Bayesian anomaly detection methods for social networks NA Heard, DJ Weston, K Platanioti, DJ Hand | 245 | 2010 |
A quantitative study of gene regulation involved in the immune response of anopheline mosquitoes: An application of Bayesian hierarchical clustering of curves NA Heard, CC Holmes, DA Stephens Journal of the American Statistical Association 101 (473), 18-29, 2006 | 241 | 2006 |
Choosing between methods of combining -values NA Heard, P Rubin-Delanchy Biometrika 105 (1), 239-246, 2018 | 159 | 2018 |
Bayesian cluster identification in single-molecule localization microscopy data P Rubin-Delanchy, GL Burn, J Griffié, DJ Williamson, NA Heard, AP Cope, ... Nature methods 12 (11), 1072-1076, 2015 | 134 | 2015 |
Generalized monotonic regression using random change points CC Holmes, NA Heard Statistics in Medicine 22 (4), 623-638, 2003 | 87 | 2003 |
Bayesian coclustering of Anopheles gene expression time series: study of immune defense response to multiple experimental challenges NA Heard, CC Holmes, DA Stephens, DJ Hand, G Dimopoulos Proceedings of the National Academy of Sciences 102 (47), 16939-16944, 2005 | 80 | 2005 |
Anomaly detection to identify coordinated group attacks in computer networks JC Neil, M Turcotte, NA Heard US Patent App. 14/383,024, 2015 | 78 | 2015 |
A Bayesian cluster analysis method for single-molecule localization microscopy data J Griffié, M Shannon, CL Bromley, L Boelen, GL Burn, DJ Williamson, ... Nature Protocols 11 (12), 2499-2514, 2016 | 51 | 2016 |
Finding groups in gene expression data DJ Hand, NA Heard Journal of Biomedicine and Biotechnology 2005 (2), 215, 2005 | 45 | 2005 |
Data analysis for network cyber-security NM Adams, NA Heard World Scientific, 2014 | 42 | 2014 |
Method and apparatus for determining one or more statistical estimators of customer behavior N Heard US Patent 7,092,920, 2006 | 41 | 2006 |
Poisson factorization for peer-based anomaly detection M Turcotte, J Moore, N Heard, A McPhall 2016 IEEE Conference on Intelligence and Security Informatics (ISI), 208-210, 2016 | 40 | 2016 |
Dynamic networks and cyber-security NM Adams, NA Heard World Scientific, 2016 | 35 | 2016 |
Network-wide anomaly detection via the Dirichlet process N Heard, P Rubin-Delanchy 2016 IEEE Conference on Intelligence and Security Informatics (ISI), 220-224, 2016 | 31 | 2016 |
Filtering automated polling traffic in computer network flow data N Heard, P Rubin-Delanchy, DJ Lawson 2014 IEEE Joint Intelligence and Security Informatics Conference, 268-271, 2014 | 25 | 2014 |
Bayesian estimation of the latent dimension and communities in stochastic blockmodels FS Passino, NA Heard Statistics and Computing 30 (5), 1291-1307, 2020 | 20 | 2020 |
Meta-analysis of mid-p-values: some new results based on the convex order P Rubin-Delanchy, NA Heard, DJ Lawson Journal of the American Statistical Association, 2018 | 20* | 2018 |
Link prediction in dynamic networks using random dot product graphs F Sanna Passino, AS Bertiger, JC Neil, NA Heard Data Mining and Knowledge Discovery 35 (5), 2168-2199, 2021 | 16 | 2021 |
Modelling user behaviour in a network using computer event logs MJM Turcotte, NA Heard, AD Kent Dynamic Networks and Cyber-Security, 67-87, 2016 | 16 | 2016 |
Dissecting the fission yeast regulatory network reveals phase-specific control elements of its cell cycle PR Bushel, NA Heard, R Gutman, L Liu, SD Peddada, S Pyne BMC systems biology 3, 1-21, 2009 | 15 | 2009 |