2019
DOI: 10.3934/fods.2019013
|View full text |Cite
|
Sign up to set email alerts
|

Modelling dynamic network evolution as a Pitman-Yor process

Abstract: Dynamic interaction networks frequently arise in biology, communications technology and the social sciences, representing, for example, neuronal connectivity in the brain, internet connections between computers and human interactions within social networks. The evolution and strengthening of the links in such networks can be observed through sequences of connection events occurring between network nodes over time. In some of these applications, the identity and size of the network may be unknown a priori and m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 26 publications
0
6
0
Order By: Relevance
“…From a Bayesian perspective, some scalable approaches have been designed for modelling and detecting anomalies in cyber security applications. Examples of these include the following: Clausen et al (2018), where a Markov-modulated Poisson process embedded in a fast and scalable Bayesian framework was used in the modelling for network flow data; Chen et al (2018), where a novel class of Bayesian dynamic models was introduced and applied to Internet traffic and, according to the authors, the sequential analysis is fast, scalable and efficient; Muñoz González et al (2017) explored two methods for scalable inference on Bayesian attack graphs; other models like the one described in Rubin-Delanchy (2016) andin Sanna Passino & are fully parallelisable and suitable for platforms designed for Big Data analysis like Hadoop.…”
Section: Scalabilitymentioning
confidence: 99%
See 4 more Smart Citations
“…From a Bayesian perspective, some scalable approaches have been designed for modelling and detecting anomalies in cyber security applications. Examples of these include the following: Clausen et al (2018), where a Markov-modulated Poisson process embedded in a fast and scalable Bayesian framework was used in the modelling for network flow data; Chen et al (2018), where a novel class of Bayesian dynamic models was introduced and applied to Internet traffic and, according to the authors, the sequential analysis is fast, scalable and efficient; Muñoz González et al (2017) explored two methods for scalable inference on Bayesian attack graphs; other models like the one described in Rubin-Delanchy (2016) andin Sanna Passino & are fully parallelisable and suitable for platforms designed for Big Data analysis like Hadoop.…”
Section: Scalabilitymentioning
confidence: 99%
“…These scores are then used to rank the computers and, in the case of the compromised ones, a high anomaly score should be assigned. In Table 4, we present the results that obtained in Heard & Rubin‐Delanchy (2016) with the DP p values aggregated using Fisher's method (Fisher, 1934) and the best results obtained in Sanna Passino & Heard (2019) with the PY mid p values aggregated using Pearson's method (Pearson, 1933).…”
Section: Network Anomaly Detectionmentioning
confidence: 99%
See 3 more Smart Citations