{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T04:11:21Z","timestamp":1746159081350,"version":"3.40.3"},"publisher-location":"Cham","reference-count":65,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030681098"},{"type":"electronic","value":"9783030681104"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-68110-4_5","type":"book-chapter","created":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T12:40:53Z","timestamp":1611837653000},"page":"79-91","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Random Neural Network for Lightweight Attack Detection in the IoT"],"prefix":"10.1007","author":[{"given":"Katarzyna","family":"Filus","sequence":"first","affiliation":[]},{"given":"Joanna","family":"Doma\u0144ska","sequence":"additional","affiliation":[]},{"given":"Erol","family":"Gelenbe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,29]]},"reference":[{"issue":"1\u20132","key":"5_CR1","first-page":"63","volume":"13","author":"H Abdelbaki","year":"2005","unstructured":"Abdelbaki, H., Gelenbe, E., Kocak, T.: Neural algorithms and energy measures for EMI based mine detection. J. Differ. Eqn. Dyn. Syst. 13(1\u20132), 63\u201386 (2005)","journal-title":"J. Differ. Eqn. Dyn. Syst."},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Adeel, A., Larijani, H., Ahmadinia, A.: Random neural network based cognitive engines for adaptive modulation and coding in LTE downlink systems. Comput. Electr. Eng. 57, 336\u2013350 (2017). https:\/\/doi.org\/10.1016\/j.compeleceng.2016.11.005","DOI":"10.1016\/j.compeleceng.2016.11.005"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Ahmad, J., Larijani, H., Emmanuel, R., Mannion, M., Javed, A., Phillipson, M.: Energy demand prediction through novel random neural network predictor for large non-domestic buildings. In: 2017 Annual IEEE International Systems Conference, SysCon 2017, Montreal, QC, Canada, 24\u201327 April 2017, pp. 1\u20136. IEEE (2017). https:\/\/doi.org\/10.1109\/SYSCON.2017.7934803","DOI":"10.1109\/SYSCON.2017.7934803"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Ahmad, J., et al.: Energy demand forecasting of buildings using random neural networks. J. Intell. Fuzzy Syst. 38(4), 4753\u20134765 (2020). https:\/\/doi.org\/10.3233\/JIFS-191458","DOI":"10.3233\/JIFS-191458"},{"key":"5_CR5","doi-asserted-by":"publisher","first-page":"101646","DOI":"10.1016\/j.cose.2019.101646","volume":"88","author":"A Aldribi","year":"2020","unstructured":"Aldribi, A., Traor\u00e9, I., Moa, B., Nwamuo, O.: Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking. Comput. Secur. 88, 101646 (2020)","journal-title":"Comput. Secur."},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Atalay, V., Gelenbe, E.: Parallel algorithm for colour texture generation using the random neural network model, pp. 227\u2013236. World Scientific Publishing Co., Inc, USA (1992)","DOI":"10.1142\/9789812797872_0015"},{"issue":"1","key":"5_CR7","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1142\/S0218001492000072","volume":"6","author":"V Atalay","year":"1992","unstructured":"Atalay, V., Gelenbe, E., Yalabik, N.: The random neural network model for texture generation. Int. J. Pattern Recogn. Artif. Intell. 6(1), 131\u2013141 (1992)","journal-title":"Int. J. Pattern Recogn. Artif. Intell."},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Basterrech, S., Mohamed, S., Rubino, G., Soliman, M.A.: Levenberg-marquardt training algorithms for random neural networks. Comput. J. 54(1), 125\u2013135 (2011). https:\/\/doi.org\/10.1093\/comjnl\/bxp101","DOI":"10.1093\/comjnl\/bxp101"},{"key":"5_CR9","unstructured":"Bezerra, V.H., da Costa, V.G.T., Martins, R.A., Junior, S.B., Miani, R.S., Zarpelao, B.B.: Providing IoT host-based datasets for intrusion detection research. In: Anais do XVIII Simp\u00f3sio Brasileiro em Seguran\u00e7a da Informa\u00e7\u00e3o e de Sistemas Computacionais, pp. 15\u201328 (2018)"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Brandon, A., Seekins, M., Joshua, B.V., Samuel, C., Haller, J.: Network data analysis to support risk management in an IoT environment. In: 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), pp. 0063\u20130068 (2019)","DOI":"10.1109\/UEMCON47517.2019.8993030"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Brun, O., Yin, Y., Gelenbe, E.: Deep learning with dense random neural network for detecting attacks against iot-connected home environments. Proc. Comput. Sci. 134, 458\u2013463 (2018). https:\/\/doi.org\/10.1016\/j.procs.2018.07.183","DOI":"10.1016\/j.procs.2018.07.183"},{"key":"5_CR12","unstructured":"Cisco 2018 annual cybersecurity report (Cisco 2018). https:\/\/www.cisco.com\/c\/dam\/en_us\/about\/annual-report\/2018-annual-report-full.pdf. Accessed 26 Jul 2020"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Cort\u00e9s, F.M., G\u00f3mez, N.G.: A hybrid alarm management strategy in signature-based intrusion detection systems. In: 2019 IEEE Colombian Conference on Communications and Computing (COLCOM), pp. 1\u20136 (2019)","DOI":"10.1109\/ColComCon.2019.8809121"},{"issue":"2","key":"5_CR14","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1109\/49.824788","volume":"18","author":"CE Cramer","year":"2000","unstructured":"Cramer, C.E., Gelenbe, E.: Video quality and traffic QoS in learning-based subsampled and receiver-interpolated video sequences. IEEE J. Sel. Areas Commun. 18(2), 150\u2013167 (2000)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"4","key":"5_CR15","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/BF02551274","volume":"2","author":"G Cybenko","year":"1989","unstructured":"Cybenko, G.: Approximations by superpositions of sigmoidal functions. Math. Control Signals Syst. 2(4), 303\u2013314 (1989)","journal-title":"Math. Control Signals Syst."},{"key":"5_CR16","unstructured":"DARPA intrusion detection evaluation data set. MIT Lincoln Laboratory (1998). https:\/\/www.ll.mit.edu\/r-d\/datasets\/1998-darpa-intrusion-detection-evaluation-dataset. Accessed 26 Jul 2020"},{"key":"5_CR17","unstructured":"DARPA Intrusion Detection Evaluation Data Set. MIT Lincoln Laboratory (1999). https:\/\/www.ll.mit.edu\/r-d\/datasets\/1999-darpa-intrusion-detection-evaluation-dataset. Accessed 26 Jul 2020"},{"issue":"2","key":"5_CR18","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1145\/1186778.1186782","volume":"1","author":"S Dobson","year":"2006","unstructured":"Dobson, S., et al.: A survey of autonomic communications. ACM Trans. Autonom. Adap. Syst. (TAAS) 1(2), 223\u2013259 (2006)","journal-title":"ACM Trans. Autonom. Adap. Syst. (TAAS)"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Evmorfos, S., Vlachodimitropoulos, G., Bakalos, N., Gelenbe, E.: Neural network architectures for the detection of SYN flood attacks in IoT systems. In: Proceedings of the 13th ACM International Conference on PErvasive Technologies Related to Assistive Environments. PETRA 2020, New York, NY, USA, Association for Computing Machinery (2020). https:\/\/doi.org\/10.1145\/3389189.3398000","DOI":"10.1145\/3389189.3398000"},{"key":"5_CR20","doi-asserted-by":"publisher","first-page":"1285","DOI":"10.1109\/TEM.2019.2922936","volume":"67","author":"MA Ferrag","year":"2019","unstructured":"Ferrag, M.A., Maglaras, L.: Deepcoin: a novel deep learning and blockchain-based energy exchange framework for smart grids. IEEE Trans. Eng. Manage. 67, 1285\u20131297 (2019)","journal-title":"IEEE Trans. Eng. Manage."},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Galeano-Brajones, J., Cort\u00e9s-Polo, D., Valenzuela-Vald\u00e9s, J.F., Mora, A.M., Carmona-Murillo, J.: Detection and mitigation of DoS attacks in SDN. an experimental approach. In: 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS), pp. 575\u2013580. IEEE (2019)","DOI":"10.1109\/IOTSMS48152.2019.8939208"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Ge, M., Fu, X., Syed, N., Baig, Z., Teo, G., Robles-Kelly, A.: Deep learning-based intrusion detection for IoT networks. In: 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC), pp. 256\u201325609 (2019)","DOI":"10.1109\/PRDC47002.2019.00056"},{"issue":"4","key":"5_CR23","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1162\/neco.1989.1.4.502","volume":"1","author":"E Gelenbe","year":"1989","unstructured":"Gelenbe, E.: Random neural networks with negative and positive signals and product form solution. Neural Comput. 1(4), 502\u2013510 (1989)","journal-title":"Neural Comput."},{"key":"5_CR24","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1162\/neco.1993.5.1.154","volume":"5","author":"E Gelenbe","year":"1993","unstructured":"Gelenbe, E.: Learning in the recurrent random neural network. Neural Comput. 5, 154\u2013164 (1993)","journal-title":"Neural Comput."},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Batty, F.: Minimum graph vertex covering with the random neural network. In: Computer Science and Operations Research, pp. 139\u2013147. Pergamon, Amsterdam (1992)","DOI":"10.1016\/B978-0-08-040806-4.50015-0"},{"issue":"7","key":"5_CR26","doi-asserted-by":"publisher","first-page":"1150","DOI":"10.1109\/JPROC.2020.2992559","volume":"108","author":"E Gelenbe","year":"2020","unstructured":"Gelenbe, E., Doma\u0144ska, J., Fr\u00f6hlich, P., Nowak, M.P., Nowak, S.: Self-aware networks that optimize security, QoS, and energy. Proc. IEEE 108(7), 1150\u20131167 (2020)","journal-title":"Proc. IEEE"},{"issue":"10","key":"5_CR27","doi-asserted-by":"publisher","first-page":"1488","DOI":"10.1109\/5.537113","volume":"84","author":"E Gelenbe","year":"1996","unstructured":"Gelenbe, E., Feng, Y., Krishnan, K.R.R.: Neural network methods for volumetric magnetic resonance imaging of the human brain. Proc. IEEE 84(10), 1488\u20131496 (1996)","journal-title":"Proc. IEEE"},{"issue":"3","key":"5_CR28","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.jss.2004.01.016","volume":"74","author":"E Gelenbe","year":"2005","unstructured":"Gelenbe, E., Hussain, K.F., Kaptan, V.: Simulating autonomous agents in augmented reality. J. Syst. and Softw. 74(3), 255\u2013268 (2005)","journal-title":"J. Syst. and Softw."},{"key":"5_CR29","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1109\/ICSMC.1993.384945","volume":"2","author":"E Gelenbe","year":"1993","unstructured":"Gelenbe, E., Koubi, V., Pekergin, F.: Dynamical random neural network approach to the traveling salesman problem. Proceedings of IEEE Systems Man and Cybernetics Conference 2, 630\u2013635 (1993)","journal-title":"Proceedings of IEEE Systems Man and Cybernetics Conference"},{"issue":"1","key":"5_CR30","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/72.737488","volume":"10","author":"E Gelenbe","year":"1999","unstructured":"Gelenbe, E., Mao, Z.H., Li, Y.: Function approximation with spiked random networks. IEEE Trans. Neural Netw. 10(1), 3\u20139 (1999)","journal-title":"IEEE Trans. Neural Netw."},{"issue":"1\u20132","key":"5_CR31","first-page":"143","volume":"12","author":"E Gelenbe","year":"2004","unstructured":"Gelenbe, E., Mao, Z.H., Li, Y.: Function approximation by random neural networks with a bounded number of layers. J. Differ. Eqn. Dyn. Syst. 12(1\u20132), 143\u2013170 (2004)","journal-title":"J. Differ. Eqn. Dyn. Syst."},{"issue":"7","key":"5_CR32","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/1538788.1538809","volume":"52","author":"E Gelenbe","year":"2009","unstructured":"Gelenbe, E.: Steps toward self-aware networks. Commun. ACM 52(7), 66\u201375 (2009)","journal-title":"Commun. ACM"},{"issue":"6","key":"5_CR33","doi-asserted-by":"publisher","first-page":"1257","DOI":"10.1109\/TNN.2002.804228","volume":"13","author":"E Gelenbe","year":"2002","unstructured":"Gelenbe, E., Hussain, K.F.: Learning in the multiple class random neural network. IEEE Trans. Neural Netw. 13(6), 1257\u20131267 (2002)","journal-title":"IEEE Trans. Neural Netw."},{"key":"5_CR34","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Kadioglu, Y.M.: Energy life-time of wireless nodes with network attacks and mitigation. In: 2018 IEEE International Conference on Communications Workshops, ICC Workshops 2018, Kansas City, MO, USA, 20\u201324 May 2018, pp. 1\u20136. IEEE (2018). https:\/\/doi.org\/10.1109\/ICCW.2018.8403561","DOI":"10.1109\/ICCW.2018.8403561"},{"key":"5_CR35","doi-asserted-by":"crossref","unstructured":"Gelenbe, E., Kocak, T.: Area-based results for mine detection. IEEE Trans. Geosci. Remote Sens. 38(1), 12\u201324 (2000)","DOI":"10.1109\/36.823897"},{"key":"5_CR36","doi-asserted-by":"crossref","unstructured":"Ghalut, T., Larijani, H.: Non-intrusive method for video quality prediction over LTE using random neural networks (RNN). In: 9th International Symposium on Communication Systems, Networks & Digital Signal Processing, CSNDSP 2014, Manchester, UK, 23\u201325 July 2014, pp. 519\u2013524. IEEE (2014). https:\/\/doi.org\/10.1109\/CSNDSP.2014.6923884","DOI":"10.1109\/CSNDSP.2014.6923884"},{"key":"5_CR37","doi-asserted-by":"crossref","unstructured":"Ghalut, T., Larijani, H.: Content-aware and QOE optimization of video stream scheduling over LTE networks using genetic algorithms and random neural networks. J. Ubiquitous Syst. Pervasive Netw. 9(2), 21\u201333 (2018). https:\/\/doi.org\/10.5383\/JUSPN.09.02.003","DOI":"10.5383\/JUSPN.09.02.003"},{"key":"5_CR38","doi-asserted-by":"crossref","unstructured":"Guerra-Manzanares, A., Medina-Galindo, J., Bahsi, H., N\u00f5mm, S.: MedBIoT: generation of an IoT botnet dataset in a medium-sized IoT network. In: 6th International Conference on Information Systems Security and Privacy, pp. 207\u2013218 (2020)","DOI":"10.5220\/0009187802070218"},{"issue":"6","key":"5_CR39","doi-asserted-by":"publisher","first-page":"1218","DOI":"10.1109\/JSAC.2020.2986618","volume":"38","author":"N Guizani","year":"2020","unstructured":"Guizani, N., Ghafoor, A.: A network function virtualization system for detecting malware in large IoT based networks. IEEE J. Sel. Areas Commun. 38(6), 1218\u20131228 (2020)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"5_CR40","doi-asserted-by":"crossref","unstructured":"Hamdi, M., Abie, H.: Game-based adaptive security in the Internet of Things for ehealth. In: 2014 IEEE International Conference on Communications (ICC), pp. 920\u2013925 (2014)","DOI":"10.1109\/ICC.2014.6883437"},{"key":"5_CR41","doi-asserted-by":"crossref","unstructured":"Hanif, S., Ilyas, T., Zeeshan, M.: Intrusion detection in IoT using artificial neural networks on UNSW-15 dataset. In: 2019 IEEE 16th International Conference on Smart Cities: Improving Quality of Life Using ICT & IoT and AI (HONET-ICT), pp. 152\u2013156 (2019)","DOI":"10.1109\/HONET.2019.8908122"},{"key":"5_CR42","unstructured":"Hettich, S., Bay, S.: The UCI KDD Archive. Irvine, CA: University of California, Department of Information and Computer Science (1999). http:\/\/kdd.ics.uci.edu. Accessed 26 Jul 2020"},{"key":"5_CR43","unstructured":"Hindy, H., et al.: A taxonomy and survey of intrusion detection system design techniques, network threats and datasets. arXiv preprint arXiv:1806.03517 (2018)"},{"issue":"2","key":"5_CR44","first-page":"89","volume":"38","author":"KF Hussain","year":"2004","unstructured":"Hussain, K.F., Kaptan, V.: Modeling and simulation with augmented reality. Int. J. Oper. Res. 38(2), 89\u2013103 (2004)","journal-title":"Int. J. Oper. Res."},{"key":"5_CR45","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1017\/S0269964816000073","volume":"30","author":"KF Hussain","year":"2016","unstructured":"Hussain, K.F., Moussa, G.S.: On road vehicle classification based on random neural network and bag of visual words. Probabil. Eng. Inform. Sci. 30, 403\u2013412 (2016)","journal-title":"Probabil. Eng. Inform. Sci."},{"issue":"2","key":"5_CR46","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1109\/TITS.2012.2226239","volume":"14","author":"KF Hussain","year":"2013","unstructured":"Hussain, K.F., Radwan, E., Moussa, G.S.: Augmented reality experiment: Drivers\u2019 behavior at an unsignalized intersection. IEEE Trans. Intell. Transp. Syst. 14(2), 608\u2013617 (2013)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"5_CR47","doi-asserted-by":"crossref","unstructured":"Javed, A., Larijani, H., Ahmadinia, A., Emmanuel, R., Mannion, M., Gibson, D.: Design and implementation of a cloud enabled random neural network-based decentralized smart controller with intelligent sensor nodes for HVAC. IEEE Internet Things J. 4(2), 393\u2013403 (2017). https:\/\/doi.org\/10.1109\/JIOT.2016.2627403","DOI":"10.1109\/JIOT.2016.2627403"},{"key":"5_CR48","doi-asserted-by":"crossref","unstructured":"Javed, A., Larijani, H., Ahmadinia, A., Gibson, D.: Smart random neural network controller for HVAC using cloud computing technology. IEEE Trans. Ind. Inform. 13(1), 351\u2013360 (2017). https:\/\/doi.org\/10.1109\/TII.2016.2597746","DOI":"10.1109\/TII.2016.2597746"},{"key":"5_CR49","doi-asserted-by":"crossref","unstructured":"Jeatrakul, P., Wong, K.W.: Comparing the performance of different neural networks for binary classification problems. In: 2009 Eighth International Symposium on Natural Language Processing, pp. 111\u2013115 (2009)","DOI":"10.1109\/SNLP.2009.5340935"},{"key":"5_CR50","unstructured":"Kang, H., Ahn, D.H., Lee, G.M., Yoo, J.D., Park, K.H., Kim, H.K.: IoT network intrusion dataset (2019). http:\/\/dx.doi.org\/10.21227\/q70p-q449"},{"key":"5_CR51","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","volume":"100","author":"N Koroniotis","year":"2019","unstructured":"Koroniotis, N., Moustafa, N., Sitnikova, E., Turnbull, B.: Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset. Future Generation Comput. Syst. 100, 779\u2013796 (2019)","journal-title":"Future Generation Comput. Syst."},{"key":"5_CR52","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1016\/j.future.2019.02.064","volume":"96","author":"W Li","year":"2019","unstructured":"Li, W., Tug, S., Meng, W., Wang, Y.: Designing collaborative blockchained signature-based intrusion detection in IoT environments. Future Generation Comput. Syst. 96, 481\u2013489 (2019)","journal-title":"Future Generation Comput. Syst."},{"issue":"3","key":"5_CR53","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","volume":"17","author":"Y Meidan","year":"2018","unstructured":"Meidan, Y., et al.: N-baiot-network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput. 17(3), 12\u201322 (2018)","journal-title":"IEEE Pervasive Comput."},{"issue":"6","key":"5_CR54","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1093\/comjnl\/bxm066","volume":"50","author":"G Oeke","year":"2007","unstructured":"Oeke, G., Loukas, G.: A denial of service detector based on maximum likelihood detection and the random neural network. Comput. J. 50(6), 717\u2013727 (2007)","journal-title":"Comput. J."},{"key":"5_CR55","unstructured":"Ostinato Traffic Generator for Network Enzineers. https:\/\/ostinato.org\/. Accessed 08 Sept 2020"},{"key":"5_CR56","doi-asserted-by":"crossref","unstructured":"Qureshi, A., Larijani, H., Ahmad, J., Mtetwa, N.: A novel random neural network based approach for intrusion detection systems. In: 2018 10th Computer Science and Electronic Engineering Conference, CEEC 2018, University of Essex, Colchester, UK, 19\u201321 September 2018, pp. 50\u201355. IEEE (2018). https:\/\/doi.org\/10.1109\/CEEC.2018.8674228","DOI":"10.1109\/CEEC.2018.8674228"},{"key":"5_CR57","doi-asserted-by":"crossref","unstructured":"Radhakrishnan, K., Larijani, H.: Evaluating perceived voice quality on packet networks using different random neural network architectures. Perform. Eval. 68(4), 347\u2013360 (2011). https:\/\/doi.org\/10.1016\/j.peva.2011.01.001","DOI":"10.1016\/j.peva.2011.01.001"},{"key":"5_CR58","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/11840817_32","volume-title":"Artificial Neural Networks \u2013 ICANN 2006","author":"G Rubino","year":"2006","unstructured":"Rubino, G., Tirilly, P., Varela, M.: Evaluating Users\u2019 Satisfaction in Packet Networks Using Random Neural Networks. In: Kollias, S.D., Stafylopatis, A., Duch, W., Oja, E. (eds.) ICANN 2006. LNCS, vol. 4131, pp. 303\u2013312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11840817_32"},{"issue":"4","key":"5_CR59","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2990499","volume":"16","author":"A Saeed","year":"2016","unstructured":"Saeed, A., Ahmadinia, A., Javed, A., Larijani, H.: Intelligent intrusion detection in low-power IoTs. ACM Trans. Internet Technol. (TOIT) 16(4), 1\u201325 (2016)","journal-title":"ACM Trans. Internet Technol. (TOIT)"},{"issue":"16","key":"5_CR60","doi-asserted-by":"publisher","first-page":"2429","DOI":"10.1016\/j.neucom.2006.01.023","volume":"69","author":"T Shon","year":"2006","unstructured":"Shon, T., Kovah, X., Moon, J.: Applying genetic algorithm for classifying anomalous TCP\/IP packets. Neurocomputing 69(16), 2429\u20132433 (2006)","journal-title":"Neurocomputing"},{"issue":"3","key":"5_CR61","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1093\/comjnl\/bxp032","volume":"53","author":"S Timotheou","year":"2010","unstructured":"Timotheou, S.: The random neural network: a survey. Comput. J. 53(3), 251\u2013267 (2010)","journal-title":"Comput. J."},{"issue":"2","key":"5_CR62","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.neucom.2009.02.023","volume":"73","author":"S Timotheou","year":"2009","unstructured":"Timotheou, S.: A novel weight initialization method for the random neural network. Neurocomputing 73(2), 160\u2013168 (2009)","journal-title":"Neurocomputing"},{"issue":"7","key":"5_CR63","doi-asserted-by":"publisher","first-page":"918","DOI":"10.1016\/j.patrec.2008.01.008","volume":"29","author":"C Xiang","year":"2008","unstructured":"Xiang, C., Yong, P.C., Meng, L.S.: Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees. Pattern Recogn. Lett. 29(7), 918\u2013924 (2008)","journal-title":"Pattern Recogn. Lett."},{"key":"5_CR64","doi-asserted-by":"publisher","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","volume":"5","author":"C Yin","year":"2017","unstructured":"Yin, C., Zhu, Y., Fei, J., He, X.: A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5, 21954\u201321961 (2017)","journal-title":"IEEE Access"},{"key":"5_CR65","unstructured":"Yin, Y.: Deep learning with the random neural network and its applications. ArXiv abs\/1810.08653 (2018)"}],"container-title":["Lecture Notes in Computer Science","Modelling, Analysis, and Simulation of Computer and Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-68110-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,13]],"date-time":"2022-12-13T19:01:56Z","timestamp":1670958116000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-68110-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030681098","9783030681104"],"references-count":65,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-68110-4_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"29 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MASCOTS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Symposium on Modelling, Analysis, and Simulation of Computer and Telecommunication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nice","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mascots2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/mascots.iitis.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}