Detecting data anomalies in wireless sensor networks
暂无分享,去创建一个
Marimuthu Palaniswami | Christopher Leckie | Sutharshan Rajasegarar | M. Palaniswami | C. Leckie | S. Rajasegarar
[1] Marimuthu Palaniswami,et al. Online drift correction in wireless sensor networks using spatio-temporal modeling , 2008, 2008 11th International Conference on Information Fusion.
[2] Baltasar Beferull-Lozano,et al. Distributed consensus algorithms for SVM training in wireless sensor networks , 2008, 2008 16th European Signal Processing Conference.
[3] Oliver Obst,et al. Using Echo State Networks for Anomaly Detection in Underground Coal Mines , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).
[4] Oliver Obst,et al. Spatiotemporal Anomaly Detection in Gas Monitoring Sensor Networks , 2008, EWSN.
[5] Bo Sheng,et al. Outlier detection in sensor networks , 2007, MobiHoc '07.
[6] Helena Szczerbicka,et al. AIS for misbehavior detection in wireless sensor networks: Performance and design principles , 2007, 2007 IEEE Congress on Evolutionary Computation.
[7] Jianzhong Li,et al. Unsupervised Outlier Detection in Sensor Networks Using Aggregation Tree , 2007, ADMA.
[8] Weili Wu,et al. Localized Outlying and Boundary Data Detection in Sensor Networks , 2007, IEEE Transactions on Knowledge and Data Engineering.
[9] Kotagiri Ramamohanarao,et al. Information sharing for distributed intrusion detection systems , 2007, J. Netw. Comput. Appl..
[10] Marimuthu Palaniswami,et al. Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.
[11] Aric A. Hagberg,et al. Separating the Wheat from the Chaff: Practical Anomaly Detection Schemes in Ecological Applications of Distributed Sensor Networks , 2007, DCOSS.
[12] S. Papavassiliou,et al. Diagnosing Anomalies and Identifying Faulty Nodes in Sensor Networks , 2007, IEEE Sensors Journal.
[13] Helena Szczerbicka,et al. Is AIS Based Misbehavior Detection Suitable for Wireless Sensor Networks? , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[14] Eyal Amir,et al. Real-time Bayesian Anomaly Detection for Environmental Sensor Data , 2007 .
[15] Michael R. Lyu,et al. On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[16] Deborah Estrin,et al. The Tenet architecture for tiered sensor networks , 2006, SenSys '06.
[17] Marimuthu Palaniswami,et al. Intrusion Detection for Routing Attacks in Sensor Networks , 2006, Int. J. Distributed Sens. Networks.
[18] Emilio Parrado-Hernández,et al. Distributed support vector machines , 2006, IEEE Trans. Neural Networks.
[19] Young-Koo Lee,et al. An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks , 2006, ISI.
[20] M. Palaniswami,et al. Distributed Anomaly Detection in Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.
[21] Ali Miri,et al. An intrusion detection system for wireless sensor networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..
[22] Djamel Djenouri,et al. A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.
[23] Samuel Madden,et al. Using Probabilistic Models for Data Management in Acquisitional Environments , 2005, CIDR.
[24] Elaine Shi,et al. Designing secure sensor networks , 2004, IEEE Wireless Communications.
[25] Mikhail Petrovskiy,et al. Outlier Detection Algorithms in Data Mining Systems , 2003, Programming and Computer Software.
[26] Sameer Singh,et al. Novelty detection: a review - part 1: statistical approaches , 2003, Signal Process..
[27] Leonidas J. Guibas,et al. Collaborative signal and information processing: an information-directed approach , 2003 .
[28] Christos Faloutsos,et al. LOCI: fast outlier detection using the local correlation integral , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).
[29] Nello Cristianini,et al. Kernel Methods for Pattern Analysis , 2004 .
[30] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[31] Bernhard Schölkopf,et al. Learning with kernels , 2001 .
[32] R. Tsay,et al. Outliers in multivariate time series , 2000 .
[33] Sridhar Ramaswamy,et al. Efficient algorithms for mining outliers from large data sets , 2000, SIGMOD '00.
[34] Raymond T. Ng,et al. Algorithms for Mining Distance-Based Outliers in Large Datasets , 1998, VLDB.
[35] V. Barnett,et al. Outliers in Statistical Data , 1980 .
[36] Bell Telephone,et al. ROBUST ESTIMATES, RESIDUALS, AND OUTLIER DETECTION WITH MULTIRESPONSE DATA , 1972 .
[37] F. Massey. The Kolmogorov-Smirnov Test for Goodness of Fit , 1951 .