{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T14:46:29Z","timestamp":1766760389786,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030880804"},{"type":"electronic","value":"9783030880811"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-88081-1_58","type":"book-chapter","created":{"date-parts":[[2021,9,29]],"date-time":"2021-09-29T11:07:08Z","timestamp":1632913628000},"page":"771-783","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Anomaly Detection on ADS-B Flight Data Using Machine Learning Techniques"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2314-865X","authenticated-orcid":false,"given":"Osman","family":"Ta\u015fdelen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8973-5705","authenticated-orcid":false,"given":"Levent","family":"\u00c7arkacioglu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4406-2783","authenticated-orcid":false,"given":"Beh\u00e7et U\u011fur","family":"T\u00f6reyin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,30]]},"reference":[{"key":"58_CR1","unstructured":"Ak\u00e7a, M., P\u0131nar, R.\u0130.: Air traffic controller performance: a field study. Empirical Econ. Soc. Sci. 1, 68\u201382 (2019)"},{"key":"58_CR2","unstructured":"Pimentel, T., Monteiro, M., Viana, J., Veloso, V., Ziviani, N.: A Generalized active learning approach for unsupervised anomaly detection, Section 3 (2018)"},{"key":"58_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41, 1\u201358 (2009)","journal-title":"ACM Comput. Surv."},{"key":"58_CR4","unstructured":"Ester, M.; Kriegel, H.P.; Sander, J.; Xu, X.: A Density-based algorithm for discovering clusters in large spatial databases with noise, pp. 226\u2013231 (1996)"},{"key":"58_CR5","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/978-3-642-37456-2_14","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"RJGB Campello","year":"2013","unstructured":"Campello, R.J.G.B., Moulavi, D., Sander, J.: Density-based clustering based on hierarchical density estimates. In: Pei, J., Tseng, V.S., Cao, L., Motoda, H., Xu, G. (eds.) PAKDD 2013. LNCS (LNAI), vol. 7819, pp. 160\u2013172. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37456-2_14"},{"key":"58_CR6","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/304181.304187","volume":"28","author":"M Ankerst","year":"1999","unstructured":"Ankerst, M., Breunig, M.M., Kriegel, H.P., Sander, J.: OPTICS: ordering points to identify the clustering structure. ACM Sigmod. Record 28, 49\u201360 (1999)","journal-title":"ACM Sigmod. Record"},{"key":"58_CR7","doi-asserted-by":"crossref","unstructured":"Hartigan, J.A.; Wong, M.A.: Algorithm AS 136: a k-means clustering algorithm. J. R. Stat. Soc. Ser. C (Appl. Stat.) 28, 100\u2013108 (1979)","DOI":"10.2307\/2346830"},{"key":"58_CR8","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/2481244.2481252","volume":"14","author":"CC Aggarwal","year":"2013","unstructured":"Aggarwal, C.C.: Outlier ensembles: position paper. ACM SIGKDD Explor. Newslett. 14, 49 (2013). https:\/\/doi.org\/10.1145\/2481244.2481252","journal-title":"ACM SIGKDD Explor. Newslett."},{"key":"58_CR9","first-page":"93","volume":"29","author":"MM Breunig","year":"2000","unstructured":"Breunig, M.M., Kriegel, H.P., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. ACM SIGKDD Explor. Newslett. 29, 93\u2013104 (2000)","journal-title":"ACM SIGKDD Explor. Newslett."},{"key":"58_CR10","doi-asserted-by":"publisher","unstructured":"Liu, F.T.; Ting, K.M.; Zhou, Z.H.: Isolation forest. In Proceedings of the 2008 Eighth IEEE International Conference on Data Mining, pp. 413\u2013422. IEEE, Pisa, Italy (2016) . https:\/\/doi.org\/10.1109\/ICDM.2008.17","DOI":"10.1109\/ICDM.2008.17"},{"key":"58_CR11","doi-asserted-by":"crossref","unstructured":"Zhang, D., Li, N., Zhou, Z., Chen, C., Sun, L., Li, S.,: iBAT: detecting anomalous taxi trajectories from gps traces. In: Proceedings of the 13th international conference on Ubiquitous computing, pp. 99\u2013108. ACM (2011)","DOI":"10.1145\/2030112.2030127"},{"issue":"2","key":"58_CR12","doi-asserted-by":"publisher","first-page":"806","DOI":"10.1109\/TITS.2013.2238531","volume":"14","author":"C Chen","year":"2013","unstructured":"Chen, C., et al.: iBOAT:Isolation-based online anomalous trajectory detection. IEEE Trans. Intell. Transp. Syst. 14(2), 806\u2013818 (2013)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"58_CR13","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1115\/1.1475320","volume":"124","author":"L Wang","year":"2002","unstructured":"Wang, L., Mehrabi, M.G., Kannatey-Asibu, E., Jr.: Hidden markov model-based tool wear monitoring in turning. J. Manuf. Sci. Eng. 124, 651\u2013658 (2002)","journal-title":"J. Manuf. Sci. Eng."},{"key":"58_CR14","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1109\/34.865189","volume":"22","author":"C Biernacki","year":"2000","unstructured":"Biernacki, C., Celeux, G., Govaert, G.: Assessing a mixture model for clustering with the integrated completed likelihood. IEEE Trans. Pattern Anal. Mach. Intell. 22, 719\u2013725 (2000)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"58_CR15","doi-asserted-by":"crossref","unstructured":"Kriegel, H., Schubert, M., Zimek, A.: Angle-based outlier detection in high-dimensional data. In: Proceedings of the 14th International Conference on Knowledge Discovery and Data Mining, pp. 444\u2013452 (2008)","DOI":"10.1145\/1401890.1401946"},{"key":"58_CR16","doi-asserted-by":"publisher","unstructured":"Pimentel, M.A., Clifton, D.A., Clifton, L., Tarassenko L.: A review of novelty detection, signal Process 99, 215\u2013249 (2014). https:\/\/doi.org\/10.1016\/j.sigpro.2013.12.026","DOI":"10.1016\/j.sigpro.2013.12.026"},{"key":"58_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2440-0","volume-title":"The Nature of Statistical Learning Theory","author":"V Vapnik","year":"2013","unstructured":"Vapnik, V.: The Nature of Statistical Learning Theory. Springer, New York (2013). https:\/\/doi.org\/10.1007\/978-1-4757-2440-0"},{"key":"58_CR18","unstructured":"Sch\u00f6lkopf, B., Williamson, R.C., Smola, A.J., Shawe-Taylor, J.; Platt, J.C.: Support vector method for novelty detection. In: Advances in Neural Information Processing Systems, MIT Press, pp. 582\u2013588 (2000)"},{"key":"58_CR19","doi-asserted-by":"crossref","unstructured":"Piciarelli, C. and Foresti, G.L.: Anomalous trajectory detection using support vector machines. In 2007 IEEE Conference on Advanced Video and Signal Based Surveillance, pp. 153\u2013158. IEEE (2007)","DOI":"10.1109\/AVSS.2007.4425302"},{"key":"58_CR20","doi-asserted-by":"crossref","unstructured":"Das, S., Matthews, B.L., Srivastava, A.N., Oza, N.C.: Multiple kernel learning for heterogeneous anomaly detection: algorithm and aviation safety case study. In: Proceedings of the 16th ACM SIGKDD International Conference On Knowledge Discovery and Data Mining, pp. 47\u201356. ACM (2010)","DOI":"10.1145\/1835804.1835813"},{"key":"58_CR21","doi-asserted-by":"publisher","unstructured":"Jolliffe, I.T: Principal Component Analysis, Springer Series in Statistics, Springer, New York (1986). https:\/\/doi.org\/10.1007\/978-1-4757-1904-8","DOI":"10.1007\/978-1-4757-1904-8"},{"key":"58_CR22","unstructured":"G\u00fcnter, S.; Schraudolph, N.N.; Vishwanathan, S.V.N.: Fast iterative kernel principal component analysis. J. Mach. Learn. Res. 8, 1893\u20131918 (2007)"},{"issue":"2","key":"58_CR23","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1002\/aic.690370209","volume":"37","author":"M Kramer","year":"1991","unstructured":"Kramer, M.: Nonlinear principal component analysis using autoassociative neural networks. AIChE J. 37(2), 233\u2013243 (1991)","journal-title":"AIChE J."},{"key":"58_CR24","doi-asserted-by":"crossref","unstructured":"Reddy, K.K., Sarkar, S., Venugopalan, V., Giering, M.: Anomaly detection and fault disambiguation in large flight data: a multi-modal deep auto-encoder approach, In: Proceedings of the Annual Conference of the Prognostics and Health Management Society, Denver, CO, USA (2016)","DOI":"10.36001\/phmconf.2016.v8i1.2549"},{"key":"58_CR25","unstructured":"Kingma, D.P., Welling, M.: Auto-Encoding Variational Bayes, arXiv (2013). arXiv:1312.6114"},{"key":"58_CR26","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. In: Advances in neural information processing systems, pp. 2672\u20132680 (2014)"},{"key":"58_CR27","volume-title":"Anomaly Detection in Airline Routine Operations using Flight Data Recorder Data","author":"L Li","year":"2013","unstructured":"Li, L., Hansman, R.J.: Anomaly Detection in Airline Routine Operations using Flight Data Recorder Data. MIT ICAT, Cambridge (2013)"},{"issue":"2","key":"58_CR28","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1145\/335191.335437","volume":"29","author":"S Ramaswamy","year":"2000","unstructured":"Ramaswamy, S., Rastogi, R., Shim, K.: Efficient algorithms for mining outliers from large data sets. ACM Sigmod Rec. 29(2), 427\u2013438 (2000)","journal-title":"ACM Sigmod Rec."},{"key":"58_CR29","doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C.: Outlier analysis. In Data mining, pp. 237\u2013263. Springer, Cham (2015)","DOI":"10.1007\/978-3-319-14142-8_8"},{"key":"58_CR30","doi-asserted-by":"publisher","DOI":"10.1145\/361002.361007","author":"JL Bentley","year":"1975","unstructured":"Bentley, J.L.: Multidimensional binary search trees used for associative searching. ACM (1975). https:\/\/doi.org\/10.1145\/361002.361007","journal-title":"ACM"},{"key":"58_CR31","unstructured":"EUROCONTROL Page. https:\/\/www.eurocontrol.int\/publication\/cat021-eurocontrol-specification-surveillance-data-exchange-asterix-part-12-category-0"},{"key":"58_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3312739","volume":"52","author":"A Taha","year":"2019","unstructured":"Taha, A., Hadi, A.: Anomaly detection methods for categorical data: a review. ACM Comput. Surv. 52, 1\u201335 (2019). https:\/\/doi.org\/10.1145\/3312739","journal-title":"ACM Comput. Surv."},{"issue":"2","key":"58_CR33","first-page":"137","volume":"5","author":"D Dave","year":"2014","unstructured":"Dave, D., Varma, T.: A review of various statistical methods for outlier detection. IJCSET 5(2), 137\u2013140 (2014)","journal-title":"IJCSET"}],"container-title":["Lecture Notes in Computer Science","Computational Collective Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-88081-1_58","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T00:29:20Z","timestamp":1725841760000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-88081-1_58"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030880804","9783030880811"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-88081-1_58","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"30 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCCI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Collective Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rhodos","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccci2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccci.pwr.edu.pl\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"231","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"58","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}