{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T10:43:24Z","timestamp":1761129804051,"version":"3.37.3"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2021,1,2]],"date-time":"2021-01-02T00:00:00Z","timestamp":1609545600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,2]],"date-time":"2021-01-02T00:00:00Z","timestamp":1609545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["SFRH\/BD\/99714\/2014","SFRH\/BD\/129600\/2017"],"award-info":[{"award-number":["SFRH\/BD\/99714\/2014","SFRH\/BD\/129600\/2017"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s00521-020-05627-7","type":"journal-article","created":{"date-parts":[[2021,1,2]],"date-time":"2021-01-02T08:02:53Z","timestamp":1609574573000},"page":"8777-8794","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Hidden Markov models on a self-organizing map for anomaly detection in 802.11 wireless networks"],"prefix":"10.1007","volume":"33","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0834-4049","authenticated-orcid":false,"given":"Anisa","family":"Allahdadi","sequence":"first","affiliation":[]},{"given":"Diogo","family":"Pernes","sequence":"additional","affiliation":[]},{"given":"Jaime S.","family":"Cardoso","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Morla","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,2]]},"reference":[{"issue":"12","key":"5627_CR1","doi-asserted-by":"publisher","first-page":"939","DOI":"10.1177\/0037549720958480","volume":"96","author":"A Allahdadi","year":"2020","unstructured":"Allahdadi A, Morla R, Cardoso JS (2020) 802.11 wireless simulation and anomaly detection using HMM and UBM. SIMULATION 96(12):939\u2013956","journal-title":"SIMULATION"},{"issue":"1","key":"5627_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10922-018-9455-2","volume":"27","author":"A Allahdadi","year":"2019","unstructured":"Allahdadi A, Morla R (2019) Anomaly detection and modeling in 802.11 wireless networks. J. Netw. Syst. Managem. 27(1):3\u201338","journal-title":"J. Netw. Syst. Managem."},{"key":"5627_CR3","doi-asserted-by":"crossref","unstructured":"Allahdadi A, Morla R, Cardoso JS (2014) Outlier detection in 802.11 wireless access points using hidden Markov models. In: Wireless and Mobile Networking Conference (WMNC), 2014 7th IFIP. IEEE, pp 1\u20138","DOI":"10.1109\/WMNC.2014.6878860"},{"key":"5627_CR4","doi-asserted-by":"crossref","unstructured":"Somervuo P (2000) Competing hidden Markov models on the self-organizing map. In: Proceedings of the IEEE-INNS\u2013ENNS international joint conference on neural networks, 2000. IJCNN 2000, vol\u00a03. IEEE, pp 169\u2013174","DOI":"10.1109\/IJCNN.2000.861299"},{"key":"5627_CR5","doi-asserted-by":"crossref","unstructured":"Kurimo M, Somervuo P (1996) Using the self-organizing map to speed up the probability density estimation for speech recognition with mixture density HMMs. In: Proceedings, fourth international conference on spoken language, 1996. ICSLP 96, vol\u00a01. IEEE, pp 358\u2013361","DOI":"10.1109\/ICSLP.1996.607128"},{"issue":"3","key":"5627_CR6","doi-asserted-by":"publisher","first-page":"158","DOI":"10.4236\/ojapps.2016.63017","volume":"6","author":"H Morimoto","year":"2016","unstructured":"Morimoto H (2016) Hidden Markov models and self-organizing maps applied to stroke incidence. Open J Appl Sci 6(3):158\u2013168","journal-title":"Open J Appl Sci"},{"key":"5627_CR7","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.neunet.2013.07.011","volume":"48","author":"C Ferles","year":"2013","unstructured":"Ferles C, Stafylopatis A (2013) Self-organizing hidden Markov model map (SOHMMM). Neural Netw 48:133\u2013147","journal-title":"Neural Netw"},{"issue":"6","key":"5627_CR8","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1080\/08839514.2013.805598","volume":"27","author":"C Ferles","year":"2013","unstructured":"Ferles C, Siolas G, Stafylopatis A (2013) Scaled self-organizing map-hidden Markov model architecture for biological sequence clustering. Appl Artif Intell 27(6):461\u2013495","journal-title":"Appl Artif Intell"},{"issue":"02","key":"5627_CR9","doi-asserted-by":"publisher","first-page":"1550007","DOI":"10.1142\/S1469026815500078","volume":"14","author":"M Lebbah","year":"2015","unstructured":"Lebbah M, Jaziri R, Bennani Y, Chenot JH (2015) Probabilistic self-organizing map for clustering and visualizing non-IID data. Int J Comput Intell Appl 14(02):1550007","journal-title":"Int J Comput Intell Appl"},{"issue":"2","key":"5627_CR10","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1162\/neco.1994.6.2.307","volume":"6","author":"P Baldi","year":"1994","unstructured":"Baldi P, Chauvin Y (1994) Smooth on-line learning algorithms for hidden Markov models. Neural Comput 6(2):307\u2013318","journal-title":"Neural Comput"},{"key":"5627_CR11","doi-asserted-by":"crossref","unstructured":"Niina G, Dozono H (2012) The spherical hidden Markov self organizing map for learning time series data. In: International conference on artificial neural networks. Springer, pp 563\u2013570","DOI":"10.1007\/978-3-642-33269-2_71"},{"key":"5627_CR12","doi-asserted-by":"crossref","unstructured":"Yamaguchi N (2010) Self-organizing hidden Markov models. In: International conference on neural information processing. Springer, pp 454\u2013461","DOI":"10.1007\/978-3-642-17534-3_56"},{"issue":"1","key":"5627_CR13","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.patrec.2009.09.009","volume":"31","author":"G Caridakis","year":"2010","unstructured":"Caridakis G, Karpouzis K, Drosopoulos A, Kollias S (2010) SOMM: Self organizing Markov map for gesture recognition. Pattern Recognition Letters 31(1):52\u201359","journal-title":"Pattern Recognition Letters"},{"key":"5627_CR14","doi-asserted-by":"crossref","unstructured":"Jaziri R, Lebbah M, Bennani Y, Chenot JH (2011) SOS-HMM: self-organizing structure of hidden Markov model. In: International conference on artificial neural networks. Springer, pp 87\u201394","DOI":"10.1007\/978-3-642-21738-8_12"},{"key":"5627_CR15","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-1-4939-6753-7_6","volume-title":"Hidden Markov models","author":"C Ferles","year":"2017","unstructured":"Ferles C, Beaufort WS, Ferle V (2017) Self-organizing hidden Markov model map (SOHMMM): biological sequence clustering and cluster visualization. Hidden Markov models. Springer, Berlin, pp 83\u2013101"},{"key":"5627_CR16","doi-asserted-by":"crossref","unstructured":"Ferles C, Stafylopatis A (2008) Sequence clustering with the self-organizing hidden Markov model map. In: 2008 8th IEEE international conference on bioinformatics and bioEngineering. IEEE, pp 1\u20137","DOI":"10.1109\/BIBE.2008.4696720"},{"key":"5627_CR17","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.ins.2012.02.017","volume":"197","author":"W Khreich","year":"2012","unstructured":"Khreich W, Granger E, Miri A, Sabourin R (2012) A survey of techniques for incremental learning of HMM parameters. Inf Sci 197:105\u2013130","journal-title":"Inf Sci"},{"issue":"2","key":"5627_CR18","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/TSMCC.2002.801356","volume":"32","author":"SB Cho","year":"2002","unstructured":"Cho SB (2002) Incorporating soft computing techniques into a probabilistic intrusion detection system. IEEE Trans Syst Man Cybern Part C Appl Rev 32(2):154\u2013160","journal-title":"IEEE Trans Syst Man Cybern Part C Appl Rev"},{"issue":"7","key":"5627_CR19","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/j.cose.2006.05.005","volume":"25","author":"W Wang","year":"2006","unstructured":"Wang W, Guan X, Zhang X, Yang L (2006) Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data. Comput Secur 25(7):539\u2013550","journal-title":"Comput Secur"},{"issue":"1","key":"5627_CR20","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MASSP.1986.1165342","volume":"3","author":"L Rabiner","year":"1986","unstructured":"Rabiner L, Juang BH (1986) An introduction to hidden Markov models. IEEE ASSP Mag 3(1):4\u201316","journal-title":"IEEE ASSP Mag"},{"issue":"2","key":"5627_CR21","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"LR Rabiner","year":"1989","unstructured":"Rabiner LR (1989) A tutorial on hidden Markov models and selected applications in speech recognition. Proc IEEE 77(2):257\u2013286","journal-title":"Proc IEEE"},{"issue":"1","key":"5627_CR22","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/BF00337288","volume":"43","author":"T Kohonen","year":"1982","unstructured":"Kohonen T (1982) Self-organized formation of topologically correct feature maps. Biol Cybern 43(1):59\u201369","journal-title":"Biol Cybern"},{"key":"5627_CR23","doi-asserted-by":"crossref","unstructured":"Kohonen T (1993) Generalizations of the self-organizing map. In: Proceedings of 1993 international joint conference on neural networks, 1993. IJCNN\u201993-Nagoya, vol\u00a01. IEEE, pp 457\u2013462","DOI":"10.1109\/IJCNN.1993.713953"},{"key":"5627_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-97610-0","volume-title":"Self-organizing maps","author":"T Kohonen","year":"1995","unstructured":"Kohonen T (1995) Self-organizing maps. Springer, Heidelberg"},{"key":"5627_CR25","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.neucom.2004.01.008","volume":"57","author":"B Hammer","year":"2004","unstructured":"Hammer B, Micheli A, Sperduti A, Strickert M (2004) A general framework for unsupervised processing of structured data. Neurocomputing 57:3\u201335","journal-title":"Neurocomputing"},{"issue":"2","key":"5627_CR26","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1002\/j.1538-7305.1985.tb00439.x","volume":"64","author":"BH Juang","year":"1985","unstructured":"Juang BH, Rabiner LR (1985) A probabilistic distance measure for hidden Markov models. AT&T Tech J 64(2):391\u2013408","journal-title":"AT&T Tech J"},{"key":"5627_CR27","unstructured":"OMNeT++ Discrete Event Simulator. https:\/\/www.omnetpp.org\/. Accessed in July 2019"},{"key":"5627_CR28","unstructured":"INET Framework. https:\/\/inet.omnetpp.org\/. Accessed July 2019"},{"key":"5627_CR29","unstructured":"Classification: ROC Curve and AUC. https:\/\/developers.google.com\/machine-learning\/crash-course\/classification\/roc-and-auc. Accessed May 2019"},{"key":"5627_CR30","doi-asserted-by":"crossref","unstructured":"Fu B, Bern\u00e1th G, Steichen B, Weber S (2008) Wireless background noise in the Wi-Fi spectrum. In: 4th international conference on wireless communications, networking and mobile computing, 2008, WiCOM\u201908. IEEE, pp 1\u20137","DOI":"10.1109\/WiCom.2008.437"},{"key":"5627_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-010-0612-5","volume-title":"Hidden Markov models for bioinformatics","author":"T Koski","year":"2001","unstructured":"Koski T (2001) Hidden Markov models for bioinformatics, vol 2. Springer, New York"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-020-05627-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-020-05627-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-020-05627-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,22]],"date-time":"2021-06-22T21:12:39Z","timestamp":1624396359000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-020-05627-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,2]]},"references-count":31,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["5627"],"URL":"https:\/\/doi.org\/10.1007\/s00521-020-05627-7","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"type":"print","value":"0941-0643"},{"type":"electronic","value":"1433-3058"}],"subject":[],"published":{"date-parts":[[2021,1,2]]},"assertion":[{"value":"10 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 December 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}