You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
surv-anom-det-wsn/References.bib

136 lines
6.2 KiB
BibTeX

This file contains ambiguous Unicode characters!

This file contains ambiguous Unicode characters that may be confused with others in your current locale. If your use case is intentional and legitimate, you can safely ignore this warning. Use the Escape button to highlight these characters.

@article{chandola2009,
author = {Chandola V. and Banerjee A. and Kumar V.},
title = {Anomaly Detection: A Survey},
journal = {ACM Comput. Surv.},
pages = {1-58},
number = {41(3)},
year = {2009},
doi = {10.1145/1541880.1541882}
}
@article{bosman2017,
author = {Hedde HWJ Bosman and Giovanni Iacca and Arturo Tejada and Heinrich J Wörtche and Antonio Liotta},
title = {Spatiala nomaly detection in sensor networks using neighborhood information},
journal = {Information Fusion},
pages = {41-56},
volume = {33},
year = {2017},
doi = {10.1016/j.inffus.2016.04.007}
}
@article{rajasegarar2010,
author = {Sutharshan Rajasegarar and Christopher Leckie and James C. Bezdek and Marimuthu Palaniswami},
journal = {IEEE transactions on information forensics and security},
number = {3},
volume = {4},
title = {Centered Hyperspherical and HyperellipsoidalOne-Class Support Vector Machines for AnomalyDetection in Sensor Networks},
year = {2010},
pages = {518-533}
}
@article{rajasegarar2008,
author = {Sutharshan Rajasegarar and Christopher Leckie and Marimuthu Palaniswam},
title = {Anomaly detection in wireless sensor networks},
journal = {IEEE Wireless Communications},
volume = {},
number = {},
year = {2008}
}
@article{wang2006,
author = {Defeng Wang and Daniel S. Yeung and Eric C.C. Tsang},
journal = {IEEE transactions on systems, man, and cybernetics - Part B: cybernetics},
title = {Structured One-Class Classification},
volume = {36},
number = {6},
year = {2006},
pages = {1283-1295}
}
@article{laskov2004,
author = {P. Laskov and C. Schäfer and I. Kotenko and K.-R. Müller},
title = {Intrusion Detection in Unlabeled Data with Quarter-sphere Support Vector Machines},
journal = {Proc. Detectionof Intrusions and Malware \& Vulnerability Assessment},
volume = {27},
number = {4},
year = {2006},
pages = {228-236}
}
@article{shahid2012a,
author = {Nauman Shahid and Ijaz Haider Naqvi and Saad Bin Qaisar},
title = {Quarter-Sphere SVM: Attribute andSpatio-Temporal Correlations based Outlier \& Event Detection in Wireless Sensor Networks},
journal = {IEEE Wireless Communications and Networking Conference: Mobile and Wireless Networks},
year = {2012},
doi = {10.1109/WCNC.2012.6214127}
}
@article{shahid2012b,
author = {Nauman Shahid and Ijaz Haider Naqvi and Saad Bin Qaisar},
title = {Real Time Energy Efficient Approach to Outlier \& Event Detection in Wireless Sensor Networks},
journal = {IEEE International Conference on Communication Systems (ICCS)},
year = {2012},
doi = {10.1109/ICCS.2012.6406130}
}
@article{ali2015,
author = {K. Ali and T. Anwaro and I. H. Naqvi and M. H. Jafry},
title = {Composite Event Detection and Identification for WSNs using General Hebbian Algorithm},
journal = {IEEE ICC 2015 - Ad-hoc and Sensor Networking Symposium},
year = {2015}
}
@article{mcdonald2013,
author = {Dylan McDonald and Stewart Sanchez and Sanjay Madria and Fikret Ercal},
title = {A Survey of Methods for Finding Outliers in Wireless Sensor Networks},
journal = {Journal of Network and Systems Management},
volume = {23},
year = {2015},
pages = {153-182}
}
@article{sheng2007,
author = {Bo Sheng and Qun Li and Weizhen Mao and Wen Jin},
title = {Outlier Detection in Sensor Networks},
journal = {MobiHoc '07: Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing},
year = {2007},
doi = {10.1145/1288107.1288137}
}
@article{böhm2008,
author = {Christian Böhm and Christos Faloutsos and Claudia Plant},
title = {Outlier-robust Clustering using Independent Components},
journal = {SIGMOD '08: Proceedings of the 2008 ACM SIGMOD international conference on Management of data},
year = {2008},
doi = {10.1145/1376616.1376638}
}
@article{papadimitriou2003,
author = {Spiros Papadimitriou and Hiroyuki Kitagawa and Phillip B. Gibbons and Christos Faloutsos},
title = {LOCI: Fast Outlier DetectionUsing the Local Correlation Integral},
journal = {Proceedings 19th International Conference on Data Engineering},
year = {March 2003},
doi = {10.1109/ICDE.2003.1260802}
}
@article{breuning2000,
author = {Markus M. Breunig and Hans-Peter Kriegel and Raymond T. Ng and Jörg Sander},
title = {LOF: Identifying Density-Based Local Outliers},
journal = {Proc. ACM SIGMOD 2000 Int. Conf. On Management of Data},
year = {2000}
}
@article{oreilly2014,
author = {Colin O'Reilly and Alexander Gluhak and Muhammad Ali Imran and Sutharshan Rajasegarar},
title = {Anomaly Detection in Wireless Sensor Networks in a Non-Stationary Environment},
journal = {IEEE Communications Surveys \& Tutorials},
volume = {16},
number = {3},
year = {2014},
pages = {1413 - 1432},
doi = {10.1109/SURV.2013.112813.00168}
}
@article{oreilly2016,
author = {Colin OReilly and Alexander Gluhak and Muhammad Ali Imran},
title = {Distributed Anomaly Detection using Minimum Volume Elliptical Principal Component Analysis},
journal = {IEEE Transactions on Knowledge and Data Engineering},
volume = {28},
number = {9},
year = {2016},
doi = {10.1109/TKDE.2016.2555804}
}
@article{shilton2020,
author = {Alistair Shilton and Sutharshan Rajasegarar and Marimuthu Palaniswami},
title = {Multiclass Anomaly Detector: the CS++ Support VectorMachine},
journal = {Journal of Machine Learning Research},
volume = {21},
number = {213},
year = {2020},
pages = {1-39}
}