Bayesian anomaly detection methods for social networks NA Heard, DJ Weston, K Platanioti, DJ Hand | 249 | 2010 |
A quantitative study of gene regulation involved in the immune response of anopheline mosquitoes: An application of Bayesian hierarchical clustering of curves NA Heard, CC Holmes, DA Stephens Journal of the American Statistical Association 101 (473), 18-29, 2006 | 248 | 2006 |
Choosing between methods of combining -values NA Heard, P Rubin-Delanchy Biometrika 105 (1), 239-246, 2018 | 171 | 2018 |
Bayesian cluster identification in single-molecule localization microscopy data P Rubin-Delanchy, GL Burn, J Griffié, DJ Williamson, NA Heard, AP Cope, ... Nature methods 12 (11), 1072-1076, 2015 | 135 | 2015 |
Generalized monotonic regression using random change points CC Holmes, NA Heard Statistics in Medicine 22 (4), 623-638, 2003 | 88 | 2003 |
Bayesian coclustering of Anopheles gene expression time series: study of immune defense response to multiple experimental challenges NA Heard, CC Holmes, DA Stephens, DJ Hand, G Dimopoulos Proceedings of the National Academy of Sciences 102 (47), 16939-16944, 2005 | 82 | 2005 |
Anomaly detection to identify coordinated group attacks in computer networks JC Neil, M Turcotte, NA Heard US Patent App. 14/383,024, 2015 | 80 | 2015 |
A Bayesian cluster analysis method for single-molecule localization microscopy data J Griffié, M Shannon, CL Bromley, L Boelen, GL Burn, DJ Williamson, ... Nature Protocols 11 (12), 2499-2514, 2016 | 54 | 2016 |
Finding groups in gene expression data DJ Hand, NA Heard BioMed Research International 2005 (2), 215-225, 2005 | 46 | 2005 |
Data analysis for network cyber-security NM Adams, NA Heard World Scientific, 2014 | 45 | 2014 |
Method and apparatus for determining one or more statistical estimators of customer behavior N Heard US Patent 7,092,920, 2006 | 41 | 2006 |
Poisson factorization for peer-based anomaly detection M Turcotte, J Moore, N Heard, A McPhall 2016 IEEE Conference on Intelligence and Security Informatics (ISI), 208-210, 2016 | 40 | 2016 |
Dynamic networks and cyber-security NM Adams, NA Heard World Scientific, 2016 | 39 | 2016 |
Network-wide anomaly detection via the Dirichlet process N Heard, P Rubin-Delanchy 2016 IEEE Conference on Intelligence and Security Informatics (ISI), 220-224, 2016 | 34 | 2016 |
Filtering automated polling traffic in computer network flow data N Heard, P Rubin-Delanchy, DJ Lawson 2014 ieee joint intelligence and security informatics conference, 268-271, 2014 | 26 | 2014 |
Bayesian estimation of the latent dimension and communities in stochastic blockmodels FS Passino, NA Heard Statistics and Computing 30 (5), 1291-1307, 2020 | 21 | 2020 |
Meta-Analysis of Mid-p-Values: Some New Results based on the Convex Order P Rubin-Delanchy, NA Heard, DJ Lawson Journal of the American Statistical Association 114 (527), 1105-1112, 2019 | 21* | 2019 |
An introduction to Bayesian inference, methods and computation N Heard Springer, 2021 | 19 | 2021 |
Link prediction in dynamic networks using random dot product graphs F Sanna Passino, AS Bertiger, JC Neil, NA Heard Data Mining and Knowledge Discovery 35 (5), 2168-2199, 2021 | 17 | 2021 |
Modelling user behaviour in a network using computer event logs MJM Turcotte, NA Heard, AD Kent Dynamic Networks and Cyber-Security, 67-87, 2016 | 17 | 2016 |