Hidden Markov Models (HMMs) and Security Applications

被引:0
作者
Alghamdi, Rubayyi [1 ]
机构
[1] Concordia Univ, CIISE, Informat Syst Secur, Al Baha Univ, Montreal, PQ, Canada
关键词
Markov model; Hidden Markov model; HMM; Markove model; Forward algorithm; Viterbi Algorithm; Baum-Welch algorithm;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Hidden Markov models (HMMs) are statistical models used in various communities and applications. Such applications include speech recognition, mental task classification, biological analysis, and anomaly detection. In hidden Markov models, there are two states: one is a hidden state and the other is an observation state. The purpose of this survey paper is to further the understanding of hidden Markov models, as well as the solutions to the three central problems: evaluation problem, decoding problem and learning problem. In addition, applying HMMs in real world applications such as security and engineering will improve the classification and accuracy for the whole field.
引用
收藏
页码:39 / 47
页数:9
相关论文
共 11 条
  • [1] Agrawal A, 2015, 2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), P5
  • [2] Alpaydin E., 2010, INTRO MACHINE LEARNI, P363
  • [3] Duda Richard O., 2010, PATTERN CLASSIFICATI, P40
  • [4] Esmael B, 2012, 2012 12TH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS (HIS), P502, DOI 10.1109/HIS.2012.6421385
  • [5] Fink GA, 2014, ADV COMPUT VIS PATT, P35, DOI 10.1007/978-1-4471-6308-4_3
  • [6] Iyer D., 2011, 2011 WORLD C INFORM, P1062
  • [7] A Finite State Hidden Markov Model for Predicting Multistage Attacks in Cloud Systems
    Kholidy, Hisham A.
    Erradi, Abdelkarim
    Abdelwahed, Sherif
    Azab, Abdulrahman
    [J]. 2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 14 - +
  • [8] A TUTORIAL ON HIDDEN MARKOV-MODELS AND SELECTED APPLICATIONS IN SPEECH RECOGNITION
    RABINER, LR
    [J]. PROCEEDINGS OF THE IEEE, 1989, 77 (02) : 257 - 286
  • [9] Schuster-Bockler Benjamin, 2007, Curr Protoc Bioinformatics, VAppendix 3, p3A, DOI 10.1002/0471250953.bia03as18
  • [10] Sultana A., 2012, IEEE International Conference on Communications (ICC 2012), P1113, DOI 10.1109/ICC.2012.6364527