{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T17:52:53Z","timestamp":1766339573220,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030620974"},{"type":"electronic","value":"9783030620981"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-62098-1_4","type":"book-chapter","created":{"date-parts":[[2020,10,29]],"date-time":"2020-10-29T14:05:09Z","timestamp":1603980309000},"page":"42-55","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Time Series Anomaly Detection with Variational Autoencoder Using Mahalanobis Distance"],"prefix":"10.1007","author":[{"given":"Laze","family":"Gjorgiev","sequence":"first","affiliation":[]},{"given":"Sonja","family":"Gievska","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,30]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","unstructured":"Chandola V., Banerjee A., Kumar V.: Anomaly detection: a survey. ACM Comput. Surv. July 2009. Article No. 15. https:\/\/doi.org\/10.1145\/1541880.1541882","DOI":"10.1145\/1541880.1541882"},{"key":"4_CR2","doi-asserted-by":"publisher","unstructured":"Chapelle, O., Chi, M., Zien, A.: A continuation method for semi-supervised SVMs. In: Proceedings of the 23rd international conference on Machine learning (ICML \u201906), pp. 185\u2013192. Association for Computing Machinery, New York (2006). https:\/\/doi.org\/10.1145\/1143844.1143868","DOI":"10.1145\/1143844.1143868"},{"key":"4_CR3","doi-asserted-by":"publisher","unstructured":"Reif, M., Goldstein, M., Stahl, A., Breuel, T.: Anomaly detection by combining decision trees and parametric densities. In: 2008 19th International Conference on Pattern Recognition, Tampa, FL, pp. 1\u20134 (2008). https:\/\/doi.org\/10.1109\/ICPR.2008.4761796","DOI":"10.1109\/ICPR.2008.4761796"},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45, 5\u201332 (2001). https:\/\/doi.org\/10.1023\/A:1010933404324","journal-title":"Mach. Learn."},{"key":"4_CR5","doi-asserted-by":"publisher","unstructured":"Primartha R., Tama B. A.: Anomaly detection using random forest: a performance revisited. In: 2017 International Conference on Data and Software Engineering (ICoDSE) (2017). https:\/\/doi.org\/10.1109\/ICODSE.2017.8285847","DOI":"10.1109\/ICODSE.2017.8285847"},{"issue":"4","key":"4_CR6","doi-asserted-by":"publisher","first-page":"e0152173","DOI":"10.1371\/journal.pone.0152173","volume":"11","author":"M Goldstein","year":"2016","unstructured":"Goldstein, M., Uchida, S.: A comparative evaluation of unsupervised anomaly detection algorithms for multivariate data. PLoS One 11(4), e0152173 (2016)","journal-title":"PLoS One"},{"key":"4_CR7","doi-asserted-by":"publisher","unstructured":"Knorr, E.M., Ng, R.T.: Algorithms for mining distance-based outliers in large datasets. In Proceedings of VLDB 1998, pp. 392\u2013403 (1998). https:\/\/doi.org\/10.5555\/645924.671334","DOI":"10.5555\/645924.671334"},{"key":"4_CR8","doi-asserted-by":"publisher","unstructured":"Breunig, M.M., Kriegel, H.-P., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. In: Proceedings of SIGMOD 2000, pp. 93\u2013104 (2000). https:\/\/doi.org\/10.1145\/342009.335388","DOI":"10.1145\/342009.335388"},{"key":"4_CR9","doi-asserted-by":"publisher","unstructured":"Pham, N., Pagh, R.: A near-linear time approximation algorithm for angle-based outlier detection in high-dimensional data. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2012, August 2012, pp. 877\u2013885 (2012). https:\/\/doi.org\/10.1145\/2339530.2339669","DOI":"10.1145\/2339530.2339669"},{"key":"4_CR10","doi-asserted-by":"publisher","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.-H.: Isolation forest. In: IEEE International Conference on Data Mining, 2009, pp. 413\u2013422. https:\/\/doi.org\/10.1109\/ICDM.2008.17","DOI":"10.1109\/ICDM.2008.17"},{"issue":"2065","key":"4_CR11","doi-asserted-by":"publisher","first-page":"20150202","DOI":"10.1098\/rsta.2015.0202","volume":"374","author":"IT Jolliffe","year":"2016","unstructured":"Jolliffe, I.T., Cadima, J.: Principal component analysis: a review and recent developments. Philos. Trans. A Math. Phys. Eng. Sci. 374(2065), 20150202 (2016). https:\/\/doi.org\/10.1098\/rsta.2015.0202","journal-title":"Philos. Trans. A Math. Phys. Eng. Sci."},{"key":"4_CR12","doi-asserted-by":"publisher","unstructured":"Munir, M., Dengel, A., Chattha, M.A., Ahmed, S.: A comparative analysis of traditional and deep learning-based anomaly detection methods for streaming data. In: 18th IEEE International Conference on Machine Learning and Applications (ICMLA) At: Boca Raton, Florida, USA, December 2019 (2019). https:\/\/doi.org\/10.1109\/ICMLA.2019.00105","DOI":"10.1109\/ICMLA.2019.00105"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Chalapathy, R., Chawla, S.: Deep learning for anomaly detection: a survey. arXiv preprint arXiv:1901.03407 (2019)","DOI":"10.1145\/3394486.3406704"},{"key":"4_CR14","unstructured":"Diederik, P.K., Welling, M.: Auto-Encoding Variational Bayes. arXiv:1312.6114 (2013)"},{"key":"4_CR15","unstructured":"Goodfellow, I.J., et al.: Generative Adversarial Networks. arXiv:1406.2661 (2014)"},{"key":"4_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2018.05.020","volume":"457\u2013458","author":"C Kim","year":"2018","unstructured":"Kim, C., Lee, J., Kim, R., Park, Y., Kang, J.: DeepNAP: deep neural anomaly pre-detection in a semiconductor fab. Inf. Sci. 457\u2013458, 1\u201311 (2018). https:\/\/doi.org\/10.1016\/j.ins.2018.05.020","journal-title":"Inf. Sci."},{"key":"4_CR17","unstructured":"Malhotra, P., Vig, L., Shroff, G., Agarwal, P.: Long short term memory networks for anomaly detection in time series. In: European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, 2015, pp. 89\u201394"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Xu, H., et al.: Unsupervised anomaly detection via variational autoencoder for seasonal KPIs in web applications. arXiv:1802.03903 (2018)","DOI":"10.1145\/3178876.3185996"},{"key":"4_CR19","unstructured":"Zhang, C., Li, S., Zhang, H., Chen, Y.: VELC: a new variational autoencoder based model for time series anomaly detection (2019). arXiv:1907.01702"},{"key":"4_CR20","doi-asserted-by":"publisher","unstructured":"Taormina, R., et al.: The battle of the attack detection algorithms: disclosing cyber attacks on water distribution networks. J. Water Resour. Plann. Manage. 144(8) (2018) https:\/\/doi.org\/10.1061\/(ASCE)WR.1943-5452.0000969","DOI":"10.1061\/(ASCE)WR.1943-5452.0000969"},{"issue":"6","key":"4_CR21","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/BF02834632","volume":"4","author":"GJ Mclachlan","year":"1999","unstructured":"Mclachlan, G.J.: Mahalanobis distance. Resonance 4(6), 20\u201326 (1999). https:\/\/doi.org\/10.1007\/BF02834632","journal-title":"Resonance"},{"key":"4_CR22","doi-asserted-by":"publisher","unstructured":"Pereira, J., Silveira, M.: Unsupervised anomaly detection in energy time series data using variational recurrent autoencoders with attention. In: 17th IEEE International Conference on Machine Learning and Applications (ICMLA), Orlando, Florida, USA, December 2018 (2018). https:\/\/doi.org\/10.1109\/ICMLA.2018.00207","DOI":"10.1109\/ICMLA.2018.00207"},{"issue":"1","key":"4_CR23","first-page":"1","volume":"2","author":"J An","year":"2015","unstructured":"An, J., Cho, S.: Variational autoencoder based anomaly detection using reconstruction probability. Spec. Lect. IE 2(1), 1\u201318 (2015)","journal-title":"Spec. Lect. IE"},{"key":"4_CR24","doi-asserted-by":"publisher","unstructured":"Housh, M., Ohar, Z.: Model based approach for cyber-physical attacks detection 547 in water distribution systems. In: World Environmental and Water Resources Congress 2017, vol. 548, pp. 727\u2013736 (2017). https:\/\/doi.org\/10.1061\/9780784480625.067","DOI":"10.1061\/9780784480625.067"},{"key":"4_CR25","unstructured":"Maruf, M., et al.: Water distribution system modeling by using EPA-NET software. In: International Conference on Recent Innovation in Civil Engineering for Sustainable Development (IICSD-2015), DUET, Gazipur, Bangladesh, December 2015 (2015)"},{"key":"4_CR26","doi-asserted-by":"publisher","unstructured":"Abokifa, A.A., Haddad, K., Lo, C.S., Biswas, P.: Detection of cyber physical attacks on water distribution systems via principal component analysis and artificial neural networks. In: World Environmental and Water Resources Congress 2017, vol. 495, 676\u2013691 (2017). https:\/\/doi.org\/10.1061\/9780784480625.063","DOI":"10.1061\/9780784480625.063"},{"key":"4_CR27","doi-asserted-by":"publisher","unstructured":"Giacomoni, M., Gatsis, N., Taha, A.: Identification of cyber attacks on water distribution systems by unveiling low-dimensionality in the sensory data. In: World Environmental and Water Resources Congress 2017, vol. 531, pp. 660\u2013675 (2017). https:\/\/doi.org\/10.1061\/9780784480625.062","DOI":"10.1061\/9780784480625.062"},{"key":"4_CR28","doi-asserted-by":"publisher","unstructured":"Brentan, B. M., et al.: On-line cyber attack detection in water networks through state forecasting and control by pattern recognition. In: World Environmental and Water Resources Congress 2017, vol. 510, pp. 583\u2013592 (2017). https:\/\/doi.org\/10.1061\/9780784480625.054","DOI":"10.1061\/9780784480625.054"},{"key":"4_CR29","doi-asserted-by":"publisher","unstructured":"Chandy, S.E., Rasekh, A., Barker, Z.A., Campbell, B., Shafiee, M.E.: Detection of cyber-attacks to water systems through machine-learning-based anomaly detection in SCADA data. In: World Environmental and Water Resources Congress 2017, vol. 520, 611\u2013616 (2017). https:\/\/doi.org\/10.1061\/9780784480625.057","DOI":"10.1061\/9780784480625.057"},{"key":"4_CR30","doi-asserted-by":"publisher","unstructured":"Pasha, M.F.K., Kc, B., Somasundaram, S.L.: An approach to detect the cyber-physical attack on water distribution system. In: World Environmental and Water Resources Congress 2017, vol. 584, pp. 703\u2013711 (2017).https:\/\/doi.org\/10.1061\/9780784480625.065","DOI":"10.1061\/9780784480625.065"},{"key":"4_CR31","doi-asserted-by":"publisher","unstructured":"Aghashahi, M., Sundararajan, R., Pourahmadi, M., Banks, M.K.: Water distribution systems analysis symposium; battle of the attack detection algorithms 501 (BATADAL). In: World Environmental and Water Resources Congress 2017, vol. 502, pp. 101\u2013108 (2017). https:\/\/doi.org\/10.1061\/9780784480595.010","DOI":"10.1061\/9780784480595.010"}],"container-title":["Communications in Computer and Information Science","ICT Innovations 2020. Machine Learning and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62098-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,25]],"date-time":"2022-11-25T14:17:58Z","timestamp":1669385878000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-62098-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030620974","9783030620981"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62098-1_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"30 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICT Innovations","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on ICT Innovations","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Skopje","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"North Macedonia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ictinnovations2020a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ictinnovations.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference was held online.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}