{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:37:46Z","timestamp":1725809866035},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,1,10]],"date-time":"2019-01-10T00:00:00Z","timestamp":1547078400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1007\/s12652-019-01194-5","type":"journal-article","created":{"date-parts":[[2019,1,10]],"date-time":"2019-01-10T11:35:14Z","timestamp":1547120114000},"page":"1511-1530","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Contextual outlier detection for wireless sensor networks"],"prefix":"10.1007","volume":"11","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-3135-6339","authenticated-orcid":false,"given":"Sourabh","family":"Bharti","sequence":"first","affiliation":[]},{"given":"K. K.","family":"Pattanaik","sequence":"additional","affiliation":[]},{"given":"Anshul","family":"Pandey","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,10]]},"reference":[{"key":"1194_CR1","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1016\/j.comnet.2017.10.007","volume":"129","author":"A Ayadi","year":"2017","unstructured":"Ayadi A, Ghorbel O, Obeida AM, Abid M (2017) Outlier detection approaches for wireless sensor networks: A survey. Comput Netw 129:319\u2013333","journal-title":"Comput Netw"},{"issue":"1","key":"1194_CR2","doi-asserted-by":"publisher","first-page":"1503","DOI":"10.1007\/s11277-017-4583-7","volume":"97","author":"A Abid","year":"2017","unstructured":"Abid A, Masmoudi A, Kachouri A, Mahfoudhi A (2017) Outlier detection in wireless sensor networks based on OPTICS method for events and errors identification. Wirel Pers Commun 97(1):1503\u20131515","journal-title":"Wirel Pers Commun"},{"issue":"3","key":"1194_CR3","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1109\/TSMC.2016.2608419","volume":"48","author":"G Boracchi","year":"2018","unstructured":"Boracchi G, Michaelides M, Roveri M (2018) A cognitive monitoring system for detecting and isolating contaminants and faults in intelligent buildings. IEEE Trans Syst Man Cybern Syst. 48(3):433\u2013447","journal-title":"IEEE Trans Syst Man Cybern Syst."},{"key":"1194_CR4","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.inffus.2016.04.007","volume":"33","author":"HH Bosman","year":"2017","unstructured":"Bosman HH et al (2017) Spatial anomaly detection in sensor networks using neighbourhood information. Infor Fusion 33:41\u201356","journal-title":"Infor Fusion"},{"issue":"4","key":"1194_CR5","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1109\/TDSC.2015.2469655","volume":"14","author":"Z Bhuiyan","year":"2017","unstructured":"Bhuiyan Z et al (2017) Dependable structural health monitoring using wireless sensor networks. IEEE Trans Dependable Secur Comput 14(4):363\u2013376","journal-title":"IEEE Trans Dependable Secur Comput"},{"issue":"13","key":"1194_CR6","doi-asserted-by":"publisher","first-page":"2015","DOI":"10.1002\/dac.3155","volume":"29","author":"S Bharti","year":"2016","unstructured":"Bharti S, Pattanaik KK (2016) Gravitational outlier detection for wireless sensor networks. Int J Commun Syst 29(13):2015\u20132027","journal-title":"Int J Commun Syst"},{"issue":"1","key":"1194_CR7","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/s10115-011-0474-5","volume":"34","author":"J Branch","year":"2013","unstructured":"Branch J, Giannella C, Szymanski B, Wolff R, Kargupta H (2013) In-network outlier detection in wireless sensor networks. Knowl Infor Syst 34(1):23\u201354","journal-title":"Knowl Infor Syst"},{"issue":"4","key":"1194_CR8","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/2489253.2489265","volume":"9","author":"C Bisdikian","year":"2013","unstructured":"Bisdikian C, Kaplan LM, Srivastava MB (2013) On the quality and value of information in sensor networks. ACM Trans Sens Netw 9(4):48","journal-title":"ACM Trans Sens Netw"},{"key":"#cr-split#-1194_CR9.1","unstructured":"Burdakis S, Deligiannakis A (2012) Detecting outlier"},{"key":"#cr-split#-1194_CR9.2","unstructured":"(s) in sensor networks using the geometric approach. In: IEEE 28th international conference on data engineering, April 1-5 2012, pp 1108-1119"},{"key":"1194_CR10","doi-asserted-by":"crossref","unstructured":"Deligiannakis A et al. (2009) Another outlier bites the dust: computing meaningful aggregates in sensor networks. In: IEEE 25th international conference on data engineering, March 29-April 04 2009, pp 988\u2013999","DOI":"10.1109\/ICDE.2009.100"},{"issue":"4","key":"1194_CR11","doi-asserted-by":"publisher","first-page":"1197","DOI":"10.1007\/s12652-018-0685-7","volume":"9","author":"S Fong","year":"2018","unstructured":"Fong S et al (2018) Predicting unusual energy consumption events from smart home sensor network by data stream mining with misclassified recall. J Ambient Intell Human Comput 9(4):1197\u20131221","journal-title":"J Ambient Intell Human Comput"},{"key":"1194_CR12","unstructured":"Flouri K, Lozano B, Tsakalides P (2008) Distributed consensus algorithms for SVM training in wireless sensor networks. In: 16th European conference on signal processing, August 25-29 2008"},{"key":"1194_CR13","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.eij.2013.06.001","volume":"14","author":"A Fawzy","year":"2013","unstructured":"Fawzy A, Mokhtar H, Hegazy O (2013) outlier(s) detection and classification in wireless sensor networks. Egypt Infor J 14:157\u2013164","journal-title":"Egypt Infor J"},{"key":"1194_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.04.046","author":"N Giatrakos","year":"2018","unstructured":"Giatrakos N et\u00a0al (2018) Omnibus outlier detection in sensor networks using windowed locality sensitive hashing. Future Gener Computer Syst. \nhttps:\/\/doi.org\/10.1016\/j.future.2018.04.046","journal-title":"Future Gener Computer Syst"},{"issue":"10","key":"1194_CR15","doi-asserted-by":"publisher","first-page":"3816","DOI":"10.1109\/JSEN.2013.2266895","volume":"13","author":"EI Gaura","year":"2014","unstructured":"Gaura EI et al (2014) Edge mining the internet of things. IEEE Sens J 13(10):3816\u20133825","journal-title":"IEEE Sens J"},{"issue":"4","key":"1194_CR16","doi-asserted-by":"publisher","first-page":"1589","DOI":"10.1109\/TCST.2013.2288519","volume":"22","author":"P Gil","year":"2014","unstructured":"Gil P, Santos A, Cardoso A (2014) Dealing with outlier(s) in wireless sensor networks: an oil refinery application. IEEE Trans Control Syst Technol 22(4):1589\u20131596","journal-title":"IEEE Trans Control Syst Technol"},{"issue":"8","key":"1194_CR17","doi-asserted-by":"publisher","first-page":"1285","DOI":"10.1016\/j.is.2011.08.005","volume":"38","author":"N Giatrakos","year":"2013","unstructured":"Giatrakos N et al (2013) In-network approximate computation of outlier(s) with quality guarantees. Inf Syst 38(8):1285\u20131308","journal-title":"Inf Syst"},{"key":"#cr-split#-1194_CR18.1","doi-asserted-by":"crossref","unstructured":"Giatrakos N et\u00a0al. (2010) Taco: tnable approximate computation of outlier","DOI":"10.1145\/1807167.1807199"},{"key":"#cr-split#-1194_CR18.2","unstructured":"(s) in wireless sensor networks. In: Proceedings of the 2010 ACM SIGMOD international conference on management of data, June 6-11 2010, pp 279-290"},{"issue":"1","key":"1194_CR19","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.adhoc.2004.04.007","volume":"4","author":"Q Gao","year":"2006","unstructured":"Gao Q et al (2006) Radio range adjustment for energy efficient wireless sensor networks. Ad-hoc Netw 4(1):75\u201382","journal-title":"Ad-hoc Netw"},{"key":"1194_CR20","unstructured":"Intel Lab Data (2014). \nhttp:\/\/db.csail.mit.edu\/labdata\/data.txt.gz\n\n. Accessed on 14 November 2014"},{"key":"1194_CR21","doi-asserted-by":"crossref","unstructured":"Liu N, Shin D, Hu X (2018) Contextual outlier interpretation. \narXiv:1711.10589\n\n. Accessed on 16 April 2018","DOI":"10.24963\/ijcai.2018\/341"},{"key":"1194_CR22","doi-asserted-by":"crossref","unstructured":"LeBlanc HL, Zhang H, Sundaram S, Koutsoukos X (2012) Consensus of multi-agent networks in the presence of adversaries using only local information. Proceedings of the 1st international conference on High Confidence Networked Systems, April 17-18 2012, pp 1-10","DOI":"10.1145\/2185505.2185507"},{"issue":"3","key":"1194_CR23","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/s12652-010-0043-x","volume":"3","author":"A Lotfi","year":"2012","unstructured":"Lotfi A et al (2012) Smart homes for the elderly dementia sufferers: identification and prediction of abnormal behaviour. J Ambient Intell Human Comput 3(3):205\u2013218","journal-title":"J Ambient Intell Human Comput"},{"key":"1194_CR24","doi-asserted-by":"publisher","first-page":"900","DOI":"10.1109\/LCOMM.2010.081910.101093","volume":"14","author":"S Lee","year":"2010","unstructured":"Lee S, Lee H (2010) Analysis of network lifetime in cluster-based sensor networks. IEEE Commun Lett 14:900\u2013902","journal-title":"IEEE Commun Lett"},{"key":"1194_CR25","unstructured":"Liang J, Parthasarathy S (2006) Robust contextual outlier detection: where context meets sparsity. \nhttps:\/\/arxiv.org\/pdf\/1607.08329.pdf\n\n. Accessed on 23 March 2018"},{"key":"1194_CR26","unstructured":"Morley T, Oram A (2016) The elements of anomaly detection in the internet of things. O\u2019Reilly publishing. \nhttps:\/\/www.oreilly.com\n\n\/ideas\/the-elements-ofanomaly-detection-in-the-internet-of-things. Accessed on 23 March 2018"},{"issue":"6","key":"1194_CR27","doi-asserted-by":"publisher","first-page":"29","DOI":"10.5121\/ijwmn.2011.3603","volume":"3","author":"HT Malazil","year":"2011","unstructured":"Malazil HT, Zamanifar K, Dulman S (2011) FED: fuzzy event detection model for wireless sensor networks. Int J Wirel Mob Netw 3(6):29\u201345","journal-title":"Int J Wirel Mob Netw"},{"key":"1194_CR28","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1016\/j.future.2017.11.021","volume":"82","author":"N Nesa","year":"2018","unstructured":"Nesa N, Ghosh T, Banerjee I (2018) Non-parametric sequence-based learning approach for outlier detection in IoT. Future Gener Comput Syst 82:412\u2013421","journal-title":"Future Gener Comput Syst"},{"issue":"3","key":"1194_CR29","doi-asserted-by":"publisher","first-page":"1413","DOI":"10.1109\/SURV.2013.112813.00168","volume":"16","author":"C O\u2019Reilly","year":"2014","unstructured":"O\u2019Reilly C, Gluhak A, Imran MA, Rajasegarar S (2014) Anomaly detection in wireless sensor networks in a non-stationary environment. IEEE Commun Surv Tutor 16(3):1413\u20131432","journal-title":"IEEE Commun Surv Tutor"},{"issue":"5","key":"1194_CR30","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1109\/TCYB.2014.2338611","volume":"45","author":"A Paola","year":"2015","unstructured":"Paola A, Gaglio S (2015) Adaptive distributed outlier detection for WSNs. IEEE Trans Cybern 45(5):888\u2013899","journal-title":"IEEE Trans Cybern"},{"issue":"1","key":"1194_CR31","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1109\/SURV.2013.042313.00197","volume":"16","author":"C Perera","year":"2014","unstructured":"Perera C, Zaslavsky A, Christen P, Georgakopoulos D (2014) Context aware computing for the internet of things : a survey. IEEE Commun Surv Tutor 16(1):414\u2013454","journal-title":"IEEE Commun Surv Tutor"},{"key":"1194_CR32","unstructured":"Page L (2001) Method for node ranking in a linked database. US6285999 B1: 285-999"},{"key":"1194_CR33","doi-asserted-by":"crossref","unstructured":"Rajasegarar S, Leckie C, Palaniswami M, Bezdek J (2006) Distributed anomaly detection in wireless sensor networks. In: 10th IEEE Singapore international conference on communication systems, October 30-November 1 2006","DOI":"10.1109\/ICCS.2006.301508"},{"key":"1194_CR34","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09823-4","volume-title":"Data mining and knowledge discovery handbook","author":"L Rokach","year":"2005","unstructured":"Rokach L, Maimon O (2005) Data mining and knowledge discovery handbook. Springer, Boston, MA. \nhttps:\/\/doi.org\/10.1007\/978-0-387-09823-4\n\n. ISBN 978-0-387-09822-7, e-ISBN 978-0-387-09823-4"},{"key":"1194_CR35","doi-asserted-by":"crossref","unstructured":"Radivojac P, Korad U, Sivalingam KM, Obradovic Z (2003) Learning from class-imbalanced data in wireless sensor networks. In: Proceedings of the IEEE 58th vehicular technology conference, October 6-9 2003, pp 3030-3034","DOI":"10.1109\/VETECF.2003.1286180"},{"key":"1194_CR36","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1049\/iet-wss.2012.0094","volume":"3","author":"R Shakya","year":"2013","unstructured":"Shakya R, Singh Y, Verma N (2013) Generic correlation model for wireless sensor network applications. Wirel Sens Syst 3:266\u2013276","journal-title":"Wirel Sens Syst"},{"key":"1194_CR37","doi-asserted-by":"crossref","unstructured":"Shahid N, Naqvi IH, Qaisar SB (2012) Real time energy efficient approach to outlier & event detection in wireless sensor networks. In: Proceedings of international conference on communication systems, November 21-23 2012, pp 162-166","DOI":"10.1109\/ICCS.2012.6406130"},{"key":"1194_CR38","doi-asserted-by":"crossref","unstructured":"Sheng B, Li Q, Mao W, Jin W (2007) Outlier detection in sensor networks. In: Proceedings of the 8th ACM international symposium on mobile ad Hoc networking and computing, 9-14 September 2007, pp 219\u2013228","DOI":"10.1145\/1288107.1288137"},{"key":"1194_CR39","volume-title":"Statistical Method from the viewpoint of quality control","author":"WA Shewhart","year":"2005","unstructured":"Shewhart WA (1939) Statistical Method from the viewpoint of quality control. The Graduate School, Department of Agriculture, Washington, D.C., 1939 edition","edition":"1939 edition"},{"issue":"1","key":"1194_CR40","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s12652-014-0246-7","volume":"6","author":"KBY Wong","year":"2015","unstructured":"Wong KBY, Zhang T, Aghajan H (2015) Extracting patterns of behaviour from a network of binary sensors. J Ambient Intell Human Comput. 6(1):83\u2013105","journal-title":"J Ambient Intell Human Comput."},{"key":"1194_CR41","doi-asserted-by":"publisher","first-page":"1089","DOI":"10.1109\/JSEN.2013.2293093","volume":"14","author":"F Yuan","year":"2014","unstructured":"Yuan F, Zhan Y, Wang Y (2014) Data density correlation degree clustering method for data aggregation in WSN. IEEE Sens J 14:1089\u20131098","journal-title":"IEEE Sens J"},{"issue":"8","key":"1194_CR42","doi-asserted-by":"publisher","first-page":"1373","DOI":"10.1080\/13658816.2012.654493","volume":"26","author":"Y Zang","year":"2012","unstructured":"Zang Y, Hamm N, Meratnia N, Stein A, Voort M, Havinga P (2012) Statistics-based outlier detection for wireless sensor networks. Int J Geographical Inf Sci 26(8):1373\u20131392","journal-title":"Int J Geographical Inf Sci"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-019-01194-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-019-01194-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-019-01194-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,21]],"date-time":"2020-03-21T05:10:45Z","timestamp":1584767445000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-019-01194-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,10]]},"references-count":44,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["1194"],"URL":"https:\/\/doi.org\/10.1007\/s12652-019-01194-5","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,10]]},"assertion":[{"value":"23 May 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 January 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 January 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}