Author:
Vermillion Sean D.,Thomas Jordan L.,Brown David P.,Buede Dennis M.
Publisher
Springer International Publishing
Reference10 articles.
1. Huang, E., Zaidi, A. K., & Laskey, K. B. (2018). Inference enterprise multimodeling for insider threat detection systems. In A. M. Madni, B. Boehm, R. G. Ghanem, D. Erwin, & M. J. Wheaton (Eds.), Disciplinary convergence in systems engineering research (pp. 175–186). Cham, Switzerland: Springer.
2. Turcotte, M. J., Kent, A. D., & Hash, C. (2017). Unified host and network data set. arXiv preprint arXiv:170807518.
3. Efron, B. (1986). Why isn’t everyone a Bayesian? The American Statistician, 40, 1–5.
4. O'Hagan, T. (2004). Dicing with the unknown. Significance, 1, 132–133.
5. Wagenmakers, E.-J., Lee, M., Lodewyckx, T., & Iverson, G. J. (2008). Bayesian versus frequentist inference. Bayesian evaluation of informative hypotheses (pp. 181–207). Berlin, Germany: Springer.