These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
20 related articles for article (PubMed ID: 15828658)
1. Insight into Anomaly Detection and Prediction and Mobile Network Security Enhancement Leveraging K-Means Clustering on Call Detail Records. Aziz Z; Bestak R Sensors (Basel); 2024 Mar; 24(6):. PubMed ID: 38543979 [TBL] [Abstract][Full Text] [Related]
2. Time series big data: a survey on data stream frameworks, analysis and algorithms. Almeida A; Brás S; Sargento S; Pinto FC J Big Data; 2023; 10(1):83. PubMed ID: 37274443 [TBL] [Abstract][Full Text] [Related]
3. An Anomaly Detection Algorithm Based on Ensemble Learning for 5G Environment. Lei L; Kou L; Zhan X; Zhang J; Ren Y Sensors (Basel); 2022 Sep; 22(19):. PubMed ID: 36236536 [TBL] [Abstract][Full Text] [Related]
4. A Dynamic Intrusion Detection System Based on Multivariate Hotelling's T2 Statistics Approach for Network Environments. Sivasamy AA; Sundan B ScientificWorldJournal; 2015; 2015():850153. PubMed ID: 26357668 [TBL] [Abstract][Full Text] [Related]
5. Min-max hyperellipsoidal clustering for anomaly detection in network security. Sarasamma ST; Zhu QA IEEE Trans Syst Man Cybern B Cybern; 2006 Aug; 36(4):887-901. PubMed ID: 16903372 [TBL] [Abstract][Full Text] [Related]
6. Intrusion detection using rough set classification. Zhang LH; Zhang GH; Zhang J; Bai YC J Zhejiang Univ Sci; 2004 Sep; 5(9):1076-86. PubMed ID: 15323002 [TBL] [Abstract][Full Text] [Related]
7. Parallel spectral clustering in distributed systems. Chen WY; Song Y; Bai H; Lin CJ; Chang EY IEEE Trans Pattern Anal Mach Intell; 2011 Mar; 33(3):568-86. PubMed ID: 20421667 [TBL] [Abstract][Full Text] [Related]
8. Evolutionary optimization of a hierarchical object recognition model. Schneider G; Wersing H; Sendhoff B; Körner E IEEE Trans Syst Man Cybern B Cybern; 2005 Jun; 35(3):426-37. PubMed ID: 15971912 [TBL] [Abstract][Full Text] [Related]
9. Evolutionary neural networks for anomaly detection based on the behavior of a program. Han SJ; Cho SB IEEE Trans Syst Man Cybern B Cybern; 2006 Jun; 36(3):559-70. PubMed ID: 16761810 [TBL] [Abstract][Full Text] [Related]
10. A survey of artificial immune system based intrusion detection. Yang H; Li T; Hu X; Wang F; Zou Y ScientificWorldJournal; 2014; 2014():156790. PubMed ID: 24790549 [TBL] [Abstract][Full Text] [Related]
11. Hierarchical Kohonenen net for anomaly detection in network security. Sarasamma ST; Zhu QA; Huff J IEEE Trans Syst Man Cybern B Cybern; 2005 Apr; 35(2):302-12. PubMed ID: 15828658 [TBL] [Abstract][Full Text] [Related]