|
|
|
|
@article{chandola2009,
|
|
|
|
|
author = {Chandola V. and Banerjee A. and Kumar V.},
|
|
|
|
|
title = {Anomaly Detection: A Survey},
|
|
|
|
|
journal = {ACM Comput. Surv.},
|
|
|
|
|
pages = {1-58},
|
|
|
|
|
number = {41(3)},
|
|
|
|
|
year = {2009},
|
|
|
|
|
doi = {10.1145/1541880.1541882}
|
|
|
|
|
}
|
|
|
|
|
@article{bosman2017,
|
|
|
|
|
author = {Hedde HWJ Bosman and Giovanni Iacca and Arturo Tejada and Heinrich J Wörtche and Antonio Liotta},
|
|
|
|
|
title = {Spatiala nomaly detection in sensor networks using neighborhood information},
|
|
|
|
|
journal = {Information Fusion},
|
|
|
|
|
pages = {41-56},
|
|
|
|
|
volume = {33},
|
|
|
|
|
year = {2017},
|
|
|
|
|
doi = {10.1016/j.inffus.2016.04.007}
|
|
|
|
|
}
|
|
|
|
|
@article{rajasegarar2010,
|
|
|
|
|
author = {Sutharshan Rajasegarar and Christopher Leckie and James C. Bezdek and Marimuthu Palaniswami},
|
|
|
|
|
journal = {IEEE transactions on information forensics and security},
|
|
|
|
|
number = {3},
|
|
|
|
|
volume = {4},
|
|
|
|
|
title = {Centered Hyperspherical and HyperellipsoidalOne-Class Support Vector Machines for AnomalyDetection in Sensor Networks},
|
|
|
|
|
year = {2010},
|
|
|
|
|
pages = {518-533}
|
|
|
|
|
}
|
|
|
|
|
@article{rajasegarar2008,
|
|
|
|
|
author = {Sutharshan Rajasegarar and Christopher Leckie and Marimuthu Palaniswam},
|
|
|
|
|
title = {Anomaly detection in wireless sensor networks},
|
|
|
|
|
journal = {IEEE Wireless Communications},
|
|
|
|
|
volume = {},
|
|
|
|
|
number = {},
|
|
|
|
|
year = {2008}
|
|
|
|
|
}
|
|
|
|
|
@article{wang2006,
|
|
|
|
|
author = {Defeng Wang and Daniel S. Yeung and Eric C.C. Tsang},
|
|
|
|
|
journal = {IEEE transactions on systems, man, and cybernetics - Part B: cybernetics},
|
|
|
|
|
title = {Structured One-Class Classification},
|
|
|
|
|
volume = {36},
|
|
|
|
|
number = {6},
|
|
|
|
|
year = {2006},
|
|
|
|
|
pages = {1283-1295}
|
|
|
|
|
}
|
|
|
|
|
@article{laskov2004,
|
|
|
|
|
author = {P. Laskov and C. Schäfer and I. Kotenko and K.-R. Müller},
|
|
|
|
|
title = {Intrusion Detection in Unlabeled Data with Quarter-sphere Support Vector Machines},
|
|
|
|
|
journal = {Proc. Detectionof Intrusions and Malware \& Vulnerability Assessment},
|
|
|
|
|
volume = {27},
|
|
|
|
|
number = {4},
|
|
|
|
|
year = {2006},
|
|
|
|
|
pages = {228-236}
|
|
|
|
|
}
|
|
|
|
|
@article{shahid2012a,
|
|
|
|
|
author = {Nauman Shahid and Ijaz Haider Naqvi and Saad Bin Qaisar},
|
|
|
|
|
title = {Quarter-Sphere SVM: Attribute andSpatio-Temporal Correlations based Outlier \& Event Detection in Wireless Sensor Networks},
|
|
|
|
|
journal = {IEEE Wireless Communications and Networking Conference: Mobile and Wireless Networks},
|
|
|
|
|
year = {2012},
|
|
|
|
|
doi = {10.1109/WCNC.2012.6214127}
|
|
|
|
|
}
|
|
|
|
|
@article{shahid2012b,
|
|
|
|
|
author = {Nauman Shahid and Ijaz Haider Naqvi and Saad Bin Qaisar},
|
|
|
|
|
title = {Real Time Energy Efficient Approach to Outlier \& Event Detection in Wireless Sensor Networks},
|
|
|
|
|
journal = {IEEE International Conference on Communication Systems (ICCS)},
|
|
|
|
|
year = {2012},
|
|
|
|
|
doi = {10.1109/ICCS.2012.6406130}
|
|
|
|
|
}
|
|
|
|
|
@article{ali2015,
|
|
|
|
|
author = {K. Ali and T. Anwaro and I. H. Naqvi and M. H. Jafry},
|
|
|
|
|
title = {Composite Event Detection and Identification for WSNs using General Hebbian Algorithm},
|
|
|
|
|
journal = {IEEE ICC 2015 - Ad-hoc and Sensor Networking Symposium},
|
|
|
|
|
year = {2015}
|
|
|
|
|
}
|
|
|
|
|
@article{mcdonald2013,
|
|
|
|
|
author = {Dylan McDonald and Stewart Sanchez and Sanjay Madria and Fikret Ercal},
|
|
|
|
|
title = {A Survey of Methods for Finding Outliers in Wireless Sensor Networks},
|
|
|
|
|
journal = {Journal of Network and Systems Management},
|
|
|
|
|
volume = {23},
|
|
|
|
|
year = {2015},
|
|
|
|
|
pages = {153-182}
|
|
|
|
|
}
|
|
|
|
|
@article{sheng2007,
|
|
|
|
|
author = {Bo Sheng and Qun Li and Weizhen Mao and Wen Jin},
|
|
|
|
|
title = {Outlier Detection in Sensor Networks},
|
|
|
|
|
journal = {MobiHoc '07: Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing},
|
|
|
|
|
year = {2007},
|
|
|
|
|
doi = {10.1145/1288107.1288137}
|
|
|
|
|
}
|
|
|
|
|
@article{böhm2008,
|
|
|
|
|
author = {Christian Böhm and Christos Faloutsos and Claudia Plant},
|
|
|
|
|
title = {Outlier-robust Clustering using Independent Components},
|
|
|
|
|
journal = {SIGMOD '08: Proceedings of the 2008 ACM SIGMOD international conference on Management of data},
|
|
|
|
|
year = {2008},
|
|
|
|
|
doi = {10.1145/1376616.1376638}
|
|
|
|
|
}
|
|
|
|
|
@article{papadimitriou2003,
|
|
|
|
|
author = {Spiros Papadimitriou and Hiroyuki Kitagawa and Phillip B. Gibbons and Christos Faloutsos},
|
|
|
|
|
title = {LOCI: Fast Outlier DetectionUsing the Local Correlation Integral},
|
|
|
|
|
journal = {Proceedings 19th International Conference on Data Engineering},
|
|
|
|
|
year = {March 2003},
|
|
|
|
|
doi = {10.1109/ICDE.2003.1260802}
|
|
|
|
|
}
|
|
|
|
|
@article{breuning2000,
|
|
|
|
|
author = {Markus M. Breunig and Hans-Peter Kriegel and Raymond T. Ng and Jörg Sander},
|
|
|
|
|
title = {LOF: Identifying Density-Based Local Outliers},
|
|
|
|
|
journal = {Proc. ACM SIGMOD 2000 Int. Conf. On Management of Data},
|
|
|
|
|
year = {2000}
|
|
|
|
|
}
|
|
|
|
|
@article{oreilly2014,
|
|
|
|
|
author = {Colin O'Reilly and Alexander Gluhak and Muhammad Ali Imran and Sutharshan Rajasegarar},
|
|
|
|
|
title = {Anomaly Detection in Wireless Sensor Networks in a Non-Stationary Environment},
|
|
|
|
|
journal = {IEEE Communications Surveys \& Tutorials},
|
|
|
|
|
volume = {16},
|
|
|
|
|
number = {3},
|
|
|
|
|
year = {2014},
|
|
|
|
|
pages = {1413 - 1432},
|
|
|
|
|
doi = {10.1109/SURV.2013.112813.00168}
|
|
|
|
|
}
|
|
|
|
|
@article{oreilly2016,
|
|
|
|
|
author = {Colin O’Reilly and Alexander Gluhak and Muhammad Ali Imran},
|
|
|
|
|
title = {Distributed Anomaly Detection using Minimum Volume Elliptical Principal Component Analysis},
|
|
|
|
|
journal = {IEEE Transactions on Knowledge and Data Engineering},
|
|
|
|
|
volume = {28},
|
|
|
|
|
number = {9},
|
|
|
|
|
year = {2016},
|
|
|
|
|
doi = {10.1109/TKDE.2016.2555804}
|
|
|
|
|
}
|
|
|
|
|
@article{shilton2020,
|
|
|
|
|
author = {Alistair Shilton and Sutharshan Rajasegarar and Marimuthu Palaniswami},
|
|
|
|
|
title = {Multiclass Anomaly Detector: the CS++ Support VectorMachine},
|
|
|
|
|
journal = {Journal of Machine Learning Research},
|
|
|
|
|
volume = {21},
|
|
|
|
|
number = {213},
|
|
|
|
|
year = {2020},
|
|
|
|
|
pages = {1-39}
|
|
|
|
|
}
|