{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T17:08:12Z","timestamp":1776186492093,"version":"3.50.1"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2020,1,10]],"date-time":"2020-01-10T00:00:00Z","timestamp":1578614400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,10]],"date-time":"2020-01-10T00:00:00Z","timestamp":1578614400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672338"],"award-info":[{"award-number":["61672338"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61873160"],"award-info":[{"award-number":["61873160"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s00500-020-04678-1","type":"journal-article","created":{"date-parts":[[2020,1,10]],"date-time":"2020-01-10T15:17:40Z","timestamp":1578669460000},"page":"12361-12374","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":85,"title":["Wireless sensor network intrusion detection system based on MK-ELM"],"prefix":"10.1007","volume":"24","author":[{"given":"Wenjie","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Dezhi","family":"Han","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1381-4364","authenticated-orcid":false,"given":"Kuan-Ching","family":"Li","sequence":"additional","affiliation":[]},{"given":"Francisco Isidro","family":"Massetto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,10]]},"reference":[{"issue":"2","key":"4678_CR1","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1109\/TCOMM.2012.031912.110179","volume":"9","author":"F Bao","year":"2012","unstructured":"Bao F, Chen R, Chang MJ et al (2012) Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans Netw Serv Manag 9(2):169\u2013183","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"4678_CR2","first-page":"120","volume":"23","author":"GM Borkar","year":"2019","unstructured":"Borkar GM, Patil LH, Dalgade D et al (2019) A novel clustering approach and adaptive SVM classifier for intrusion detection in WSN: a data mining concept. Sustain Comput Inform Syst 23:120\u2013135","journal-title":"Sustain Comput Inform Syst"},{"issue":"1","key":"4678_CR3","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1109\/SURV.2013.050113.00191","volume":"16","author":"I Butun","year":"2014","unstructured":"Butun I, Morgera SD, Sankar R (2014) A survey of intrusion detection systems in wireless sensor networks. IEEE Commun Surv Tutor 16(1):266\u2013282","journal-title":"IEEE Commun Surv Tutor"},{"key":"4678_CR4","first-page":"3564","volume":"14","author":"LL Cao","year":"2014","unstructured":"Cao LL, Huang WB, Sun FC (2014) Optimization-based extreme learning machine with multi-kernel learning approach for classification. IEEE Comput Soc 14:3564\u20133569","journal-title":"IEEE Comput Soc"},{"key":"4678_CR5","doi-asserted-by":"crossref","unstructured":"Cheng C, Tay WP, Huang GB (2012) Extreme learning machines for intrusion detection. In: the 2012 international joint conference on neural networks (IJCNN). IEEE, pp 1\u20138","DOI":"10.1109\/IJCNN.2012.6252449"},{"key":"4678_CR6","doi-asserted-by":"publisher","first-page":"1113","DOI":"10.1016\/j.procs.2018.04.222","volume":"131","author":"JJ Dai","year":"2018","unstructured":"Dai JJ, Tao Y, Yang FY (2018) A novel intrusion detection system based on IABRBFSVM for wireless sensor networks. Procedia Comput Sci 131:1113\u20131121","journal-title":"Procedia Comput Sci"},{"issue":"3","key":"4678_CR7","doi-asserted-by":"publisher","first-page":"780","DOI":"10.1109\/TNN.2002.1000150","volume":"13","author":"M Girolami","year":"2002","unstructured":"Girolami M (2002) Mercer kernel-based clustering in feature space. IEEE Trans Neural Netw 13(3):780\u2013784","journal-title":"IEEE Trans Neural Netw"},{"key":"4678_CR8","first-page":"009","volume":"9","author":"Z Han","year":"2010","unstructured":"Han Z, Zhang W, Chen Z (2010) A Markov-based intrusion detection scheme for wireless sensor networks. Comput Eng Sci 9:009","journal-title":"Comput Eng Sci"},{"issue":"16","key":"4678_CR9","doi-asserted-by":"publisher","first-page":"3056","DOI":"10.1016\/j.neucom.2007.02.009","volume":"70","author":"GB Huang","year":"2007","unstructured":"Huang GB, Chen L (2007) Convex incremental extreme learning machine. Neurocomputing 70(16):3056\u20133062","journal-title":"Neurocomputing"},{"issue":"16","key":"4678_CR10","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1016\/j.neucom.2005.12.126","volume":"70","author":"GB Huang","year":"2006","unstructured":"Huang GB, Zhu QY, Siew CK (2006) Extreme learning machine: theory and applications. Neurocomputing 70(16):489\u2013501","journal-title":"Neurocomputing"},{"key":"4678_CR11","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.neunet.2014.10.001","volume":"61","author":"G Huang","year":"2015","unstructured":"Huang G, Huang GB, Song S et al (2015) Trends in extreme learning machines: a machines: a review. Neural Netw 61:32\u201348","journal-title":"Neural Netw"},{"issue":"5","key":"4678_CR12","first-page":"576","volume":"35","author":"SH Huang","year":"2017","unstructured":"Huang SH, Chen WZ, Li J (2017) Network intrusion detection based on extreme learning machine and principal component analysis. J Jilin Univ (Inf Sci Ed) 35(5):576\u2013583","journal-title":"J Jilin Univ (Inf Sci Ed)"},{"key":"4678_CR13","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2946791","author":"W Liang","year":"2019","unstructured":"Liang W, Li K-C et al (2019a) An industrial network intrusion detection algorithm based on multi-feature data clustering optimization model. IEEE Trans Ind Inform. https:\/\/doi.org\/10.1109\/TII.2019.2946791","journal-title":"IEEE Trans Ind Inform"},{"issue":"6","key":"4678_CR14","doi-asserted-by":"publisher","first-page":"3582","DOI":"10.1109\/TII.2019.2907092","volume":"15","author":"W Liang","year":"2019","unstructured":"Liang W, Tang M, Long J, Peng X, Xu J, Li K-C (2019b) A secure fabric blockchain-based data transmission technique for industrial internet-of-things. IEEE Trans Ind Inform 15(6):3582\u20133592","journal-title":"IEEE Trans Ind Inform"},{"key":"4678_CR15","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1016\/j.procs.2015.05.108","volume":"52","author":"Y Maleh","year":"2015","unstructured":"Maleh Y, Ezzati A, Qasmaoui Y et al (2015) A global hybrid intrusion detection system for wireless sensor networks. Procedia Comput Sci 52:1047\u20131052","journal-title":"Procedia Comput Sci"},{"key":"4678_CR17","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.compeleceng.2017.08.010","volume":"64","author":"TP Rani","year":"2017","unstructured":"Rani TP, Jayakumar C (2017) Unique identity and localization based replica node detection in hierarchical wireless sensor networks. Comput Electr Eng 64:148\u2013162","journal-title":"Comput Electr Eng"},{"issue":"1","key":"4678_CR18","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/TETCI.2017.2772792","volume":"2","author":"N Shone","year":"2018","unstructured":"Shone N, Ngoc TN, Phai VD et al (2018) A deep learning approach to network intrusion detection. IEEE Trans Emerg Top Comput Intell 2(1):41\u201350","journal-title":"IEEE Trans Emerg Top Comput Intell"},{"key":"4678_CR19","unstructured":"Silva AAPD, Martins MH, Rocha BP et al (2005) Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the 1st ACM international workshop on quality of service & security in wireless and mobile networks, pp 16\u201323"},{"issue":"4","key":"4678_CR20","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1109\/TNNLS.2015.2424995","volume":"27","author":"J Tang","year":"2016","unstructured":"Tang J, Deng C, Huang GB (2016) Extreme learning machine for multilayer perceptron. IEEE Trans Neural Netw Learn Syst 27(4):809\u2013821","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"4678_CR21","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/j.knosys.2018.02.015","volume":"147","author":"CR Wang","year":"2018","unstructured":"Wang CR, Xu RF, Lee SJ et al (2018) Network intrusion detection using equality constrained-optimization-based extreme learning machines. Knowl Based Syst 147:68\u201380","journal-title":"Knowl Based Syst"},{"issue":"2","key":"4678_CR22","doi-asserted-by":"publisher","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","volume":"5","author":"C Yin","year":"2017","unstructured":"Yin C, Zhu Y, Fei J et al (2017) A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access 5(2):21954\u201321961","journal-title":"IEEE Access"},{"issue":"3","key":"4678_CR23","first-page":"1954","volume":"12","author":"Z Zhang","year":"2014","unstructured":"Zhang Z (2014) Efficient computer intrusion detection method based on artificial bee colony optimized kernel extreme learning machine. Indones J Electr Eng Comput Sci 12(3):1954\u20131959","journal-title":"Indones J Electr Eng Comput Sci"},{"key":"4678_CR24","first-page":"641","volume":"48","author":"YT Zhang","year":"2014","unstructured":"Zhang YT, Ma C, Li ZN et al (2014) Online modeling of kernel extreme learning machine based on fast leave-one-out cross-validation. Shanghai Jiaotong Univ (Sci) 48:641\u2013646","journal-title":"Shanghai Jiaotong Univ (Sci)"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-020-04678-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-020-04678-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-020-04678-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T03:55:16Z","timestamp":1610164516000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-020-04678-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,10]]},"references-count":23,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["4678"],"URL":"https:\/\/doi.org\/10.1007\/s00500-020-04678-1","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,10]]},"assertion":[{"value":"10 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"All the authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}