@article{chandola2009, author = {Chandola V. and Banerjee A. and Kumar V.}, title = {Anomaly Detection: A Survey}, journal = {ACM Comput. Surv.}, pages = {1-58}, number = {41(3)}, year = {2009}, doi = {10.1145/1541880.1541882} } @article{bosman2017, author = {Hedde HWJ Bosman and Giovanni Iacca and Arturo Tejada and Heinrich J Wörtche and Antonio Liotta}, title = {Spatiala nomaly detection in sensor networks using neighborhood information}, journal = {Information Fusion}, pages = {41-56}, volume = {33}, year = {2017}, doi = {10.1016/j.inffus.2016.04.007} } @article{rajasegarar2010, author = {Sutharshan Rajasegarar and Christopher Leckie and James C. Bezdek and Marimuthu Palaniswami}, journal = {IEEE transactions on information forensics and security}, number = {3}, volume = {4}, title = {Centered Hyperspherical and HyperellipsoidalOne-Class Support Vector Machines for AnomalyDetection in Sensor Networks}, year = {2010}, pages = {518-533} } @article{rajasegarar2008, author = {Sutharshan Rajasegarar and Christopher Leckie and Marimuthu Palaniswam}, title = {Anomaly detection in wireless sensor networks}, journal = {IEEE Wireless Communications}, volume = {}, number = {}, year = {2008} } @article{wang2006, author = {Defeng Wang and Daniel S. Yeung and Eric C.C. Tsang}, journal = {IEEE transactions on systems, man, and cybernetics - Part B: cybernetics}, title = {Structured One-Class Classification}, volume = {36}, number = {6}, year = {2006}, pages = {1283-1295} } @article{laskov2004, author = {P. Laskov and C. Schäfer and I. Kotenko and K.-R. Müller}, title = {Intrusion Detection in Unlabeled Data with Quarter-sphere Support Vector Machines}, journal = {Proc. Detectionof Intrusions and Malware \& Vulnerability Assessment}, volume = {27}, number = {4}, year = {2006}, pages = {228-236} } @article{shahid2012a, author = {Nauman Shahid and Ijaz Haider Naqvi and Saad Bin Qaisar}, title = {Quarter-Sphere SVM: Attribute andSpatio-Temporal Correlations based Outlier \& Event Detection in Wireless Sensor Networks}, journal = {IEEE Wireless Communications and Networking Conference: Mobile and Wireless Networks}, year = {2012}, doi = {10.1109/WCNC.2012.6214127} } @article{shahid2012b, author = {Nauman Shahid and Ijaz Haider Naqvi and Saad Bin Qaisar}, title = {Real Time Energy Efficient Approach to Outlier \& Event Detection in Wireless Sensor Networks}, journal = {IEEE International Conference on Communication Systems (ICCS)}, year = {2012}, doi = {10.1109/ICCS.2012.6406130} } @article{ali2015, author = {K. Ali and T. Anwaro and I. H. Naqvi and M. H. Jafry}, title = {Composite Event Detection and Identification for WSNs using General Hebbian Algorithm}, journal = {IEEE ICC 2015 - Ad-hoc and Sensor Networking Symposium}, year = {2015} } @article{mcdonald2013, author = {Dylan McDonald and Stewart Sanchez and Sanjay Madria and Fikret Ercal}, title = {A Survey of Methods for Finding Outliers in Wireless Sensor Networks}, journal = {Journal of Network and Systems Management}, volume = {23}, year = {2015}, pages = {153-182} } @article{sheng2007, author = {Bo Sheng and Qun Li and Weizhen Mao and Wen Jin}, title = {Outlier Detection in Sensor Networks}, journal = {MobiHoc '07: Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing}, year = {2007}, doi = {10.1145/1288107.1288137} } @article{böhm2008, author = {Christian Böhm and Christos Faloutsos and Claudia Plant}, title = {Outlier-robust Clustering using Independent Components}, journal = {SIGMOD '08: Proceedings of the 2008 ACM SIGMOD international conference on Management of data}, year = {2008}, doi = {10.1145/1376616.1376638} } @article{papadimitriou2003, author = {Spiros Papadimitriou and Hiroyuki Kitagawa and Phillip B. Gibbons and Christos Faloutsos}, title = {LOCI: Fast Outlier DetectionUsing the Local Correlation Integral}, journal = {Proceedings 19th International Conference on Data Engineering}, year = {March 2003}, doi = {10.1109/ICDE.2003.1260802} } @article{breuning2000, author = {Markus M. Breunig and Hans-Peter Kriegel and Raymond T. Ng and Jörg Sander}, title = {LOF: Identifying Density-Based Local Outliers}, journal = {Proc. ACM SIGMOD 2000 Int. Conf. On Management of Data}, year = {2000} } @article{oreilly2014, author = {Colin O'Reilly and Alexander Gluhak and Muhammad Ali Imran and Sutharshan Rajasegarar}, title = {Anomaly Detection in Wireless Sensor Networks in a Non-Stationary Environment}, journal = {IEEE Communications Surveys \& Tutorials}, volume = {16}, number = {3}, year = {2014}, pages = {1413 - 1432}, doi = {10.1109/SURV.2013.112813.00168} } @article{oreilly2016, author = {Colin O’Reilly and Alexander Gluhak and Muhammad Ali Imran}, title = {Distributed Anomaly Detection using Minimum Volume Elliptical Principal Component Analysis}, journal = {IEEE Transactions on Knowledge and Data Engineering}, volume = {28}, number = {9}, year = {2016}, doi = {10.1109/TKDE.2016.2555804} } @article{shilton2020, author = {Alistair Shilton and Sutharshan Rajasegarar and Marimuthu Palaniswami}, title = {Multiclass Anomaly Detector: the CS++ Support VectorMachine}, journal = {Journal of Machine Learning Research}, volume = {21}, number = {213}, year = {2020}, pages = {1-39} }