[HTML][HTML] A systematic review of data fusion techniques for optimized structural health monitoring
Advancements in structural health monitoring (SHM) techniques have spiked in the past few
decades due to the rapid evolution of novel sensing and data transfer technologies. This …
decades due to the rapid evolution of novel sensing and data transfer technologies. This …
A comprehensive survey on machine learning for networking: evolution, applications and research opportunities
Abstract Machine Learning (ML) has been enjoying an unprecedented surge in applications
that solve problems and enable automation in diverse domains. Primarily, this is due to the …
that solve problems and enable automation in diverse domains. Primarily, this is due to the …
A survey on machine learning for data fusion
Data fusion is a prevalent way to deal with imperfect raw data for capturing reliable, valuable
and accurate information. Comparing with a range of classical probabilistic data fusion …
and accurate information. Comparing with a range of classical probabilistic data fusion …
TSE-IDS: A two-stage classifier ensemble for intelligent anomaly-based intrusion detection system
Intrusion detection systems (IDSs) play a pivotal role in computer security by discovering
and repealing malicious activities in computer networks. Anomaly-based IDS, in particular …
and repealing malicious activities in computer networks. Anomaly-based IDS, in particular …
Dynamic classifier selection: Recent advances and perspectives
Abstract Multiple Classifier Systems (MCS) have been widely studied as an alternative for
increasing accuracy in pattern recognition. One of the most promising MCS approaches is …
increasing accuracy in pattern recognition. One of the most promising MCS approaches is …
[KIRJA][B] Ensemble methods: foundations and algorithms
ZH Zhou - 2025 - books.google.com
Ensemble methods that train multiple learners and then combine them to use, with Boosting
and Bagging as representatives, are well-known machine learning approaches. It has …
and Bagging as representatives, are well-known machine learning approaches. It has …
Network anomaly detection: methods, systems and tools
Network anomaly detection is an important and dynamic research area. Many network
intrusion detection methods and systems (NIDS) have been proposed in the literature. In this …
intrusion detection methods and systems (NIDS) have been proposed in the literature. In this …
CANN: An intrusion detection system based on combining cluster centers and nearest neighbors
WC Lin, SW Ke, CF Tsai - Knowledge-based systems, 2015 - Elsevier
The aim of an intrusion detection systems (IDS) is to detect various types of malicious
network traffic and computer usage, which cannot be detected by a conventional firewall …
network traffic and computer usage, which cannot be detected by a conventional firewall …
Cloud-based cyber-physical intrusion detection for vehicles using deep learning
Detection of cyber attacks against vehicles is of growing interest. As vehicles typically afford
limited processing resources, proposed solutions are rule-based or lightweight machine …
limited processing resources, proposed solutions are rule-based or lightweight machine …
A survey of multiple classifier systems as hybrid systems
A current focus of intense research in pattern classification is the combination of several
classifier systems, which can be built following either the same or different models and/or …
classifier systems, which can be built following either the same or different models and/or …