The following publications are possibly variants of this publication:
- A 2-SPRT Based Approach to Multiple-Model Hypothesis Testing for Multi-Distribution DetectionBao Liu, Jian Lan, X. Rong Li. tsp, 64(12):3221-3236, 2016. [doi]
- Design of Cloud-Based Parallel Exclusive Signature Matching Model in Intrusion DetectionYuxin Meng, Wenjuan Li, Lam-for Kwok. hpcc 2013: 175-182 [doi]
- Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion DetectionYuxin Meng, Wenjuan Li, Lam-for Kwok. NSS 2013: 40-53 [doi]
- Design of Intrusion Sensitivity-Based Trust Management Model for Collaborative Intrusion Detection NetworksWenjuan Li, Weizhi Meng, Lam-for Kwok. ifiptm 2014: 61-76 [doi]