Discrete Multivariate Analysis: Theory and Practice (1975)

Cached

Download Links

by Yvonne M. M. Bishop , Stephen E. Fienberg , Paul W. Holl , Richard J. Light , Frederick Mosteller , Peter B. Imrey , Yvonne M. M. Bishop , Stephen E. Fienberg , Paul W. Holl
Citations:420 - 34 self

Documents Related by Co-Citation

8058 Maximum likelihood from incomplete data via the EM algorithm – A. P. Dempster, N. M. Laird, D. B. Rubin - 1977
1188 Categorical Data Analysis – A AGRESTI - 2002
1314 Generalized Additive Models – Ttcvor Hastie, Robert Tibahirani - 1990
3874 Classification and Regression Trees – L Breiman, J H Friedman, R A Olshen, C J Stone - 1984
3 NIDES: A Summary – Brian D. O. Anderson, Thomas Brinsmead, Daniel Liberzon, A. Stephen Morse
3 Laboratories DARPA Intrusion Evaluation Detection – MIT Lincoln
4 STAT: A State Transition Analysis for Intrusion Detection – P A Porras - 1992
3 et al. Cyber Crime – I Sager
3 Haystack audit trail analysis system – S Smaha - 1990
53 A Prototype Real-Time Intrusion-Detection Expert System (IDES – Teresa F Lunt, R Jagannathan - 1988
67 Detecting unusual program behavior using the statistical component of the nextgeneration intrusion detection system (NIDES – Debra Anderson, Teresa F Lunt, Harold Javitz, Ann Tamaru, Alfonso Valdes - 1995
122 USTAT: A Real-time Intrusion Detection System for UNIX – Koral Ilgun - 1992
85 NetSTAT: A Network-based Intrusion Detection Approach – Giovanni Vigna , Richard A. Kemmerer - 1998
2418 Mining Association Rules between Sets of Items in Large Databases – Rakesh Agrawal, Tomasz Imielinski, Arun Swami - 1993
320 Data Mining Approaches for Intrusion Detection – Wenke Lee, Salvatore J. Stolfo
354 EMERALD: Event monitoring enabling responses to anomalous live disturbances – Phillip A. Porras, Peter G. Neumann - 1997
260 A data mining framework for building intrusion detection models – Wenke Lee, Salvatore J. Stolfo, Kui W. Mok - 1999
95 Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-BEST) – Ulf Lindqvist, Phillip A. Porras - 1999
257 An intrusion detection model – D E Denning - 1987