{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T18:29:58Z","timestamp":1725388198539},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/globalsip.2015.7418211","type":"proceedings-article","created":{"date-parts":[[2016,2,25]],"date-time":"2016-02-25T16:20:46Z","timestamp":1456417246000},"page":"328-332","source":"Crossref","is-referenced-by-count":2,"title":["Atypicality for vector Gaussian models"],"prefix":"10.1109","author":[{"given":"Elyas","family":"Sabeti","sequence":"first","affiliation":[]},{"given":"Anders","family":"Host-Madsen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"6","article-title":"Anomaly detection based-on the regularity of normal behaviors","author":"pan","year":"2006","journal-title":"Systems and Control in Aerospace and Astronautics 2006 ISSCAA 2006 1st International Symposium on"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IWIA.2006.3"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-49820-1"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199230761.001.0001"},{"journal-title":"Information Theory","year":"2006","author":"cover","key":"ref14"},{"key":"ref15","article-title":"Atypical information theory for real-valued data","author":"h\u00f8st-madsen","year":"0","journal-title":"Proc 2015 IEEE Int Symposium on Information Theory"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2012.2211014"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176346150"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1975.1055349"},{"key":"ref19","article-title":"Information theory for atypical sequences","author":"h\u00f8st-madsen","year":"2013","journal-title":"IEEE Information Theory Workshop (ITW"},{"key":"ref4","first-page":"130","article-title":"Information-theoretic measures for anomaly detection","author":"lee","year":"2001","journal-title":"Security and Privacy 2001 S&P 2001 Proceedings 2001 IEEE Symposium on"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2012.8"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2009.5274916"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.2001468"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2012.31"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/GRC.2005.1547318"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2004.1493313"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.235"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2107320"},{"key":"ref20","article-title":"On the use and interpretation of certain test critera for purposes of statistical inference","author":"neyman","year":"1928","journal-title":"Biometrika"},{"year":"0","key":"ref21","article-title":"Free Historical Stock Data"}],"event":{"name":"2015 IEEE Global Conference on Signal and Information Processing (GlobalSIP)","start":{"date-parts":[[2015,12,14]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2015,12,16]]}},"container-title":["2015 IEEE Global Conference on Signal and Information Processing (GlobalSIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7406206\/7416920\/07418211.pdf?arnumber=7418211","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T15:19:44Z","timestamp":1490282384000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7418211\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/globalsip.2015.7418211","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}