6.14 Chapter bibliography 275
[Boz 2002] describes a method of decision-tree extraction from trained
neural networks. A network intrusion detection system based on artificial
neural networks was introduced by [Wang 2004]. [Guo 2004] introduced
the application of probabilistic neural networks. [Potts 1999] presented
a generalized additive neural network approach for data mining, while
[Maglaveras 1998] presented an adaptive backpropagation neural network
for real-time ischemia. [Khan 2004] and [Brendon 2004] worked on mul-
timedia data mining for automatic classification of speech and music using
neural networks, whereas [Lin 2000] worked on temporal data mining
using neural networks.
Furthermore, the application ...