[1]Zhang Y,Meratnia N,Havinga P J M.Outlier detection techniques for wireless sensor network:a survey[J].IEEE Communications Surveys& Tutorials,2010(12):159-170.
[2]Rajasegarar S,Leckie C,Palaniswami M,et al.Quarter sphere based distributed anomaly detection in wireless sensor networks[C].IEEE International Conference on Communications,2007.
[3]Elnahrawy E,Nath B.Context-aware sensors[J].EWSN,2004,29(20):7-93.
[4]Janakiram D,Adi Mallikarjuna Reddy V,Phani Kumar A V U.Outlier detection in wireless sensor networks using bayesian belief networks[C].Delhi,India:In Proceedings of the First International Conference on Communication System Software and Middleware(COMSWARE),2006(1):1-6.
[5]Chatzigiannakis V,Papavassiliou S,Grammatikou M,et al.Hierarchical anomaly detection in distributed large-scale sensor networks[C].11th IEEE Symposium on Computers and Communications,2006:761-767.
[6]Rajasegarar S,Bezdek J C,Leckie C,et al.Elliptical anomalies in wireless sensor networks[J].ACM Transactions on Network,2010(6):1-28.
[7]Miao X,Jiankun H,Song H,et al.Scalable hyper-grid k-NN-based online anomaly detection in wireless sensor networks[J].IEEE Transactions on Parallel Distribut System,2013(24):1661-1670.
[8]Moshtaghi M,Bezdek J C,Havens T C,et al.Streaming analysis in wireless sensor networks[J].Wireless Communication Mobile Computer,2012(6):763-771.
[9]Burbeck K,Nadjm-Tehrani S.Adaptive real-time anomaly detection with incremental clustering[R].Informations Secures Technology Report,2007(12):56-67.
[10]Moshtaghi M,Leckie C,Karunasekera S,et al.Incremental elliptical boundary estimation for anomaly detection in wireless sensor networks[C].Vancouver,BC,Canada:In Proceedings of the 11th IEEE International Conference on Data Mining (ICDM),2011(12):467-476.
[11]Hill D,Minsker B,Amir E.Real-time bayesian anomaly detection for environmental sensor data[C].Venice,Italy:In Proceedings of the Congress-International Association for Hydraulic Research(IAHR),2007. |