Probabilistic Networks and Expert Systems","author":"Cowell","key":"10.1016\/S0167-9473(03)00177-4_BIB3"},{"key":"10.1016\/S0167-9473(03)00177-4_BIB4","unstructured":"Denning, D.E., Denning, P.J. (Eds.), 1997. Internet Beseiged. ACM Press, New York."},{"key":"10.1016\/S0167-9473(03)00177-4_BIB5","unstructured":"DuMouchel, W., 1999. Computer intrusion detection based on Bayes factors for comparing command transition probabilities. Technical Report 91, National Institute of Statistical Sciences. http:\/\/www.niss.org\/downloadabletechreports.html."},{"key":"10.1016\/S0167-9473(03)00177-4_BIB6","first-page":"377","article-title":"Parameter estimation in large dynamic paired comparison experiments","volume":"48","author":"Glickman","year":"1999","journal-title":"Appl. Statist."},{"key":"10.1016\/S0167-9473(03)00177-4_BIB7","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1214\/ss\/1009212519","article-title":"Bayesian model averaging","volume":"14","author":"Hoeting","year":"1999","journal-title":"Statist. Sci."},{"key":"10.1016\/S0167-9473(03)00177-4_BIB8","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1198\/10618600152628068","article-title":"A hybrid high-order Markov chain model for computer intrusion detection","volume":"10","author":"Ju","year":"2001","journal-title":"J. Comput. Graphical Statist."},{"key":"10.1016\/S0167-9473(03)00177-4_BIB9","doi-asserted-by":"crossref","first-page":"773","DOI":"10.2307\/2291091","article-title":"Bayes factors","volume":"90","author":"Kass","year":"1995","journal-title":"J. Amer. Statist. Assoc."},{"key":"10.1016\/S0167-9473(03)00177-4_BIB10","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/0025-5564(95)00093-3","article-title":"Measures of concurrency in networks and the spread of infectious disease","volume":"133","author":"Kretzschmar","year":"1996","journal-title":"Math. Biosci."},{"key":"10.1016\/S0167-9473(03)00177-4_BIB11","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1198\/016214501750332884","article-title":"Estimating millions of dynamic timing patterns in real-time","volume":"96","author":"Lambert","year":"2001","journal-title":"J. Amer. Statist. Assoc."},{"year":"1997","series-title":"Hidden Markov and Other Models for Discrete-Valued Time Series","author":"MacDonald","key":"10.1016\/S0167-9473(03)00177-4_BIB12"},{"key":"10.1016\/S0167-9473(03)00177-4_BIB13","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1111\/j.2517-6161.1985.tb01383.x","article-title":"A model for high-order Markov chains","volume":"47","author":"Raftery","year":"1985","journal-title":"J. Roy. Statist. Soc. Ser. B, Methodological"},{"key":"10.1016\/S0167-9473(03)00177-4_BIB14","doi-asserted-by":"crossref","first-page":"179","DOI":"10.2307\/2986120","article-title":"Estimation and modelling repeated patterns in high order Markov chains with the mixture transition distribution model","volume":"43","author":"Raftery","year":"1994","journal-title":"Appl. Statist."},{"key":"10.1016\/S0167-9473(03)00177-4_BIB15","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/S0020-0190(00)00122-8","article-title":"Detecting masquerades in intrusion detection based unpopular commands","volume":"76","author":"Schonlau","year":"2000","journal-title":"Inform. Process. Lett."},{"key":"10.1016\/S0167-9473(03)00177-4_BIB16","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1214\/ss\/998929476","article-title":"Computer intrusion","volume":"16","author":"Schonlau","year":"2001","journal-title":"Statist. Sci."},{"issue":"3","key":"10.1016\/S0167-9473(03)00177-4_BIB17","doi-asserted-by":"crossref","first-page":"662","DOI":"10.2307\/1390883","article-title":"Bayesian analysis of a two state Markov modulated Poisson process","volume":"8","author":"Scott","year":"1999","journal-title":"J. Comput. Graphical Statist."},{"key":"10.1016\/S0167-9473(03)00177-4_BIB18","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1198\/016214502753479464","article-title":"Bayesian methods for hidden Markov models","volume":"97","author":"Scott","year":"2002","journal-title":"J. Amer. Statist. Assoc."},{"key":"10.1016\/S0167-9473(03)00177-4_BIB19","unstructured":"Scott, S.L., 2002b. Detecting network intrusion using the Markov modulated nonhomogeneous Poisson process. Technical Report IOM-00-09, The Marshall School of Business, University of Southern California. www-rcf.usc.edu\/~sls\/mmnhpp.ps."},{"key":"10.1016\/S0167-9473(03)00177-4_BIB20","doi-asserted-by":"crossref","unstructured":"Scott, S.L., Smyth, P., 2003. The Markov modulated Poisson process and Markov Poisson cascade with applications to Web traffic data. In: Bernardo, J.M., Bayarri, M.J., Berger, J.O., Dawid, A.P., Heckerman, D., Smith, A.F.M., West, M. (Eds.), Bayesian Statistics, Vol. 7. Oxford University Press, Oxford, 671\u2013680.","DOI":"10.1093\/oso\/9780198526155.003.0047"},{"year":"1997","series-title":"Bayesian Forecasting and Dynamic Models","author":"West","key":"10.1016\/S0167-9473(03)00177-4_BIB21"},{"year":"1990","series-title":"Graphical Models in Applied Multivariate Statistics","author":"Whittaker","key":"10.1016\/S0167-9473(03)00177-4_BIB22"},{"key":"10.1016\/S0167-9473(03)00177-4_BIB23","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1214\/ss\/1177010131","article-title":"Self-similarity in high-speed packet traffic","volume":"10","author":"Willinger","year":"1995","journal-title":"Statist. Sci."}],"container-title":["Computational Statistics &amp; Data Analysis"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167947303001774?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167947303001774?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T16:42:48Z","timestamp":1734108168000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167947303001774"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,2]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2004,2]]}},"alternative-id":["S0167947303001774"],"URL":"https:\/\/doi.org\/10.1016\/s0167-9473(03)00177-4","relation":{},"ISSN":["0167-9473"],"issn-type":[{"type":"print","value":"0167-9473"}],"subject":[],"published":{"date-parts":[[2004,2]]}}}