Detecting data anomalies in wireless sensor networks

[1]  Marimuthu Palaniswami,et al.  Online drift correction in wireless sensor networks using spatio-temporal modeling , 2008, 2008 11th International Conference on Information Fusion.

[2]  Baltasar Beferull-Lozano,et al.  Distributed consensus algorithms for SVM training in wireless sensor networks , 2008, 2008 16th European Signal Processing Conference.

[3]  Oliver Obst,et al.  Using Echo State Networks for Anomaly Detection in Underground Coal Mines , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).

[4]  Oliver Obst,et al.  Spatiotemporal Anomaly Detection in Gas Monitoring Sensor Networks , 2008, EWSN.

[5]  Bo Sheng,et al.  Outlier detection in sensor networks , 2007, MobiHoc '07.

[6]  Helena Szczerbicka,et al.  AIS for misbehavior detection in wireless sensor networks: Performance and design principles , 2007, 2007 IEEE Congress on Evolutionary Computation.

[7]  Jianzhong Li,et al.  Unsupervised Outlier Detection in Sensor Networks Using Aggregation Tree , 2007, ADMA.

[8]  Weili Wu,et al.  Localized Outlying and Boundary Data Detection in Sensor Networks , 2007, IEEE Transactions on Knowledge and Data Engineering.

[9]  Kotagiri Ramamohanarao,et al.  Information sharing for distributed intrusion detection systems , 2007, J. Netw. Comput. Appl..

[10]  Marimuthu Palaniswami,et al.  Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[11]  Aric A. Hagberg,et al.  Separating the Wheat from the Chaff: Practical Anomaly Detection Schemes in Ecological Applications of Distributed Sensor Networks , 2007, DCOSS.

[12]  S. Papavassiliou,et al.  Diagnosing Anomalies and Identifying Faulty Nodes in Sensor Networks , 2007, IEEE Sensors Journal.

[13]  Helena Szczerbicka,et al.  Is AIS Based Misbehavior Detection Suitable for Wireless Sensor Networks? , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[14]  Eyal Amir,et al.  Real-time Bayesian Anomaly Detection for Environmental Sensor Data , 2007 .

[15]  Michael R. Lyu,et al.  On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.

[16]  Deborah Estrin,et al.  The Tenet architecture for tiered sensor networks , 2006, SenSys '06.

[17]  Marimuthu Palaniswami,et al.  Intrusion Detection for Routing Attacks in Sensor Networks , 2006, Int. J. Distributed Sens. Networks.

[18]  Emilio Parrado-Hernández,et al.  Distributed support vector machines , 2006, IEEE Trans. Neural Networks.

[19]  Young-Koo Lee,et al.  An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks , 2006, ISI.

[20]  M. Palaniswami,et al.  Distributed Anomaly Detection in Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.

[21]  Ali Miri,et al.  An intrusion detection system for wireless sensor networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..

[22]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.

[23]  Samuel Madden,et al.  Using Probabilistic Models for Data Management in Acquisitional Environments , 2005, CIDR.

[24]  Elaine Shi,et al.  Designing secure sensor networks , 2004, IEEE Wireless Communications.

[25]  Mikhail Petrovskiy,et al.  Outlier Detection Algorithms in Data Mining Systems , 2003, Programming and Computer Software.

[26]  Sameer Singh,et al.  Novelty detection: a review - part 1: statistical approaches , 2003, Signal Process..

[27]  Leonidas J. Guibas,et al.  Collaborative signal and information processing: an information-directed approach , 2003 .

[28]  Christos Faloutsos,et al.  LOCI: fast outlier detection using the local correlation integral , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).

[29]  Nello Cristianini,et al.  Kernel Methods for Pattern Analysis , 2004 .

[30]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[31]  Bernhard Schölkopf,et al.  Learning with kernels , 2001 .

[32]  R. Tsay,et al.  Outliers in multivariate time series , 2000 .

[33]  Sridhar Ramaswamy,et al.  Efficient algorithms for mining outliers from large data sets , 2000, SIGMOD '00.

[34]  Raymond T. Ng,et al.  Algorithms for Mining Distance-Based Outliers in Large Datasets , 1998, VLDB.

[35]  V. Barnett,et al.  Outliers in Statistical Data , 1980 .

[36]  Bell Telephone,et al.  ROBUST ESTIMATES, RESIDUALS, AND OUTLIER DETECTION WITH MULTIRESPONSE DATA , 1972 .

[37]  F. Massey The Kolmogorov-Smirnov Test for Goodness of Fit , 1951 .