关注
Melissa Turcotte
Melissa Turcotte
Research Scientist, Secureworks
在 secureworks.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
Unified host and network data set
MJM Turcotte, AD Kent, C Hash
Data science for cyber-security, 1-22, 2019
1602019
Anomaly detection to identify coordinated group attacks in computer networks
JC Neil, M Turcotte, NA Heard
US Patent App. 14/383,024, 2015
802015
Poisson factorization for peer-based anomaly detection
M Turcotte, J Moore, N Heard, A McPhall
2016 IEEE Conference on Intelligence and Security Informatics (ISI), 208-210, 2016
402016
Modelling user behaviour in a network using computer event logs
MJM Turcotte, NA Heard, AD Kent
Dynamic Networks and Cyber-Security, 67-87, 2016
172016
Modeling behavior in a network using event logs
MJM Turcotte, NA Heard, AD Kent
US Patent 10,375,095, 2019
142019
Detecting localised anomalous behaviour in a computer network
M Turcotte, N Heard, J Neil
Advances in Intelligent Data Analysis XIII: 13th International Symposium …, 2014
132014
Graph link prediction in computer networks using poisson matrix factorisation
F Sanna Passino, MJM Turcotte, NA Heard
The Annals of Applied Statistics 16 (3), 1313-1332, 2022
122022
Statistics and data science for cybersecurity
A Hero, S Kar, J Moura, J Neil, HV Poor, M Turcotte, B Xi
PubPub 5 (1), 2023
112023
Detecting periodic subsequences in cyber security data
M Price-Williams, N Heard, M Turcotte
2017 European Intelligence and Security Informatics Conference (EISIC), 84-90, 2017
112017
Adaptive sequential Monte Carlo for multiple changepoint analysis
NA Heard, MJM Turcotte
Journal of Computational and Graphical Statistics 26 (2), 414-423, 2017
112017
A graph embedding approach to user behavior anomaly detection
A Modell, J Larson, M Turcotte, A Bertiger
2021 IEEE International Conference on Big Data (Big Data), 2650-2655, 2021
102021
Time of Day Anomaly Detection
M Price-Williams, M Turcotte, N Heard
European Intelligence and Security Informatics Conference (EISIC) 2018, 2019
92019
Automated design of tailored link prediction heuristics for applications in enterprise network security
AS Pope, DR Tauritz, M Turcotte
Proceedings of the Genetic and Evolutionary Computation Conference Companion …, 2019
72019
Data Science for Cyber-security
N Heard, N Adams, P Rubin-Delanchy, M Turcotte
World Scientific 3, 304, 2018
72018
Convergence of Monte Carlo distribution estimates from rival samplers
NA Heard, MJM Turcotte
Statistics and Computing 26, 1147-1161, 2016
72016
Anomaly detection in dynamic networks
M Turcotte
Los Alamos National Laboratory (LANL), Los Alamos, NM (United States), 2014
72014
Three statistical approaches to sessionizing network flow data
P Rubin-Delanchy, DJ Lawson, MJ Turcotte, N Heard, NM Adams
2014 IEEE Joint Intelligence and Security Informatics Conference, 244-247, 2014
72014
Changepoint detection on a graph of time series
KL Hallgren, NA Heard, MJM Turcotte
Bayesian Analysis 19 (2), 649-676, 2024
62024
Unified Host and Network Data Set.” arXiv e-prints
MJM Turcotte, AD Kent, C Hash
August, 2017
62017
Monitoring a device in a communication network
NA Heard, MJ Turcotte
Data Analysis for Network Cyber-security, 151-188, 2014
52014
系统目前无法执行此操作,请稍后再试。
文章 1–20