Contents:John Nelder: From General Balance to Generalised Models (Both Linear and Hierarchical) (S Senn)Some Remarkes on Model Criticism (D R Cox)Likelihood Perspectives in the Consensus and Controversies of Statistical Modelling and Inference (Y Pawitan)Perspectives of ANOVA, REML and a General Linear Mixed Model (B R Cullis et al.)Algorithms, Data Structures and Languages — the Computational Ingredients for Innovative Analysis (R Payne)Non-Linear Regression Modelling and Inference (J C Wakefield)Selecting Amongst Large Classes of Models (B D Ripley)Principles of Designed Experiments in J A Nelder's Papers (R A Bailey)Likelihood-based Models Beyond GLMs (Y Lee)A Statistical Examination of the Hastings Rarities (J A Nelder)
Readership: Students of statistics at masters or PhD level, as well as practising statisticians.
Keywords:Statistics;John Nelder;Optimization;Likelihood;Statistical Modelling;Statistical Computing
Such work involves the intersection of statistics, data mining and computer science. Fundamentally, network traffic is relational, embodying a link between devices. As such, graph analysis approaches are a natural candidate. However, such methods do not scale well to the demands of real problems, and the critical aspect of the timing of communications events is not accounted for in these approaches.
This book gathers papers from leading researchers to provide both background to the problems and a description of cutting-edge methodology. The contributors are from diverse institutions and areas of expertise and were brought together at a workshop held at the University of Bristol in March 2013 to address the issues of network cyber security. The workshop was supported by the Heilbronn Institute for Mathematical Research.Contents:Inference for Graphs and Networks: Adapting Classical Tools to Modern Data (Benjamin P Olding and Patrick J Wolfe)Rapid Detection of Attacks in Computer Networks by Quickest Changepoint Detection Methods (Alexander G Tartakovsky)Statistical Detection of Intruders Within Computer Networks Using Scan Statistics (Joshua Neil, Curtis Storlie, Curtis Hash and Alex Brugh)Characterizing Dynamic Group Behavior in Social Networks for Cybernetics (Sumeet Dua and Pradeep Chowriappa)Several Approaches for Detecting Anomalies in Network Traffic Data (Céline Lévy-Leduc)Monitoring a Device in a Communication Network (Nicholas A Heard and Melissa Turcotte)
Readership: Researchers and graduate students in the fields of network traffic data analysis and network cyber security.
Key Features:This book is unique in being a treatise on the statistical analysis of network traffic dataThe contributors are leading researches in the field and will give authoritative descriptions of cutting edge methodologyThe book features material from diverse areas, and as such forms a unified view of network cyber securityKeywords:Network Data Analysis;Cyber Security;Change Detection;Anomaly Detection