{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,25]],"date-time":"2024-08-25T18:28:18Z","timestamp":1724610498589},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,6,19]],"date-time":"2021-06-19T00:00:00Z","timestamp":1624060800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,19]],"date-time":"2021-06-19T00:00:00Z","timestamp":1624060800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput & Applic"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s00521-021-05731-2","type":"journal-article","created":{"date-parts":[[2021,6,19]],"date-time":"2021-06-19T19:02:31Z","timestamp":1624129351000},"page":"823-831","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A novel energy-based online sequential extreme learning machine to detect anomalies over real-time data streams"],"prefix":"10.1007","volume":"34","author":[{"given":"Xiaoping","family":"Wang","sequence":"first","affiliation":[]},{"given":"Shanshan","family":"Tu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Chengjie","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,19]]},"reference":[{"issue":"1","key":"5731_CR1","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MITP.2013.7","volume":"15","author":"C Sample","year":"2013","unstructured":"Sample C, Schaffer K (2013) An overview of anomaly detection. IT Prof 15(1):8\u201311","journal-title":"IT Prof"},{"key":"5731_CR2","doi-asserted-by":"crossref","unstructured":"Callegari C, Giordano S, Pagano M (2017) Anomaly detection: an overview of selected methods. In: 2017 international multi-conference on engineering, computer and information sciences (SIBIRCON), Novosibirsk, 2017, pp 52\u201357","DOI":"10.1109\/SIBIRCON.2017.8109836"},{"key":"5731_CR3","doi-asserted-by":"crossref","unstructured":"Bhuyan MH, Bhattacharyya DK, Kalita JK (2014) Network anomaly detection: methods, systems and tools. In: IEEE communications surveys & tutorials, vol. 16, no. 1, pp 303\u2013336, First Quarter","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"5731_CR4","doi-asserted-by":"crossref","unstructured":"Rana AI, Estrada G, Sol\u00e9 M, Munt\u00e9s V (2016) Anomaly detection guidelines for data streams in big data. In: 2016 3rd international conference on soft computing & machine intelligence (ISCMI), Dubai, 2016, pp 94\u201398","DOI":"10.1109\/ISCMI.2016.24"},{"key":"5731_CR5","doi-asserted-by":"crossref","unstructured":"Rettig L, Khayati M, Cudr\u00e9-Mauroux P, Pi\u00f3rkowski M (2015) Online anomaly detection over Big Data streams. In: 2015 IEEE international conference on big data (Big Data), Santa Clara, CA, 2015, pp 1113\u20131122","DOI":"10.1109\/BigData.2015.7363865"},{"key":"5731_CR6","doi-asserted-by":"crossref","unstructured":"Guler ER, Ozdemir S (2018) Applications of stream data mining on the internet of things: a survey. In: 2018 International congress on big data, deep learning and fighting cyber terrorism (IBIGDELFT), ANKARA, Turkey, 2018, pp 51\u201355","DOI":"10.1109\/IBIGDELFT.2018.8625289"},{"key":"5731_CR7","doi-asserted-by":"crossref","unstructured":"Robins A (1993) Catastrophic forgetting in neural networks: the role of rehearsal mechanisms. In: Proceedings 1993 the first new zealand international two-stream conference on artificial neural networks and expert systems, Dunedin, New Zealand, pp 65\u201368","DOI":"10.1109\/ANNES.1993.323080"},{"key":"5731_CR8","doi-asserted-by":"crossref","unstructured":"Tellis VM, D'Souza DJ (2018) Detecting anomalies in data stream using efficient techniques: a review. In: 2018 International conference on control, power, communication and computing technologies (ICCPCCT), Kannur, 2018, pp 296\u2013298","DOI":"10.1109\/ICCPCCT.2018.8574310"},{"key":"5731_CR9","volume-title":"Outliers in statistical data","author":"V Barnett","year":"1994","unstructured":"Barnett V, Lewis T (1994) Outliers in statistical data. Wiley, New York"},{"key":"5731_CR10","unstructured":"Rousseeuw LAS, MMKDP (2016) A survey on outlier detection technique in streaming data using data clustering approach. Int J Eng Comput Sci 5:1"},{"key":"5731_CR11","doi-asserted-by":"crossref","unstructured":"Ramaswamy S, Rastogi R, Kyuseok S (2000) Efficient algorithms for mining outliers from large data Sets. In: Proceedings of the ACMSIDMOD international conference on management of data","DOI":"10.1145\/342009.335437"},{"key":"5731_CR12","doi-asserted-by":"crossref","unstructured":"Chugh N, Chugh M, Agarwal A (2014) Outlier detection in streaming data a research perspective. In: International conference on parallel, distributed and grid computing, IEEE","DOI":"10.1109\/PDGC.2014.7030784"},{"key":"5731_CR13","doi-asserted-by":"crossref","unstructured":"Pokrajac D, Lazarevic DA, Latecki LJ (2007) Incremental local outlier detection for data streams. In: CIDM 2007. IEEE symposium on computational intelligence and data mining, 2007, pp 504\u2013515. IEEE","DOI":"10.1109\/CIDM.2007.368917"},{"key":"5731_CR14","doi-asserted-by":"crossref","unstructured":"Karimian SH, Kelarestaghi M, Hashemi S (2012) IIncLOF: Improved incremental local outlier detection for data streams. In: 16th CSI International Symposium on Artificial Intelligence and Signal Processing (AISP 2012), (pp. 023-028). IEEE","DOI":"10.1109\/AISP.2012.6313711"},{"key":"5731_CR15","doi-asserted-by":"crossref","unstructured":"Thakran Y, Toshniwal D (2012) Unsupervised outlier detection in streaming data using weighted clustering. In: 2012 12th international conference on intelligent systems design and applications (ISDA), pp 947\u2013952. IEEE","DOI":"10.1109\/ISDA.2012.6416666"},{"issue":"3","key":"5731_CR16","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41(3):15","journal-title":"ACM Comput Surv"},{"key":"5731_CR17","doi-asserted-by":"crossref","unstructured":"Jakhale AR (2017) Design of anomaly packet detection framework by data mining algorithm for network flow. In: 2017 international conference on computational intelligence in data science (ICCIDS), Chennai, pp 1\u20136","DOI":"10.1109\/ICCIDS.2017.8272665"},{"key":"5731_CR18","doi-asserted-by":"crossref","unstructured":"Abbady S, Ke C, Lavergne J, Chen J, Raghavan V, Benton R (2017) Online mining for association rules and collective anomalies in data streams. In: 2017 IEEE international conference on big data (big data), Boston, MA, pp 2370\u20132379","DOI":"10.1109\/BigData.2017.8258192"},{"issue":"4","key":"5731_CR19","doi-asserted-by":"publisher","first-page":"1475","DOI":"10.1109\/TCYB.2018.2804940","volume":"49","author":"X Miao","year":"2019","unstructured":"Miao X, Liu Y, Zhao H, Li C (2019) Distributed online one-class support vector machine for anomaly detection over networks. IEEE Trans Cybernet 49(4):1475\u20131488","journal-title":"IEEE Trans Cybernet"},{"key":"5731_CR20","doi-asserted-by":"crossref","unstructured":"Mozaffari M, Yilmaz Y (2019) Online anomaly detection in multivariate settings. In: 2019 IEEE 29th international workshop on machine learning for signal processing (MLSP), Pittsburgh, PA, USA, pp 1\u20136","DOI":"10.1109\/MLSP.2019.8918893"},{"issue":"9","key":"5731_CR21","doi-asserted-by":"publisher","first-page":"2214","DOI":"10.1109\/TNNLS.2014.2382094","volume":"26","author":"S Scardapane","year":"2015","unstructured":"Scardapane S, Comminiello D, Scarpiniti M, Uncini A (2015) Online Sequential Extreme Learning Machine With Kernels. IEEE Trans Neural Netw Learn Syst 26(9):2214\u20132220","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"3","key":"5731_CR22","doi-asserted-by":"publisher","first-page":"2027","DOI":"10.1109\/TGRS.2019.2952236","volume":"58","author":"L Li","year":"2020","unstructured":"Li L, Zeng J, Jiao L, Liang P, Liu F, Yang S (2020) Online active extreme learning machine with discrepancy sampling for PolSAR classification. IEEE Trans Geosci Remote Sens 58(3):2027\u20132041","journal-title":"IEEE Trans Geosci Remote Sens"},{"issue":"6","key":"5731_CR23","doi-asserted-by":"publisher","first-page":"1277","DOI":"10.1109\/TII.2015.2479852","volume":"11","author":"X Lu","year":"2015","unstructured":"Lu X, Liu C, Huang M (2015) Online probabilistic extreme learning machine for distribution modeling of complex batch forging processes. IEEE Trans Industr Inf 11(6):1277\u20131286","journal-title":"IEEE Trans Industr Inf"},{"key":"5731_CR24","doi-asserted-by":"crossref","unstructured":"Vijendran S, Dubey R (2019) Deep online sequential extreme learning machines and its application in pneumonia detection. In: 2019 8th international conference on industrial technology and management (ICITM). Cambridge, UK, pp 311\u2013316","DOI":"10.1109\/ICITM.2019.8710700"},{"issue":"1","key":"5731_CR25","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1016\/j.neucom.2005.12.126","volume":"70","author":"GB Huang","year":"2006","unstructured":"Huang GB, Zhu QY, Siew CK (2006) Extreme learning machine: theory and applications. Neurocomputing 70(1):489\u2013501","journal-title":"Neurocomputing"},{"key":"5731_CR26","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/s12559-015-9333-0","volume":"7","author":"G-B Huang","year":"2015","unstructured":"Huang G-B (2015) What are extreme learning machines? Filling the gap between Frank Rosenblatt\u2019s Dream and John von Neumann\u2019s Puzzle. Cognitive Comput 7:263\u2013278","journal-title":"Cognitive Comput"},{"issue":"6","key":"5731_CR27","first-page":"31","volume":"28","author":"LLC Kasun","year":"2013","unstructured":"Kasun LLC, Zhou H, Huang G-B, Vong CM (2013) Representational learning with extreme learning machine for big data. IEEE Intell Syst 28(6):31\u201334","journal-title":"IEEE Intell Syst"},{"key":"5731_CR28","doi-asserted-by":"crossref","unstructured":"Salakhutdinov R, Mnih A, Hinton G (2007) Restricted Boltzmann machines for collaborative filtering. In: Proceedings of the 24th international conference on machine learning-ICML '07, p 791","DOI":"10.1145\/1273496.1273596"},{"key":"5731_CR29","unstructured":"Osadchy R, Miller M, LeCun Y (2005) Synergistic face detection and pose estimation with energy-based model. In: Advances in neural information processing systems (NIPS 2004). MIT Press"},{"key":"5731_CR30","volume-title":"Predicting structured data","author":"Y Lecun","year":"2006","unstructured":"Lecun Y, Chopra S, Hadsell R, Ranzato MA, Huang FJ (2006) A tutorial on energy-based learning. In: Bakir G, Hofman T, Scholkopt B, Smola A, Taskar B (eds) Predicting structured data. MIT Press, New York"},{"key":"5731_CR31","unstructured":"Recht B, Re C (2012) Beneath the valley of the noncommutative arithmetic-geometric mean inequality: conjectures, case-studies, and consequences. arXiv preprint arXiv:1202.4184"},{"key":"5731_CR32","doi-asserted-by":"publisher","first-page":"992","DOI":"10.1093\/biomet\/asm065","volume":"94","author":"RA Lockhart","year":"2007","unstructured":"Lockhart RA, O\u2019Reilly FJ, Stephens MA (2007) Use of the Gibbs sampler to obtain conditional tests, with applications. Biometrika 94:992\u2013998","journal-title":"Biometrika"},{"key":"5731_CR33","doi-asserted-by":"crossref","unstructured":"Martino L, Read J, Luengo D (2015) Independent doubly adaptive rejection metropolis sampling Within Gibbs sampling. IEEE Trans Signal Process 63(12):3123\u20133138","DOI":"10.1109\/TSP.2015.2420537"},{"key":"5731_CR34","doi-asserted-by":"publisher","DOI":"10.1201\/9781482296426","volume-title":"Markov Chain Monte Carlo: stochastic simulation for Bayesian inference","author":"D Gamerman","year":"2006","unstructured":"Gamerman D, Lopes HF (2006) Markov Chain Monte Carlo: stochastic simulation for Bayesian inference, 2nd edn. Chapmal & Hall\/CRC, London","edition":"2"},{"key":"5731_CR35","first-page":"102","volume":"26","author":"C Robert","year":"2011","unstructured":"Robert C, Casella G (2011) A short history of Markov chain Monte Carlo: subjective recollections from incomplete data. Stat Sci 26:102\u2013115","journal-title":"Stat Sci"},{"issue":"4","key":"5731_CR36","doi-asserted-by":"publisher","first-page":"1701","DOI":"10.2307\/2242477","volume":"22","author":"L Tierney","year":"1994","unstructured":"Tierney L (1994) Markov chains for exploring posterior distributions. Ann Stat 22(4):1701\u20131728. https:\/\/doi.org\/10.2307\/2242477","journal-title":"Ann Stat"},{"key":"5731_CR37","doi-asserted-by":"crossref","unstructured":"Bhosale KS, Nenova M, Iliev G (2017) The distributed denial of service attacks (DDoS) prevention mechanisms on application layer. In: 2017 13th international conference on advanced technologies, systems and services in telecommunications (TELSIKS), Nis, 2017, pp 136\u2013139","DOI":"10.1109\/TELSKS.2017.8246247"},{"key":"5731_CR38","doi-asserted-by":"crossref","unstructured":"Sharafaldin I, Lashkari AH, Hakak S, Ghorbani AA (2019) Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. In: IEEE 53rd international Carnahan conference on security technology, Chennai, India","DOI":"10.1109\/CCST.2019.8888419"},{"key":"5731_CR39","unstructured":"https:\/\/cloud.google.com\/"},{"key":"5731_CR40","unstructured":"https:\/\/spark.apache.org\/"},{"key":"5731_CR41","unstructured":"https:\/\/www.tensorflow.org\/"},{"key":"5731_CR42","unstructured":"Lachiche N, Flach PA (2003) Improving accuracy and cost of two-class and multi-class probabilistic classifiers using ROC curves. In: T Fawcett, N Mishra (eds) Proceedings of the 20th international conference on machine learning (ICML'03), pp 416\u2013423. AAAI Press"},{"key":"5731_CR43","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1023\/A:1010920819831","volume":"45","author":"DJ Hand","year":"2001","unstructured":"Hand DJ, Till RJ (2001) A simple generalisation of the area under the roc curve for multiple class classification problems. Machine Learn 45:171\u2013186","journal-title":"Machine Learn"},{"key":"5731_CR44","first-page":"45","volume":"6","author":"K Demertzis","year":"2016","unstructured":"Demertzis K, Iliadis L (2016) Ladon: a cyber-threat bio-inspired intelligence management system. J Appl Math Bioinform 6:45\u201364","journal-title":"J Appl Math Bioinform"},{"key":"5731_CR45","volume-title":"Innovative security solutions for information technology and communications. SECITC 2018 Lecture Notes in Computer Science","author":"K Rantos","year":"2019","unstructured":"Rantos K, Drosatos G, Demertzis K, Ilioudis C, Papanikolaou A, Kritsas A (2019) ADvoCATE: a consent management platform for personal data processing in the IoT using blockchain technology. In: Lanet JL, Toma C (eds) Innovative security solutions for information technology and communications. SECITC 2018 Lecture Notes in Computer Science. Springer, Cham"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-021-05731-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-021-05731-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-021-05731-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,21]],"date-time":"2022-01-21T15:24:02Z","timestamp":1642778642000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-021-05731-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,19]]},"references-count":45,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["5731"],"URL":"https:\/\/doi.org\/10.1007\/s00521-021-05731-2","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,19]]},"assertion":[{"value":"6 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 June 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}