{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:10:07Z","timestamp":1766067007076},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242701"},{"type":"electronic","value":"9783030242718"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24271-8_56","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T19:19:24Z","timestamp":1563391164000},"page":"632-643","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Anomaly Detection in Wireless Sensor Networks Based on KNN"],"prefix":"10.1007","author":[{"given":"Lingren","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jingbing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Uzair Aslam","family":"Bhatti","sequence":"additional","affiliation":[]},{"given":"Yanlin","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"56_CR1","unstructured":"Branch, J., Szymanski, B., Giannella, C., et al.: In-network outlier detection in wireless sensor networks. In: Proceedings of the IEEE ICDCS, pp. 384\u2013391 (2006)"},{"key":"56_CR2","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/j.solener.2018.07.038","volume":"173","author":"SR Madeti","year":"2018","unstructured":"Madeti, S.R., Singh, S.N.: Modeling of PV system based on experimental data for fault detection using kNN method. J. Solar Energy 173, 139\u2013151 (2018)","journal-title":"J. Solar Energy"},{"key":"56_CR3","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1111\/jtsa.12145","volume":"37","author":"R Baragona","year":"2015","unstructured":"Baragona, R., Battaglia, F., Cucina, D.: Empirical likelihood for outlier detection and estimation in autoregressive time series. J. Time 37, 315\u2013336 (2015)","journal-title":"J. Time"},{"key":"56_CR4","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1016\/j.adhoc.2012.11.001","volume":"11","author":"Y Zhang","year":"2013","unstructured":"Zhang, Y., Meratnia, N., Havinga, P.J.M.: Distributed online outlier detection in wireless sensor networks using ellipsoidal support vector machine. Ad Hoc Netw. 11, 1062\u20131074 (2013)","journal-title":"Ad Hoc Netw."},{"key":"56_CR5","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1093\/comjnl\/bxy025","volume":"61","author":"J Cheng","year":"2018","unstructured":"Cheng, J., Zhou, J., Liu, Q., Tang, X., Guo, Y.: A DDoS detection method for socially aware networking based on forecasting fusion feature sequence. Comput. J. 61, 959\u2013970 (2018). \n                      https:\/\/doi.org\/10.1093\/comjnl\/bxy025","journal-title":"Comput. J."},{"key":"56_CR6","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.ins.2014.03.053","volume":"278","author":"X Zhang","year":"2014","unstructured":"Zhang, X., Liu, Y., Luo, B., Pan, L.: Computational power of tissue P systems for generating control languages. Inf. Sci. 278, 285\u2013297 (2014)","journal-title":"Inf. Sci."},{"issue":"1","key":"56_CR7","first-page":"095","volume":"55","author":"J Cheng","year":"2018","unstructured":"Cheng, J., Xu, R., Tang, X., Sheng, V.S., Cai, C.: An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment. Comput. Mater. Continua 55(1), 095\u2013119 (2018)","journal-title":"Comput. Mater. Continua"},{"key":"56_CR8","doi-asserted-by":"crossref","unstructured":"Zhang, G., Li, F.: Application of the KNN algorithm based on KD tree in intelligent transportation system. In: 2014 IEEE 5th International Conference on Software Engineering and Service Science (2014)","DOI":"10.1109\/ICSESS.2014.6933695"},{"key":"56_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-3994-4","volume-title":"Identification of Outliers","author":"D Hawkins","year":"1980","unstructured":"Hawkins, D.: Identification of Outliers. Chapman and Hall, London (1980)"},{"key":"56_CR10","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1186\/s13020-015-0058-5","volume":"10","author":"Y Guo","year":"2015","unstructured":"Guo, Y.: Centipeda minima (Ebushicao) extract inhibits PI3K-Akt-mTOR signaling in nasopharyngeal carcinoma CNE-1 cells. Chin. Med. 10, 26 (2015)","journal-title":"Chin. Med."},{"key":"56_CR11","unstructured":"Hu, X., Zhu, F.: Metadata web classifiers using KNN and porter. In: 2013 International Conference on Education and Educational Research (2013)"},{"key":"56_CR12","doi-asserted-by":"crossref","unstructured":"Wang, Q., Wang, S., Meng, Z.: Applying an intrusion detection algorithm to wireless sensor networks. In: Second International Workshop on Knowledge Discovery and Data Mining. IEEE Computer Society (2009)","DOI":"10.1109\/WKDD.2009.92"},{"key":"56_CR13","doi-asserted-by":"crossref","unstructured":"He, Z., Zhu, H., Yu, F.: A vehicle detection algorithm based on wireless magnetic sensor networks. In: 2014 4th IEEE International Conference on Information Science and Technology (2014)","DOI":"10.1109\/ICIST.2014.6920580"},{"key":"56_CR14","unstructured":"Wei, Z., Zhigang, L.: Network modeling and simulation based on QualNet. In: The 15th Information Theory Academic Annual Meeting of the Chinese Institute of Electronics and the 1st National Network Coding Academic Annual Meeting. National Defense Industry Press (2008)"},{"issue":"6","key":"56_CR15","doi-asserted-by":"publisher","first-page":"441","DOI":"10.7763\/IJIEE.2015.V5.575","volume":"5","author":"Arthi Balasundaram","year":"2015","unstructured":"Balasundaram, A., Rajesh, L., Bagan, K.B.: A study on fourth generation wireless network using QualNet simulator. In: SCIEI 2015 Paris Conference.th. Madras Institute of Technology, Anna University, Paris (2015)","journal-title":"International Journal of Information and Electronics Engineering"},{"key":"56_CR16","unstructured":"Liu, M., Qiao, H., Lan, J.: Research on communication network simulation based on QualNet. Electron. Des. Eng. (10), 33\u2013136 (2014)"},{"key":"56_CR17","unstructured":"Xu, C., Ni, S.Z., Shao, H.G.: Energy balanced self-adaptive intelligent water drops routing algorithm. In: Proceedings of the 2014 International Conference on Future Information Engineering and Manufacturing Science (2014)"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24271-8_56","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T19:40:36Z","timestamp":1563392436000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24271-8_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242701","9783030242718"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24271-8_56","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}