Unified host and network data set MJM Turcotte, AD Kent, C Hash Data science for cyber-security, 1-22, 2019 | 160 | 2019 |
Anomaly detection to identify coordinated group attacks in computer networks JC Neil, M Turcotte, NA Heard US Patent App. 14/383,024, 2015 | 80 | 2015 |
Poisson factorization for peer-based anomaly detection M Turcotte, J Moore, N Heard, A McPhall 2016 IEEE Conference on Intelligence and Security Informatics (ISI), 208-210, 2016 | 40 | 2016 |
Modelling user behaviour in a network using computer event logs MJM Turcotte, NA Heard, AD Kent Dynamic Networks and Cyber-Security, 67-87, 2016 | 17 | 2016 |
Modeling behavior in a network using event logs MJM Turcotte, NA Heard, AD Kent US Patent 10,375,095, 2019 | 14 | 2019 |
Detecting localised anomalous behaviour in a computer network M Turcotte, N Heard, J Neil Advances in Intelligent Data Analysis XIII: 13th International Symposium …, 2014 | 13 | 2014 |
Graph link prediction in computer networks using poisson matrix factorisation F Sanna Passino, MJM Turcotte, NA Heard The Annals of Applied Statistics 16 (3), 1313-1332, 2022 | 12 | 2022 |
Statistics and data science for cybersecurity A Hero, S Kar, J Moura, J Neil, HV Poor, M Turcotte, B Xi PubPub 5 (1), 2023 | 11 | 2023 |
Detecting periodic subsequences in cyber security data M Price-Williams, N Heard, M Turcotte 2017 European Intelligence and Security Informatics Conference (EISIC), 84-90, 2017 | 11 | 2017 |
Adaptive sequential Monte Carlo for multiple changepoint analysis NA Heard, MJM Turcotte Journal of Computational and Graphical Statistics 26 (2), 414-423, 2017 | 11 | 2017 |
A graph embedding approach to user behavior anomaly detection A Modell, J Larson, M Turcotte, A Bertiger 2021 IEEE International Conference on Big Data (Big Data), 2650-2655, 2021 | 10 | 2021 |
Time of Day Anomaly Detection M Price-Williams, M Turcotte, N Heard European Intelligence and Security Informatics Conference (EISIC) 2018, 2019 | 9 | 2019 |
Automated design of tailored link prediction heuristics for applications in enterprise network security AS Pope, DR Tauritz, M Turcotte Proceedings of the Genetic and Evolutionary Computation Conference Companion …, 2019 | 7 | 2019 |
Data Science for Cyber-security N Heard, N Adams, P Rubin-Delanchy, M Turcotte World Scientific 3, 304, 2018 | 7 | 2018 |
Convergence of Monte Carlo distribution estimates from rival samplers NA Heard, MJM Turcotte Statistics and Computing 26, 1147-1161, 2016 | 7 | 2016 |
Anomaly detection in dynamic networks M Turcotte Los Alamos National Laboratory (LANL), Los Alamos, NM (United States), 2014 | 7 | 2014 |
Three statistical approaches to sessionizing network flow data P Rubin-Delanchy, DJ Lawson, MJ Turcotte, N Heard, NM Adams 2014 IEEE Joint Intelligence and Security Informatics Conference, 244-247, 2014 | 7 | 2014 |
Changepoint detection on a graph of time series KL Hallgren, NA Heard, MJM Turcotte Bayesian Analysis 19 (2), 649-676, 2024 | 6 | 2024 |
Unified Host and Network Data Set.” arXiv e-prints MJM Turcotte, AD Kent, C Hash August, 2017 | 6 | 2017 |
Monitoring a device in a communication network NA Heard, MJ Turcotte Data Analysis for Network Cyber-security, 151-188, 2014 | 5 | 2014 |