4.5 Article

Research on Network Intrusion Detection Based on Incremental Extreme Learning Machine and Adaptive Principal Component Analysis

Related references

Note: Only part of the references are listed.
Article Engineering, Electrical & Electronic

Designing UAV Surveillance Frameworks for Smart City and Extensive Ocean with Differential Perspectives

Hyunbum Kim et al.

IEEE COMMUNICATIONS MAGAZINE (2018)

Article Engineering, Electrical & Electronic

A new network intrusion detection algorithm: DA-ROS-ELM

Yi Yu et al.

IEEJ TRANSACTIONS ON ELECTRICAL AND ELECTRONIC ENGINEERING (2018)

Article Computer Science, Hardware & Architecture

Effectiveness of HT-assisted sinkhole and blackhole denial of service attacks targeting mesh networks-on-chip

Li Zhang et al.

JOURNAL OF SYSTEMS ARCHITECTURE (2018)

Article Computer Science, Information Systems

A Novel Intrusion Detection Model for a Massive Network Using Convolutional Neural Networks

Kehe Wu et al.

IEEE ACCESS (2018)

Article Telecommunications

A Collision-Free Surveillance System Using Smart UAVs in Multi Domain IoT

Hyunbum Kim et al.

IEEE COMMUNICATIONS LETTERS (2018)

Article Computer Science, Artificial Intelligence

A study on intrusion detection using neural networks trained with evolutionary algorithms

Tirtharaj Dash

SOFT COMPUTING (2017)

Editorial Material Health Care Sciences & Services

WannaCry, Cybersecurity and Health Information Technology: A Time to Act

Jesse M. Ehrenfeld

JOURNAL OF MEDICAL SYSTEMS (2017)

Article Automation & Control Systems

Adaptive PCA based fault diagnosis scheme in imperial smelting process

Zhikun Hu et al.

ISA TRANSACTIONS (2014)

Article Computer Science, Artificial Intelligence

Effective approach toward Intrusion Detection System using data mining techniques

G. V. Nadiammai et al.

EGYPTIAN INFORMATICS JOURNAL (2014)

Article Computer Science, Artificial Intelligence

PCA-ELM: A Robust and Pruned Extreme Learning Machine Approach Based on Principal Component Analysis

A. Castano et al.

NEURAL PROCESSING LETTERS (2013)

Article Computer Science, Artificial Intelligence

OP-ELM: Optimally Pruned Extreme Learning Machine

Yoan Miche et al.

IEEE TRANSACTIONS ON NEURAL NETWORKS (2010)

Article Computer Science, Artificial Intelligence

Error Minimized Extreme Learning Machine With Growth of Hidden Nodes and Incremental Learning

Guorui Feng et al.

IEEE TRANSACTIONS ON NEURAL NETWORKS (2009)

Article Computer Science, Information Systems

A hybrid artificial immune system and Self Organising Map for network intrusion detection

Simon T. Powers et al.

INFORMATION SCIENCES (2008)

Article Computer Science, Artificial Intelligence

Incremental extreme learning machine with fully complex hidden nodes

Guang-Bin Huang et al.

NEUROCOMPUTING (2008)

Article Computer Science, Artificial Intelligence

Extreme learning machine: Theory and applications

Guang-Bin Huang et al.

NEUROCOMPUTING (2006)

Article Computer Science, Artificial Intelligence

Universal approximation using incremental constructive feedforward networks with random hidden nodes

Guang-Bin Huang et al.

IEEE TRANSACTIONS ON NEURAL NETWORKS (2006)

Article Computer Science, Artificial Intelligence

A clustering-based method for unsupervised intrusion detections

SY Jiang et al.

PATTERN RECOGNITION LETTERS (2006)