1. Runs and Scans with Applications;Balakrishnan,2002
2. Edge detection using sequential methods for change in level—Part II: Sequential detection of change in mean;Basseville;IEEE Trans. Acoust. Speech Signal Process.,1981
3. The asymptotic local approach to change detection and model validation;Benveniste;IEEE Trans. Automat. Control,1987
4. R. Blažek, H. Kim, B. Rozovskii, A. Tartakovsky, A novel approach to detection of ‘denial-of-service’ attacks via adaptive sequential and batch-sequential change-point detection methods, in: Proc. 2nd Annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop, West Point, NY, 2001
5. M. Bykova, S. Ostermann, B. Tjaden, Detecting network intrusions via a statistical analysis of network packet characteristics, in: Proc. the 33rd Southeastern Symposium on System Theory, 2001, pp. 309–314