相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。HMMs based masquerade detection for network security on with parallel computing
Jia Liu et al.
COMPUTER COMMUNICATIONS (2020)
Analysis of hidden Markov model learning algorithms for the detection and prediction of multi-stage network attacks
Timothy Chadza et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)
Summation Detector for False Data-Injection Attack in Cyber-Physical Systems
Dan Ye et al.
IEEE TRANSACTIONS ON CYBERNETICS (2020)
False data injection attacks with complete stealthiness in cyber-physical systems: A self-generated approach
Tian-Yu Zhang et al.
AUTOMATICA (2020)
From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks
Nikolaos Polatidis et al.
EVOLVING SYSTEMS (2020)
Cyber-attack detection in SCADA systems using temporal pattern recognition techniques
Meir Kalech
COMPUTERS & SECURITY (2019)
Hidden-Markov-Model-Based Asynchronous Filter Design of Nonlinear Markov Jump Systems in Continuous-Time Domain
Shanling Dong et al.
IEEE TRANSACTIONS ON CYBERNETICS (2019)
Even Triggered Risk-Sensitive State Estimation for Hidden Markov Models
Jiapeng Xu et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2019)
Event-Based State Estimation of Hidden Markov Models Through a Gilbert-Elliott Channel
Wentao Chen et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2017)
On Finite-State Stochastic Modeling and Secure Estimation of Cyber-Physical Systems
Dawei Shi et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2017)
Weakly Supervised Learning of Hidden Markov Models for Spoken Language Acquisition
Vincent Renkens et al.
IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING (2017)
Energy-based event-triggered state estimation for hidden Markov models
Jiarao Huang et al.
AUTOMATICA (2017)
Event-based state estimation of discrete-state hidden Markov models
Dawei Shi et al.
AUTOMATICA (2016)
Deformable Registration of Biomedical Images Using 2D Hidden Markov Models
Renuka Shenoy et al.
IEEE TRANSACTIONS ON IMAGE PROCESSING (2016)
Minimal Realization Problems for Hidden Markov Models
Qingqing Huang et al.
IEEE TRANSACTIONS ON SIGNAL PROCESSING (2016)
Identifying Attack Propagation Patterns in Honeypots using Markov Chains Modeling and Complex Networks Analysis
Ariel Bar et al.
2016 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE SCIENCE, TECHNOLOGY AND ENGINEERING (SWSTE 2016) (2016)
Stochastic Event-Triggered Sensor Schedule for Remote State Estimation
Duo Han et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2015)
Markov Chain Approximation Algorithm for Event-Based State Estimation
Sangjin Lee et al.
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY (2015)
An event-triggered approach to state estimation with multiple point- and set-valued measurements
Dawei Shi et al.
AUTOMATICA (2014)
Recognition of on-line handwritten mathematical expressions using 2D stochastic context-free grammars and hidden Markov models
Francisco Alvaro et al.
PATTERN RECOGNITION LETTERS (2014)
A Finite State Hidden Markov Model for Predicting Multistage Attacks in Cloud Systems
Hisham A. Kholidy et al.
2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM) (2014)
Event-Based Sensor Data Scheduling: Trade-Off Between Communication Rate and Estimation Quality
Junfeng Wu et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2013)
Speech Synthesis Based on Hidden Markov Models
Keiichi Tokuda et al.
PROCEEDINGS OF THE IEEE (2013)
Event Based State Estimation With Time Synchronous Updates
Joris Sijs et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2012)
A survey of recent results in networked control systems
Joao P. Hespanha et al.
PROCEEDINGS OF THE IEEE (2007)
Kalman filtering with intermittent observations
B Sinopoli et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2004)
Recursive algorithms for estimation of hidden Markov models and autoregressive models with Markov regime
V Krishnamurthy et al.
IEEE TRANSACTIONS ON INFORMATION THEORY (2002)