These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

20 related articles for article (PubMed ID: 15828658)

  • 1. Insight into Anomaly Detection and Prediction and Mobile Network Security Enhancement Leveraging K-Means Clustering on Call Detail Records.
    Aziz Z; Bestak R
    Sensors (Basel); 2024 Mar; 24(6):. PubMed ID: 38543979
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Time series big data: a survey on data stream frameworks, analysis and algorithms.
    Almeida A; Brás S; Sargento S; Pinto FC
    J Big Data; 2023; 10(1):83. PubMed ID: 37274443
    [TBL] [Abstract][Full Text] [Related]  

  • 3. An Anomaly Detection Algorithm Based on Ensemble Learning for 5G Environment.
    Lei L; Kou L; Zhan X; Zhang J; Ren Y
    Sensors (Basel); 2022 Sep; 22(19):. PubMed ID: 36236536
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A Dynamic Intrusion Detection System Based on Multivariate Hotelling's T2 Statistics Approach for Network Environments.
    Sivasamy AA; Sundan B
    ScientificWorldJournal; 2015; 2015():850153. PubMed ID: 26357668
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Min-max hyperellipsoidal clustering for anomaly detection in network security.
    Sarasamma ST; Zhu QA
    IEEE Trans Syst Man Cybern B Cybern; 2006 Aug; 36(4):887-901. PubMed ID: 16903372
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Intrusion detection using rough set classification.
    Zhang LH; Zhang GH; Zhang J; Bai YC
    J Zhejiang Univ Sci; 2004 Sep; 5(9):1076-86. PubMed ID: 15323002
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Parallel spectral clustering in distributed systems.
    Chen WY; Song Y; Bai H; Lin CJ; Chang EY
    IEEE Trans Pattern Anal Mach Intell; 2011 Mar; 33(3):568-86. PubMed ID: 20421667
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Evolutionary optimization of a hierarchical object recognition model.
    Schneider G; Wersing H; Sendhoff B; Körner E
    IEEE Trans Syst Man Cybern B Cybern; 2005 Jun; 35(3):426-37. PubMed ID: 15971912
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Evolutionary neural networks for anomaly detection based on the behavior of a program.
    Han SJ; Cho SB
    IEEE Trans Syst Man Cybern B Cybern; 2006 Jun; 36(3):559-70. PubMed ID: 16761810
    [TBL] [Abstract][Full Text] [Related]  

  • 10. A survey of artificial immune system based intrusion detection.
    Yang H; Li T; Hu X; Wang F; Zou Y
    ScientificWorldJournal; 2014; 2014():156790. PubMed ID: 24790549
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Hierarchical Kohonenen net for anomaly detection in network security.
    Sarasamma ST; Zhu QA; Huff J
    IEEE Trans Syst Man Cybern B Cybern; 2005 Apr; 35(2):302-12. PubMed ID: 15828658
    [TBL] [Abstract][Full Text] [Related]  

  • 12.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

  • 13.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

  • 14.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

  • 15.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

  • 16.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

  • 17.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

  • 18.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

  • 19.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

  • 20.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 1.