N A Heard
N A Heard
Verified email at - Homepage
Cited by
Cited by
Bayesian anomaly detection methods for social networks
NA Heard, DJ Weston, K Platanioti, DJ Hand
A quantitative study of gene regulation involved in the immune response of anopheline mosquitoes: An application of Bayesian hierarchical clustering of curves
NA Heard, CC Holmes, DA Stephens
Journal of the American Statistical Association 101 (473), 18-29, 2006
Choosing between methods of combining -values
NA Heard, P Rubin-Delanchy
Biometrika 105 (1), 239-246, 2018
Bayesian cluster identification in single-molecule localization microscopy data
P Rubin-Delanchy, GL Burn, J Griffié, DJ Williamson, NA Heard, AP Cope, ...
Nature methods 12 (11), 1072-1076, 2015
Generalized monotonic regression using random change points
CC Holmes, NA Heard
Statistics in Medicine 22 (4), 623-638, 2003
Bayesian coclustering of Anopheles gene expression time series: study of immune defense response to multiple experimental challenges
NA Heard, CC Holmes, DA Stephens, DJ Hand, G Dimopoulos
Proceedings of the National Academy of Sciences 102 (47), 16939-16944, 2005
Anomaly detection to identify coordinated group attacks in computer networks
JC Neil, M Turcotte, NA Heard
US Patent App. 14/383,024, 2015
A Bayesian cluster analysis method for single-molecule localization microscopy data
J Griffié, M Shannon, CL Bromley, L Boelen, GL Burn, DJ Williamson, ...
Nature Protocols 11 (12), 2499-2514, 2016
Finding groups in gene expression data
DJ Hand, NA Heard
BioMed Research International 2005 (2), 215-225, 2005
Data analysis for network cyber-security
NM Adams, NA Heard
World Scientific, 2014
Method and apparatus for determining one or more statistical estimators of customer behavior
N Heard
US Patent 7,092,920, 2006
Poisson factorization for peer-based anomaly detection
M Turcotte, J Moore, N Heard, A McPhall
2016 IEEE Conference on Intelligence and Security Informatics (ISI), 208-210, 2016
Dynamic networks and cyber-security
NM Adams, NA Heard
World Scientific, 2016
Network-wide anomaly detection via the Dirichlet process
N Heard, P Rubin-Delanchy
2016 IEEE Conference on Intelligence and Security Informatics (ISI), 220-224, 2016
Filtering automated polling traffic in computer network flow data
N Heard, P Rubin-Delanchy, DJ Lawson
2014 ieee joint intelligence and security informatics conference, 268-271, 2014
Meta-Analysis of Mid-p-Values: Some New Results based on the Convex Order
P Rubin-Delanchy, NA Heard, DJ Lawson
Journal of the American Statistical Association 114 (527), 1105-1112, 2019
Bayesian estimation of the latent dimension and communities in stochastic blockmodels
FS Passino, NA Heard
Statistics and Computing 30 (5), 1291-1307, 2020
Link prediction in dynamic networks using random dot product graphs
F Sanna Passino, AS Bertiger, JC Neil, NA Heard
Data Mining and Knowledge Discovery 35 (5), 2168-2199, 2021
Modelling user behaviour in a network using computer event logs
MJM Turcotte, NA Heard, AD Kent
Dynamic Networks and Cyber-Security, 67-87, 2016
An introduction to Bayesian inference, methods and computation
N Heard
Springer, 2021
The system can't perform the operation now. Try again later.
Articles 1–20