Related references
Note: Only part of the references are listed.Designing UAV Surveillance Frameworks for Smart City and Extensive Ocean with Differential Perspectives
Hyunbum Kim et al.
IEEE COMMUNICATIONS MAGAZINE (2018)
A new network intrusion detection algorithm: DA-ROS-ELM
Yi Yu et al.
IEEJ TRANSACTIONS ON ELECTRICAL AND ELECTRONIC ENGINEERING (2018)
Effectiveness of HT-assisted sinkhole and blackhole denial of service attacks targeting mesh networks-on-chip
Li Zhang et al.
JOURNAL OF SYSTEMS ARCHITECTURE (2018)
A Novel Intrusion Detection Model for a Massive Network Using Convolutional Neural Networks
Kehe Wu et al.
IEEE ACCESS (2018)
A Collision-Free Surveillance System Using Smart UAVs in Multi Domain IoT
Hyunbum Kim et al.
IEEE COMMUNICATIONS LETTERS (2018)
A study on intrusion detection using neural networks trained with evolutionary algorithms
Tirtharaj Dash
SOFT COMPUTING (2017)
WannaCry, Cybersecurity and Health Information Technology: A Time to Act
Jesse M. Ehrenfeld
JOURNAL OF MEDICAL SYSTEMS (2017)
The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set
Nour Moustafa et al.
INFORMATION SECURITY JOURNAL (2016)
Adaptive PCA based fault diagnosis scheme in imperial smelting process
Zhikun Hu et al.
ISA TRANSACTIONS (2014)
Effective approach toward Intrusion Detection System using data mining techniques
G. V. Nadiammai et al.
EGYPTIAN INFORMATICS JOURNAL (2014)
PCA-ELM: A Robust and Pruned Extreme Learning Machine Approach Based on Principal Component Analysis
A. Castano et al.
NEURAL PROCESSING LETTERS (2013)
Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid
Kyung Choi et al.
ENERGIES (2012)
OP-ELM: Optimally Pruned Extreme Learning Machine
Yoan Miche et al.
IEEE TRANSACTIONS ON NEURAL NETWORKS (2010)
Error Minimized Extreme Learning Machine With Growth of Hidden Nodes and Incremental Learning
Guorui Feng et al.
IEEE TRANSACTIONS ON NEURAL NETWORKS (2009)
A hybrid artificial immune system and Self Organising Map for network intrusion detection
Simon T. Powers et al.
INFORMATION SCIENCES (2008)
Incremental extreme learning machine with fully complex hidden nodes
Guang-Bin Huang et al.
NEUROCOMPUTING (2008)
Extreme learning machine: Theory and applications
Guang-Bin Huang et al.
NEUROCOMPUTING (2006)
Universal approximation using incremental constructive feedforward networks with random hidden nodes
Guang-Bin Huang et al.
IEEE TRANSACTIONS ON NEURAL NETWORKS (2006)
A clustering-based method for unsupervised intrusion detections
SY Jiang et al.
PATTERN RECOGNITION LETTERS (2006)