You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
surv-anom-det-wsn/References.bib

136 lines
6.2 KiB
BibTeX

@article{chandola2009,
author = {Chandola V. and Banerjee A. and Kumar V.},
title = {Anomaly Detection: A Survey},
journal = {ACM Comput. Surv.},
pages = {1-58},
number = {41(3)},
year = {2009},
doi = {10.1145/1541880.1541882}
}
@article{bosman2017,
author = {Hedde HWJ Bosman and Giovanni Iacca and Arturo Tejada and Heinrich J Wörtche and Antonio Liotta},
title = {Spatiala nomaly detection in sensor networks using neighborhood information},
journal = {Information Fusion},
pages = {41-56},
volume = {33},
year = {2017},
doi = {10.1016/j.inffus.2016.04.007}
}
@article{rajasegarar2010,
author = {Sutharshan Rajasegarar and Christopher Leckie and James C. Bezdek and Marimuthu Palaniswami},
journal = {IEEE transactions on information forensics and security},
number = {3},
volume = {4},
title = {Centered Hyperspherical and HyperellipsoidalOne-Class Support Vector Machines for AnomalyDetection in Sensor Networks},
year = {2010},
pages = {518-533}
}
@article{rajasegarar2008,
author = {Sutharshan Rajasegarar and Christopher Leckie and Marimuthu Palaniswam},
title = {Anomaly detection in wireless sensor networks},
journal = {IEEE Wireless Communications},
volume = {},
number = {},
year = {2008}
}
@article{wang2006,
author = {Defeng Wang and Daniel S. Yeung and Eric C.C. Tsang},
journal = {IEEE transactions on systems, man, and cybernetics - Part B: cybernetics},
title = {Structured One-Class Classification},
volume = {36},
number = {6},
year = {2006},
pages = {1283-1295}
}
@article{laskov2004,
author = {P. Laskov and C. Schäfer and I. Kotenko and K.-R. Müller},
title = {Intrusion Detection in Unlabeled Data with Quarter-sphere Support Vector Machines},
journal = {Proc. Detectionof Intrusions and Malware \& Vulnerability Assessment},
volume = {27},
number = {4},
year = {2006},
pages = {228-236}
}
@article{shahid2012a,
author = {Nauman Shahid and Ijaz Haider Naqvi and Saad Bin Qaisar},
title = {Quarter-Sphere SVM: Attribute andSpatio-Temporal Correlations based Outlier \& Event Detection in Wireless Sensor Networks},
journal = {IEEE Wireless Communications and Networking Conference: Mobile and Wireless Networks},
year = {2012},
doi = {10.1109/WCNC.2012.6214127}
}
@article{shahid2012b,
author = {Nauman Shahid and Ijaz Haider Naqvi and Saad Bin Qaisar},
title = {Real Time Energy Efficient Approach to Outlier \& Event Detection in Wireless Sensor Networks},
journal = {IEEE International Conference on Communication Systems (ICCS)},
year = {2012},
doi = {10.1109/ICCS.2012.6406130}
}
@article{ali2015,
author = {K. Ali and T. Anwaro and I. H. Naqvi and M. H. Jafry},
title = {Composite Event Detection and Identification for WSNs using General Hebbian Algorithm},
journal = {IEEE ICC 2015 - Ad-hoc and Sensor Networking Symposium},
year = {2015}
}
@article{mcdonald2013,
author = {Dylan McDonald and Stewart Sanchez and Sanjay Madria and Fikret Ercal},
title = {A Survey of Methods for Finding Outliers in Wireless Sensor Networks},
journal = {Journal of Network and Systems Management},
volume = {23},
year = {2015},
pages = {153-182}
}
@article{sheng2007,
author = {Bo Sheng and Qun Li and Weizhen Mao and Wen Jin},
title = {Outlier Detection in Sensor Networks},
journal = {MobiHoc '07: Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing},
year = {2007},
doi = {10.1145/1288107.1288137}
}
@article{böhm2008,
author = {Christian Böhm and Christos Faloutsos and Claudia Plant},
title = {Outlier-robust Clustering using Independent Components},
journal = {SIGMOD '08: Proceedings of the 2008 ACM SIGMOD international conference on Management of data},
year = {2008},
doi = {10.1145/1376616.1376638}
}
@article{papadimitriou2003,
author = {Spiros Papadimitriou and Hiroyuki Kitagawa and Phillip B. Gibbons and Christos Faloutsos},
title = {LOCI: Fast Outlier DetectionUsing the Local Correlation Integral},
journal = {Proceedings 19th International Conference on Data Engineering},
year = {March 2003},
doi = {10.1109/ICDE.2003.1260802}
}
@article{breuning2000,
author = {Markus M. Breunig and Hans-Peter Kriegel and Raymond T. Ng and Jörg Sander},
title = {LOF: Identifying Density-Based Local Outliers},
journal = {Proc. ACM SIGMOD 2000 Int. Conf. On Management of Data},
year = {2000}
}
@article{oreilly2014,
author = {Colin O'Reilly and Alexander Gluhak and Muhammad Ali Imran and Sutharshan Rajasegarar},
title = {Anomaly Detection in Wireless Sensor Networks in a Non-Stationary Environment},
journal = {IEEE Communications Surveys \& Tutorials},
volume = {16},
number = {3},
year = {2014},
pages = {1413 - 1432},
doi = {10.1109/SURV.2013.112813.00168}
}
@article{oreilly2016,
author = {Colin OReilly and Alexander Gluhak and Muhammad Ali Imran},
title = {Distributed Anomaly Detection using Minimum Volume Elliptical Principal Component Analysis},
journal = {IEEE Transactions on Knowledge and Data Engineering},
volume = {28},
number = {9},
year = {2016},
doi = {10.1109/TKDE.2016.2555804}
}
@article{shilton2020,
author = {Alistair Shilton and Sutharshan Rajasegarar and Marimuthu Palaniswami},
title = {Multiclass Anomaly Detector: the CS++ Support VectorMachine},
journal = {Journal of Machine Learning Research},
volume = {21},
number = {213},
year = {2020},
pages = {1-39}
}