{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T17:53:33Z","timestamp":1772301213253,"version":"3.50.1"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030308582","type":"print"},{"value":"9783030308599","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-30859-9_17","type":"book-chapter","created":{"date-parts":[[2019,9,11]],"date-time":"2019-09-11T08:03:26Z","timestamp":1568189006000},"page":"196-207","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Network Anomaly Detection in Wireless Sensor Networks: A Review"],"prefix":"10.1007","author":[{"given":"Rony Franca","family":"Lepp\u00e4nen","sequence":"first","affiliation":[]},{"given":"Timo","family":"H\u00e4m\u00e4l\u00e4inen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,12]]},"reference":[{"issue":"1","key":"17_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11227-013-1021-9","volume":"68","author":"P Rawat","year":"2014","unstructured":"Rawat, P., Singh, K.D., Chaouchi, H., Bonnin, J.M.: Wireless sensor networks: a survey on recent developments and potential synergies. J. Supercomput. 68(1), 1\u201348 (2014)","journal-title":"J. Supercomput."},{"issue":"1","key":"17_CR2","doi-asserted-by":"publisher","first-page":"1302","DOI":"10.1016\/j.jnca.2011.03.004","volume":"34","author":"M Xie","year":"2011","unstructured":"Xie, M., Han, S., Tian, B., Parvin, S.: Anomaly detection in wireless sensor networks: a survey. J. Netw. Comput. Appl. 34(1), 1302\u20131325 (2011)","journal-title":"J. Netw. Comput. Appl."},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Dargie, W., Poellabauer, C.: Fundamentals of Wireless Sensor Networks - Theory and Practice. Wiley Series on Wireless Communications and Mobile Computing (2010)","DOI":"10.1002\/9780470666388"},{"issue":"9","key":"17_CR4","doi-asserted-by":"publisher","first-page":"1727","DOI":"10.1109\/JPROC.2016.2558521","volume":"104","author":"Y Zou","year":"2016","unstructured":"Zou, Y., Zhu, J., Wang, X., Hanzo, L.: A survey on wireless security: technical challenges, recent advances, and future trends. Proc. IEEE 104(9), 1727\u20131765 (2016). \n                      https:\/\/doi.org\/10.1109\/JPROC.2016.2558521","journal-title":"Proc. IEEE"},{"issue":"6","key":"17_CR5","doi-asserted-by":"publisher","first-page":"1910","DOI":"10.1109\/JIOT.2017.2749883","volume":"4","author":"I Tomi\u0107","year":"2017","unstructured":"Tomi\u0107, I., McCann, J.: A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet Things J. 4(6), 1910\u20131923 (2017)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"17_CR6","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1109\/SURV.2013.050113.00191","volume":"16","author":"I Butun","year":"2014","unstructured":"Butun, I., Salvatore, D.M., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutorials 16(1), 266\u2013282 (2014). \n                      https:\/\/doi.org\/10.1109\/SURV.2013.050113.00191","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"1","key":"17_CR7","first-page":"1","volume":"49","author":"DP Kumar","year":"2019","unstructured":"Kumar, D.P., Amgoth, T., Annavarapu, C.S.R.: Machine learning algorithms for wireless sensor networks: a survey. Inf. Fusion 49(1), 1\u201325 (2019)","journal-title":"Inf. Fusion"},{"issue":"1","key":"17_CR8","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1016\/j.future.2018.01.059","volume":"83","author":"K Sha","year":"2018","unstructured":"Sha, K., Wei, W., Yang, T.A., Wang, Z., Shi, W.: On security challenges and open issues in internet of things. Future Gener. Comput. Syst. 83(1), 326\u2013337 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"17_CR9","unstructured":"CSA. \n                      https:\/\/downloads.cloudsecurityalliance.org\/whitepapers\/Security_Guidance_for_Early_Adopters_of_the_Internet_of_Things.pdf\n                      \n                    . Accessed 3 Mar 2019"},{"issue":"4","key":"17_CR10","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1109\/TETC.2016.2606384","volume":"5","author":"A Mosenia","year":"2017","unstructured":"Mosenia, A., Jha, N.K.: A comprehensive study of security of internet-of-things. IEEE Trans. Emerg. Top. Comput. 5(4), 586\u2013602 (2017)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"17_CR11","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1016\/j.procs.2012.06.052","volume":"10","author":"V Labatut","year":"2012","unstructured":"Labatut, V., Ozgovde, A.: Topological measures for the analysis of wireless sensor networks. Procedia Comput. Sci. 10, 397\u2013404 (2012). \n                      https:\/\/doi.org\/10.1016\/j.procs.2012.06.052","journal-title":"Procedia Comput. Sci."},{"issue":"3","key":"17_CR12","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1007\/s10618-014-0365-y","volume":"29","author":"L Akoglu","year":"2015","unstructured":"Akoglu, L., Tong, H., Koutra, D.: Graph based anomaly detection and description: a survey. Data Min. Knowl. Disc. 29(3), 626\u2013688 (2015)","journal-title":"Data Min. Knowl. Disc."},{"issue":"4","key":"17_CR13","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MWC.2008.4599219","volume":"15","author":"S Rajasegarar","year":"2008","unstructured":"Rajasegarar, S., Leckie, C., Palaniswami, M.: Anomaly detection in wireless sensor networks. IEEE Wirel. Commun. 15(4), 34\u201340 (2008)","journal-title":"IEEE Wirel. Commun."},{"issue":"4","key":"17_CR14","doi-asserted-by":"publisher","first-page":"042609","DOI":"10.1117\/1.JRS.11.042609","volume":"11","author":"JE Ball","year":"2017","unstructured":"Ball, J.E., Anderson, D.T., Chan, C.S.: A comprehensive survey of deep learning in remote sensing: theories, tools and challenges for the community. J. Appl. Remote Sens. 11(4), 042609 (2017). \n                      https:\/\/doi.org\/10.1117\/1.JRS.11.042609","journal-title":"J. Appl. Remote Sens."},{"issue":"1","key":"17_CR15","first-page":"11","volume":"234","author":"W Liu","year":"2017","unstructured":"Liu, W., Wang, Z., Liu, X., Zeng, N., Liu, Y., Alsaadi, F.E.: A survey of deep neural network architectures and their applications. Neurocomputing 234(1), 11\u201326 (2017)","journal-title":"Neurocomputing"},{"key":"17_CR16","unstructured":"Chalapathy, R., Chawla, S.: Deep Learning for Anomaly Detection: A Survey (2019). A preprint. \n                      https:\/\/arxiv.org\/abs\/1901.03407\n                      \n                    . Accessed 3 May 2019"},{"issue":"10","key":"17_CR17","doi-asserted-by":"publisher","first-page":"1701","DOI":"10.3390\/s16101701","volume":"16","author":"T Ma","year":"2016","unstructured":"Ma, T., Wang, F., Cheng, J., Yu, Y., Chen, X.: A hybrid spectral clustering and deep neural network ensemble algorithm for intrusion detection in sensor networks. Sensors (Basel) 16(10), 1701 (2016). \n                      https:\/\/doi.org\/10.3390\/s16101701","journal-title":"Sensors (Basel)"},{"issue":"1","key":"17_CR18","first-page":"1","volume":"41","author":"M Al-Hawawreh","year":"2018","unstructured":"Al-Hawawreh, M., Moustafa, N., Sitnikova, E.: Identification of malicious activities in industrial internet of things based on deep learning models. J. Inf. Secur. Appl. 41(1), 1\u201311 (2018)","journal-title":"J. Inf. Secur. Appl."},{"key":"17_CR19","doi-asserted-by":"publisher","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: Military Communications and Information Systems Conference (MilCIS) (2015). \n                      https:\/\/doi.org\/10.1109\/MilCIS.2015.7348942","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"17_CR20","doi-asserted-by":"publisher","unstructured":"Mirsky, Y., Doitshman, T., Elovici, Y., Shabtai, A.: Kitsune: an ensemble of autoencoders for online network intrusion detection. In: Network and Distributed Systems Security Symposium (NDSS) (2018). \n                      https:\/\/doi.org\/10.14722\/ndss.2018.23211","DOI":"10.14722\/ndss.2018.23211"},{"key":"17_CR21","unstructured":"Hamilton, W.L., Ying, R., Leskovec, J.: Representation Learning on Graphs: Methods and Applications (2018). \n                      https:\/\/arxiv.org\/abs\/1709.05584\n                      \n                    . Accessed 3 Mar 2019"},{"issue":"4","key":"17_CR22","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MSP.2017.2693418","volume":"34","author":"Michael M. Bronstein","year":"2017","unstructured":"Bronstein, M.M., Bruna, J., LeCun, Y., Szlam, A., Vandergheynst, P.: Geometric deep learning: going beyond Euclidean data. IEEE Signal Process. Mag. 34(4), 18\u201342. IEEE (2017). \n                      https:\/\/doi.org\/10.1109\/MSP.2017.2693418","journal-title":"IEEE Signal Processing Magazine"},{"key":"17_CR23","unstructured":"Xu, K., Wang, Z., Witbrock, M., Wu, L., Feng, Y., Sheinin, V.: Graph2Seq: Graph to Sequence Learning with Attention-based Neural Networks (2018). \n                      https:\/\/arxiv.org\/abs\/1804.00823\n                      \n                    . Accessed 3 May 2019"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Ding, K., Li, J., Bhanushali, R., Liu, H.: Deep anomaly detection in attributed networks. In: SIAM International Conference on Data Mining (2019)","DOI":"10.1137\/1.9781611975673.67"},{"key":"17_CR25","unstructured":"Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. In: Proceedings of the International Conference on Learning Representations (2017)"},{"key":"17_CR26","unstructured":"Wu, Z., Pan, S., Chen, F., Long, G., Zhang, C., Yu, P.S.: A Comprehensive Survey on Graph Neural Networks (2019). \n                      http:\/\/arxiv.org\/abs\/1901.00596\n                      \n                    . Accessed 4 May 2019"},{"key":"17_CR27","doi-asserted-by":"publisher","unstructured":"Monti, F., Otness, K., Bronstein, M.M.: MotifNet: a motif-based graph convolutional network for directed graphs. In: Data Science Workshop (DSW). IEEE (2018). \n                      https:\/\/doi.org\/10.1109\/DSW.2018.8439897","DOI":"10.1109\/DSW.2018.8439897"},{"key":"17_CR28","unstructured":"Wu, F., Fan, A., Baevski, A., Dauphin, Y.N., Auli, M.: Pay less attention with lightweight and dynamic convolutions (2019). \n                      https:\/\/arxiv.org\/abs\/1901.10430"},{"issue":"3","key":"17_CR29","doi-asserted-by":"publisher","first-page":"1413","DOI":"10.1109\/SURV.2013.112813.00168","volume":"16","author":"C O\u2019Reilly","year":"2014","unstructured":"O\u2019Reilly, C., Gluhak, A., Imran, M.A., Rajasegarar, S.: Anomaly detection in wireless sensor networks in a non-stationary environment. IEEE Commun. Surv. Tutorials 16(3), 1413\u20131432 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"17_CR30","unstructured":"Pareja, A., et al.: EvolveGCN: Evolving Graph Convolutional Networks for Dynamic Graphs (2019). \n                      https:\/\/arxiv.org\/abs\/1902.10191\n                      \n                    . Accessed 7 May 2019"},{"issue":"3","key":"17_CR31","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1002\/wics.1347","volume":"7","author":"Stephen Ranshous","year":"2015","unstructured":"Ranshous, S., Shen, S., Koutra, D., Harenberg, S., Faloutsos, C., Samatova, N.F.: Anomaly detection in dynamic networks: a survey. WIREs Comput. Stat. 7(3) (2015). \n                      https:\/\/doi.org\/10.1002\/wics.1347","journal-title":"Wiley Interdisciplinary Reviews: Computational Statistics"},{"key":"17_CR32","doi-asserted-by":"publisher","unstructured":"Ding, K., Li, J., Liu, H.: Interactive anomaly detection in attributed networks. In: Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining (WSDM 2019) (2019). \n                      https:\/\/doi.org\/10.1145\/3289600.3290964","DOI":"10.1145\/3289600.3290964"},{"key":"17_CR33","doi-asserted-by":"publisher","unstructured":"Eswaran, D., Guha, S., Mishra, N.: SpotLogiht: detecting anomalies in streaming graphs. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD 2018), pp. 1378\u20131386. ACM, New York (2018). \n                      https:\/\/doi.org\/10.1145\/3219819.3220040","DOI":"10.1145\/3219819.3220040"},{"key":"17_CR34","unstructured":"Miz, V., Ricaud, B., Benzi, K., Vandergheynst, P.: Anomaly detection in the dynamics of web and social networks. (2019). \n                      https:\/\/arxiv.org\/abs\/1901.09688"},{"key":"17_CR35","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-030-18590-9_19","volume-title":"Database Systems for Advanced Applications","author":"Luguo Xue","year":"2019","unstructured":"Xue, L., Luo, M., Peng, Z., Li, J., Chen, Y., Liu, J.: Anomaly detection in time-evolving attributed networks. In: Database Systems for Advanced Applications (2019). \n                      https:\/\/doi.org\/10.1007\/978-3-030-18590-9_19"},{"key":"17_CR36","doi-asserted-by":"publisher","unstructured":"Yu, W., Cheng, W., Aggarwal, C.C., Chang, K., Chen, H., Wang, W.: NetWalk: a flexible deep embedding approach for anomaly detection in dynamic networks. In: In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD 2018), pp. 2672\u20132681. ACM, New York (2018). \n                      https:\/\/doi.org\/10.1145\/3219819.3220024","DOI":"10.1145\/3219819.3220024"},{"issue":"1","key":"17_CR37","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.neucom.2017.04.070","volume":"262","author":"S Ahmad","year":"2017","unstructured":"Ahmad, S., Lavin, A., Purdy, S., Agha, Z.: Unsupervised real-time anomaly detection for streaming data. Neurocomputing 262(1), 134\u2013147 (2017)","journal-title":"Neurocomputing"},{"key":"17_CR38","unstructured":"Cimini, G., Squartini, T., Saracco, F., Garlaschelli, D., Gabrielli, A., Galdarelli, G.: The Statistical Physics of Real-World Networks (2018). \n                      https:\/\/arxiv.org\/abs\/1810.05095"},{"issue":"6","key":"17_CR39","doi-asserted-by":"publisher","first-page":"1055","DOI":"10.3390\/app9061055","volume":"9","author":"T Bodstr\u00f6m","year":"2019","unstructured":"Bodstr\u00f6m, T., H\u00e4m\u00e4l\u00e4inen, T.: A novel deep learning stack for APT detection. MDPI Appl. Sci. 9(6), 1055 (2019)","journal-title":"MDPI Appl. Sci."},{"key":"17_CR40","doi-asserted-by":"crossref","unstructured":"Diverak, A., Parekh, M., Savla, V., Mishra, R.: Benchmarking datasets for anomaly-based network intrusion detection: KDD CUP 99 alternatives. In: 3rd International Conference on Computing, Communication and Security (ICCCS), pp. 1\u20138. IEEE (2018)","DOI":"10.1109\/CCCS.2018.8586840"},{"key":"17_CR41","unstructured":"Ring, M., Wunderlich, S., Scheuring, D., Landes, D., Hotho, A.: A Survey of Network-based Intrusion Detection Data Sets (2019). \n                      https:\/\/arxiv.org\/abs\/1903.02460"},{"issue":"1","key":"17_CR42","first-page":"1","volume":"73","author":"G Montavon","year":"2018","unstructured":"Montavon, G., Samek, W., M\u00fcller, K.: Methods for interpreting and understanding deep neural networks. Digital Sig. Process. 73(1), 1\u201315 (2018)","journal-title":"Digital Sig. Process."},{"key":"17_CR43","doi-asserted-by":"publisher","unstructured":"Zhou, C., Paffenroth, R.C.: Anomaly detection with robust deep autoencoders. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2017), pp. 665\u2013674. ACM, New York (2018). \n                      https:\/\/doi.org\/10.1145\/3097983.3098052","DOI":"10.1145\/3097983.3098052"}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networks and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-30859-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,9]],"date-time":"2020-02-09T00:21:05Z","timestamp":1581207665000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-30859-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030308582","9783030308599"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-30859-9_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"12 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NEW2AN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Next Generation Wired\/Wireless Networking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"St. Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"new2an2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/rusmart.e-werest.org\/2019.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EDAS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"144","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}