Advancements of Data Anomaly Detection Research in Wireless Sensor Networks: A Survey and Open Issues
暂无分享,去创建一个
[1] Saad B. Qaisar,et al. Quarter-Sphere SVM: Attribute and Spatio-Temporal correlations based Outlier & Event Detection in wireless sensor networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).
[2] Sugata Sanyal,et al. Adaptive neuro-fuzzy intrusion detection systems , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[3] Keith Marzullo,et al. Tolerating failures of continuous-valued sensors , 1990, TOCS.
[4] Ralf Steinmetz,et al. Wireless Sensor Networks and the Internet of Things: Selected Challenges , 2009 .
[5] M. Palaniswami,et al. Distributed Anomaly Detection in Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.
[6] JAMAL N. AL-KARAKI,et al. Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.
[7] Xiangyang Wang,et al. Feature selection based on rough sets and particle swarm optimization , 2007, Pattern Recognit. Lett..
[8] Raimir Holanda Filho,et al. A New Collaborative Approach for Intrusion Detection System on Wireless Sensor Networks , 2008, TeNe.
[9] Philip S. Yu,et al. Outlier detection for high dimensional data , 2001, SIGMOD '01.
[10] YuanYuan Li,et al. Anomaly detection in unknown environments using wireless sensor networks , 2010 .
[11] Biming Tian,et al. Anomaly detection in wireless sensor networks: A survey , 2011, J. Netw. Comput. Appl..
[12] Anazida Zainal,et al. A Survey of Intrusion Detection Schemes in Wireless Sensor Networks , 2012 .
[13] Ramesh Govindan,et al. Sensor faults: Detection methods and prevalence in real-world datasets , 2010, TOSN.
[14] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[15] Marimuthu Palaniswami,et al. Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.
[16] Gustavo Alonso,et al. Declarative Support for Sensor Data Cleaning , 2006, Pervasive.
[17] Victoria J. Hodge,et al. A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.
[18] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[19] Supakit Siripanadorn,et al. Anomaly detection in wireless sensor networks using self-organizing map and wavelets , 2010 .
[20] Gregory J. Pottie,et al. Sensor network data fault types , 2007, TOSN.
[21] Marimuthu Palaniswami,et al. Clustering ellipses for anomaly detection , 2011, Pattern Recognit..
[22] Dimitrios Gunopulos,et al. Distributed deviation detection in sensor networks , 2003, SGMD.
[23] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[24] Marimuthu Palaniswami,et al. Incremental Elliptical Boundary Estimation for Anomaly Detection in Wireless Sensor Networks , 2011, 2011 IEEE 11th International Conference on Data Mining.
[25] Song Han,et al. Highly Efficient Distance-Based Anomaly Detection through Univariate with PCA in Wireless Sensor Networks , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[26] Dimitrios Gunopulos,et al. Online outlier detection in sensor data using non-parametric models , 2006, VLDB.
[27] Muhammad Ali Imran,et al. Online anomaly rate parameter tracking for anomaly detection in wireless sensor networks , 2012, 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).
[28] Thomas G. Dietterich,et al. Spatiotemporal Models for Data-Anomaly Detection in Dynamic Environmental Monitoring Campaigns , 2011, TOSN.
[29] Simin Nadjm-Tehrani,et al. Adaptive real-time anomaly detection with incremental clustering , 2007, Inf. Secur. Tech. Rep..
[30] Miao Xie,et al. Anomaly Detection in Wireless Sensor Networks , 2013 .
[31] Peter Anderson,et al. A roadmap to the future. , 2014, Canadian Urological Association journal = Journal de l'Association des urologues du Canada.
[32] Zheng Yuan,et al. Intrusion Detection for Wireless Sensor Networks Based on Multi-agent and Refined Clustering , 2009, 2009 WRI International Conference on Communications and Mobile Computing.
[33] Vipin Kumar,et al. Introduction to Data Mining , 2022, Data Mining and Machine Learning Applications.
[34] Marimuthu Palaniswami,et al. Streaming analysis in wireless sensor networks , 2014, Wirel. Commun. Mob. Comput..
[35] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[36] Lei Chen,et al. In-network Outlier Cleaning for Data Collection in Sensor Networks , 2006, CleanDB.
[37] Antonio Alfredo Ferreira Loureiro,et al. Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.
[38] SzczerbickiEdward. SMART SYSTEMS INTEGRATION , 2008 .
[39] Y.A. Sekercioglu,et al. Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.
[40] Harshal A. Arolkar,et al. Ant colony based approach for intrusion detection on cluster heads in WSN , 2011, ICCCS '11.
[41] Eyal Amir,et al. Real-time Bayesian Anomaly Detection for Environmental Sensor Data , 2007 .
[42] Kieu-Xuan Thuc,et al. A collaborative event detection scheme using fuzzy logic in clustered wireless sensor networks , 2011 .
[43] H. S. Wolff,et al. iRun: Horizontal and Vertical Shape of a Region-Based Graph Compression , 2022, Sensors.
[44] Michael R. Lyu,et al. An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks , 2007, Comput. Commun..
[45] Farrukh Aslam Khan,et al. Intrusion Detection Systems for Wireless Sensor Networks: A Survey , 2009, FGIT-FGCN.
[46] Nirvana Meratnia,et al. Ensuring high sensor data quality through use of online outlier detection techniques , 2010, Int. J. Sens. Networks.
[47] Fang Liu,et al. Insider Attacker Detection in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[48] E. Elnahrawy. Directions in Sensor Data Streams : Solutions and Challenges , 2003 .
[49] Lidan Wang,et al. Predictive Modeling-Based Data Collection in Wireless Sensor Networks , 2008, EWSN.
[50] Rekha Jain,et al. Wireless Sensor Network -A Survey , 2013 .
[51] Anazida Zainal,et al. One-Class Principal Component Classifier for anomaly detection in wireless sensor network , 2012, 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN).
[52] Nirvana Meratnia,et al. Outlier Detection Techniques for Wireless Sensor Networks: A Survey , 2008, IEEE Communications Surveys & Tutorials.
[53] S. Manesis,et al. A Survey of Applications of Wireless Sensors and Wireless Sensor Networks , 2005, Proceedings of the 2005 IEEE International Symposium on, Mediterrean Conference on Control and Automation Intelligent Control, 2005..
[54] Mohamed Medhat Gaber,et al. Learning from Data Streams: Processing Techniques in Sensor Networks , 2007 .
[55] Marimuthu Palaniswami,et al. Elliptical anomalies in wireless sensor networks , 2009, TOSN.
[56] Daniel Curiac,et al. Ensemble based sensing anomaly detection in wireless sensor networks , 2012, Expert Syst. Appl..
[57] Zubair A. Baig. Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks , 2011, Comput. Commun..
[58] Kay Römer,et al. The design space of wireless sensor networks , 2004, IEEE Wireless Communications.
[59] Sajal K. Das,et al. Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks , 2009, Ad Hoc Networks.
[60] Christopher Leckie,et al. Sensor data boundary estimation for anomaly detection in wireless sensor networks , 2010, The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010).
[61] F. Freiling,et al. Towards Intrusion Detection in Wireless Sensor Networks , 2007 .
[62] Mohamed Medhat Gaber,et al. Data Stream Processing in Sensor Networks , 2007 .
[63] Kang G. Shin,et al. Detecting SYN flooding attacks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[64] Jiawei Han,et al. Data Mining: Concepts and Techniques , 2000 .
[65] Bo Sheng,et al. Outlier detection in sensor networks , 2007, MobiHoc '07.
[66] Oliver Obst,et al. Wireless Sensor Network Anomalies: Diagnosis and Detection Strategies , 2011 .
[67] Young-Koo Lee,et al. An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks , 2006, ISI.
[68] Satish Kumar,et al. Next century challenges: scalable coordination in sensor networks , 1999, MobiCom.
[69] Tae Ho Cho,et al. Fuzzy Logic Anomaly Detection Scheme for Directed Diffusion Based Sensor Networks , 2006, FSKD.
[70] Yongwha Chung,et al. An Adaptive Intrusion Detection Algorithm Based on Clustering and Kernel-Method , 2006, PAKDD.
[71] D. P. Agrawal,et al. Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..
[72] Cristina Alcaraz,et al. Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration? , 2010, IWSEC 2010.
[73] Dimple Juneja,et al. An Ant Based Framework for Preventing DDoS Attack in Wireless Sensor Networks , 2010, ArXiv.
[74] Saad B. Qaisar,et al. Real time energy efficient approach to Outlier & event detection in wireless sensor networks , 2012, 2012 IEEE International Conference on Communication Systems (ICCS).
[75] Wipawee Usaha,et al. Discrete Wavelet Transform and One-Class Support Vector Machines for anomaly detection in wireless sensor networks , 2011, 2011 International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS).
[76] Zahra Taghikhaki,et al. Distributed Event Detection in Wireless Sensor Networks for Disaster Management , 2010, 2010 International Conference on Intelligent Networking and Collaborative Systems.
[77] Vashek Matyas,et al. Neighbor-Based Intrusion Detection for Wireless Sensor Networks , 2010, 2010 6th International Conference on Wireless and Mobile Communications.
[78] Salman Ahmad Khan,et al. Fuzzy Logic-Based Decision Making for Detecting Distributed Node Exhaustion Attacks in Wireless Sensor Networks , 2010, 2010 Second International Conference on Future Networks.
[79] Robert Szewczyk,et al. System architecture directions for networked sensors , 2000, ASPLOS IX.
[80] Murali S. Kodialam,et al. Detecting network intrusions via sampling: a game theoretic approach , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[81] Marimuthu Palaniswami,et al. Anomaly Detection in Environmental Monitoring Networks [Application Notes] , 2011, IEEE Computational Intelligence Magazine.
[82] Nirvana Meratnia,et al. Adaptive and Online One-Class Support Vector Machine-Based Outlier Detection Techniques for Wireless Sensor Networks , 2009, 2009 International Conference on Advanced Information Networking and Applications Workshops.
[83] Saad B. Qaisar,et al. One-class support vector machines: analysis of outlier detection for wireless sensor networks in harsh environments , 2013, Artificial Intelligence Review.
[84] Ajith Abraham,et al. IDEAS: intrusion detection based on emotional ants for sensors , 2005, 5th International Conference on Intelligent Systems Design and Applications (ISDA'05).
[85] Jiankun Hu,et al. Histogram-Based Online Anomaly Detection in Hierarchical Wireless Sensor Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[86] Makoto Takizawa,et al. A Survey on Clustering Algorithms for Wireless Sensor Networks , 2010, 2010 13th International Conference on Network-Based Information Systems.
[87] Felix C. Freiling,et al. Cooperative Intrusion Detection in Wireless Sensor Networks , 2009, EWSN.
[88] Hsiao-Hwa Chen,et al. Scalable Hyper-Grid k-NN-based Online Anomaly Detection in Wireless Sensor Networks , 2012 .
[89] Anazida Zainal,et al. An adaptive and efficient dimension reduction model for multivariate wireless sensor networks applications , 2013, Appl. Soft Comput..
[90] Zhang Yang,et al. An online outlier detection technique for wireless sensor networks using unsupervised quarter-sphere support vector machine , 2008, 2008 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.
[91] Jeffrey J. P. Tsai,et al. A Framework of Machine Learning Based Intrusion Detection for Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).
[92] Jiankun Hu,et al. Scalable Hypergrid k-NN-Based Online Anomaly Detection in Wireless Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.
[93] Yuan Yao,et al. Online anomaly detection for sensor systems: A simple and efficient approach , 2010, Perform. Evaluation.
[94] Marimuthu Palaniswami,et al. Detecting data anomalies in wireless sensor networks , 2010 .
[95] N. Shahid,et al. Energy efficient outlier detection in WSNs based on temporal and attribute correlations , 2011, 2011 7th International Conference on Emerging Technologies.
[96] Sutharshan Rajasegarar,et al. Anomaly detection by clustering ellipsoids in wireless sensor networks , 2009, 2009 International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).
[97] Kang Yen,et al. Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.
[98] Y. Zhang,et al. – 20 Statistics-based outlier detection for wireless sensor networks , 2012 .
[99] Nirvana Meratnia,et al. Distributed online outlier detection in wireless sensor networks using ellipsoidal support vector machine , 2013, Ad Hoc Networks.
[100] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[101] Tassos Dimitriou,et al. Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.
[102] Ran Wolff,et al. Noname manuscript No. (will be inserted by the editor) In-Network Outlier Detection in Wireless Sensor Networks , 2022 .
[103] Antonio Alfredo Ferreira Loureiro,et al. Malicious node detection in wireless sensor networks , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..
[104] Daniel Curiac,et al. Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique , 2007, International Conference on Networking and Services (ICNS '07).
[105] Marimuthu Palaniswami,et al. Centered Hyperspherical and Hyperellipsoidal One-Class Support Vector Machines for Anomaly Detection in Sensor Networks , 2010, IEEE Transactions on Information Forensics and Security.
[106] Loren Schwiebert,et al. Distributed Event Detection in Sensor Networks , 2006, 2006 International Conference on Systems and Networks Communications (ICSNC'06).
[107] Wei Hong,et al. Model-Driven Data Acquisition in Sensor Networks , 2004, VLDB.
[108] S. Papavassiliou,et al. Diagnosing Anomalies and Identifying Faulty Nodes in Sensor Networks , 2007, IEEE Sensors Journal.
[109] Aric A. Hagberg,et al. Separating the Wheat from the Chaff: Practical Anomaly Detection Schemes in Ecological Applications of Distributed Sensor Networks , 2007, DCOSS.
[110] D. Janakiram,et al. Outlier Detection in Wireless Sensor Networks using Bayesian Belief Networks , 2006, 2006 1st International Conference on Communication Systems Software & Middleware.