{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T09:21:16Z","timestamp":1763544076545,"version":"3.40.3"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031337420"},{"type":"electronic","value":"9783031337437"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-33743-7_37","type":"book-chapter","created":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T13:02:19Z","timestamp":1685106139000},"page":"453-466","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Light-Weight Real-Time Anomaly Detection Framework for Edge Computing"],"prefix":"10.1007","author":[{"given":"Rawan","family":"Sanyour","sequence":"first","affiliation":[]},{"given":"Manal","family":"Abdullah","sequence":"additional","affiliation":[]},{"given":"Salha","family":"Abdullah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,27]]},"reference":[{"issue":"2","key":"37_CR1","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/JIOT.2014.2311513","volume":"1","author":"Q Wu","year":"2014","unstructured":"Wu, Q., et al.: Cognitive internet of things: a new paradigm beyond connection. IEEE Internet Things J. 1(2), 129\u2013143 (2014)","journal-title":"IEEE Internet Things J."},{"key":"37_CR2","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.mfglet.2018.09.002","volume":"18","author":"J Lee","year":"2018","unstructured":"Lee, J., Davari, H., Singh, J., Pandhare, V.: Industrial Artificial Intelligence for industry 4.0-based manufacturing systems. Manuf. Lett. 18, 20\u201323 (2018)","journal-title":"Manuf. Lett."},{"issue":"21","key":"37_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/app10217833","volume":"10","author":"E Eziama","year":"2020","unstructured":"Eziama, E., Awin, F., Ahmed, S., Santos-Jaimes, L.M., Pelumi, A., Corral-De-witt, D.: Detection and identification of malicious cyber-attacks in connected and automated vehicles\u2019 real-time sensors. Appl. Sci. 10(21), 1\u201326 (2020)","journal-title":"Appl. Sci."},{"key":"37_CR4","doi-asserted-by":"crossref","unstructured":"Gaddam, A., Wilkin, T., Angelova, M., Gaddam, J.: Detecting sensor faults, anomalies and outliers in the internet of things: a survey on the challenges and solutions (2020)","DOI":"10.3390\/electronics9030511"},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Castillo, A., Thierer, A.: Economic perspectives projecting the growth and economic impact of the internet of things. SSRN (2015)","DOI":"10.2139\/ssrn.2618794"},{"key":"37_CR6","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/j.procs.2015.10.026","volume":"70","author":"G Pachauri","year":"2015","unstructured":"Pachauri, G., Sharma, S.: Anomaly detection in medical wireless sensor networks using machine learning algorithms. Procedia Comput. Sci. 70, 325\u2013333 (2015)","journal-title":"Procedia Comput. Sci."},{"issue":"3","key":"37_CR7","doi-asserted-by":"publisher","first-page":"1411","DOI":"10.1109\/TITS.2020.2970295","volume":"22","author":"Y Wang","year":"2021","unstructured":"Wang, Y., Masoud, N., Khojandi, A.: Real-time sensor anomaly detection and recovery in connected automated vehicle sensors. IEEE Trans. Intell. Transp. Syst. 22(3), 1411\u20131421 (2021)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"3","key":"37_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1754414.1754419","volume":"6","author":"AB Sharma","year":"2010","unstructured":"Sharma, A.B., Golubchik, L., Govindan, R.: Sensor faults: detection methods and prevalence in real-world datasets. ACM Trans. Sens. Netw. 6(3), 1\u201339 (2010)","journal-title":"ACM Trans. Sens. Netw."},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Wang, Q., Lu, Z., Qu, G.: An entropy analysis based intrusion detection system for controller area network in vehicles. In: 31st IEEE International System-on-Chip Conference (SOCC) (2018)","DOI":"10.1109\/SOCC.2018.8618564"},{"key":"37_CR10","first-page":"132","volume":"6","author":"M M\u00fcter","year":"2011","unstructured":"M\u00fcter, M., Groll, A., Freiling, F.C.: Anomaly detection for in-vehicle networks using a sensor-based approach. J. Inf. Assur. Secur. 6, 132\u2013140 (2011)","journal-title":"J. Inf. Assur. Secur."},{"issue":"4","key":"37_CR11","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MWC.2008.4599219","volume":"15","author":"S Rajasegarar","year":"2008","unstructured":"Rajasegarar, S., Leckie, C., Palaniswami, M.: Anomaly detection in wireless sensor networks. IEEE Wirel. Commun. 15(4), 34\u201340 (2008). https:\/\/doi.org\/10.1109\/MWC.2008.4599219","journal-title":"IEEE Wirel. Commun."},{"key":"37_CR12","doi-asserted-by":"crossref","unstructured":"Hill, D.J., Minsker, B.S., Amir, E.: Real-time Bayesian anomaly detection in streaming environmental data. Water Resour. Res. 46(4) (2009)","DOI":"10.1029\/2008WR006956"},{"key":"37_CR13","doi-asserted-by":"crossref","unstructured":"Hill, D.J., Minsker, B.S.: Anomaly detection in streaming environmental sensor data: a data-driven modeling approach (2009)","DOI":"10.1029\/2008WR006956"},{"issue":"4","key":"37_CR14","doi-asserted-by":"publisher","first-page":"e3485","DOI":"10.1002\/dac.3485","volume":"31","author":"N Goyal","year":"2017","unstructured":"Goyal, N., Dave, M., Verma, A.K.: A novel fault detection and recovery technique for cluster-based underwater wireless sensor networks. Int. J. Commun. Syst. 31(4), e3485 (2017)","journal-title":"Int. J. Commun. Syst."},{"issue":"1","key":"37_CR15","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1016\/j.ymssp.2013.05.007","volume":"40","author":"J Kullaa","year":"2013","unstructured":"Kullaa, J.: Detection, identification, and quantification of sensor fault in a sensor network. Mech. Syst. Signal Process. 40(1), 208\u2013221 (2013). https:\/\/doi.org\/10.1016\/j.ymssp.2013.05.007","journal-title":"Mech. Syst. Signal Process."},{"issue":"4","key":"37_CR16","doi-asserted-by":"publisher","first-page":"1302","DOI":"10.1016\/j.jnca.2011.03.004","volume":"34","author":"M Xie","year":"2011","unstructured":"Xie, M., Han, S., Tian, B., Parvin, S.: Anomaly detection in wireless sensor networks: a survey. J. Netw. Comput. Appl. 34(4), 1302\u20131325 (2011)","journal-title":"J. Netw. Comput. Appl."},{"key":"37_CR17","doi-asserted-by":"crossref","unstructured":"Munir, S., Stankovic, J.A.: FailureSense: detecting sensor failure using electrical appliances in the home. In: Proceedings of the IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2014, pp. 73\u201381 (2015)","DOI":"10.1109\/MASS.2014.16"},{"key":"37_CR18","doi-asserted-by":"crossref","unstructured":"Zheng, H., Feng, Y., Gao, Y., Tan, J.: A robust predicted performance analysis approach for data-driven product development in the industrial internet of things (2018)","DOI":"10.3390\/s18092871"},{"key":"37_CR19","doi-asserted-by":"crossref","unstructured":"Nesa, N., Ghosh, T., Banerjee, I.: Outlier detection in sensed data using statistical learning models for IoT. In: IEEE Wireless Communications and Networking Conference (WCNC), vol. 2018-April, pp. 1\u20136 (2018)","DOI":"10.1109\/WCNC.2018.8376988"},{"key":"37_CR20","doi-asserted-by":"crossref","unstructured":"Alduais, N.A.M., Abdullah, J., Jamil, A., Audah, L., Alias, R.: Sensor node data validation techniques for realtime IoT\/WSN application. In: 2017 14th International Multi-conference on Systems, Signals and Devices (SSD), SSD 2017, vol. 2017-Janua, no. 1, pp. 760\u2013765 (2017)","DOI":"10.1109\/SSD.2017.8166984"},{"key":"37_CR21","doi-asserted-by":"crossref","unstructured":"Javed, N., Wolf, T.: Automated sensor verification using outlier detection in the Internet of things. In: Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops, ICDCSW 2012, pp. 291\u2013296 (2012)","DOI":"10.1109\/ICDCSW.2012.78"},{"issue":"3","key":"37_CR22","doi-asserted-by":"publisher","first-page":"1264","DOI":"10.1109\/TITS.2019.2906038","volume":"21","author":"F Van Wyk","year":"2020","unstructured":"Van Wyk, F., Wang, Y., Khojandi, A., Masoud, N.: Real-time sensor anomaly detection and identification in automated vehicles. IEEE Trans. Intell. Transp. Syst. 21(3), 1264\u20131276 (2020)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"37_CR23","doi-asserted-by":"crossref","unstructured":"Minovski, D., Ahlund, C., Mitra, K., Cotanis, I.: Anomaly detection for discovering performance degradation in cellular IoT services. In: Proceedings of the Conference on Local Computer Networks, LCN, vol. 2021-Octob, pp. 99\u2013106 (2021)","DOI":"10.1109\/LCN52139.2021.9524931"},{"key":"37_CR24","doi-asserted-by":"crossref","unstructured":"Hundman, K., Constantinou, V., Laporte, C., Colwell, I., Soderstrom, T.: Detecting spacecraft anomalies using LSTMs and nonparametric dynamic thresholding. In: KDD, vol. 18 (2018)","DOI":"10.1145\/3219819.3219845"},{"key":"37_CR25","doi-asserted-by":"crossref","unstructured":"Su, Y., Zhao, Y., Niu, C., Liu, R., Sun, W., Pei, D.: Robust anomaly detection for multivariate time series through stochastic recurrent neural network, vol. 1485, pp. 2828\u20132837 (2019)","DOI":"10.1145\/3292500.3330672"},{"key":"37_CR26","doi-asserted-by":"crossref","unstructured":"Park, D., Hoshi, Y., Kemp, C.C.: A multimodal anomaly detector for robot-assisted feeding using an LSTM-based variational autoencoder (2018)","DOI":"10.1109\/LRA.2018.2801475"},{"issue":"7","key":"37_CR27","doi-asserted-by":"publisher","first-page":"4291","DOI":"10.1109\/TITS.2020.3025875","volume":"22","author":"AR Javed","year":"2021","unstructured":"Javed, A.R., Usman, M., Rehman, S.U., Khan, M.U., Haghighi, M.S.: Anomaly detection in automated vehicles using multistage attention-based convolutional neural network. IEEE Trans. Intell. Transp. Syst. 22(7), 4291\u20134300 (2021)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"8","key":"37_CR28","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"37_CR29","unstructured":"Understanding LSTM and its diagrams | by Shi Yan | ML Review. https:\/\/blog.mlreview.com\/understanding-lstm-and-its-diagrams-37e2f46f1714. Accessed 29 Oct 2022"},{"key":"37_CR30","unstructured":"Understanding the 3 most common loss functions for Machine Learning Regression | by George Seif | Towards Data Science. https:\/\/towardsdatascience.com\/understanding-the-3-most-common-loss-functions-for-machine-learning-regression-23e0ef3e14d3. Accessed 30 Oct 2022"},{"key":"37_CR31","unstructured":"Common Loss Functions in Machine Learning | Built In. https:\/\/builtin.com\/machine-learning\/common-loss-functions. Accessed 30 Oct 2022"},{"key":"37_CR32","doi-asserted-by":"crossref","unstructured":"Cho, K., et al.: Learning phrase representations using RNN encoder-decoder for statistical machine translation. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 1724\u20131734 (2014)","DOI":"10.3115\/v1\/D14-1179"},{"key":"37_CR33","unstructured":"Malhotra, P., Ramakrishnan, A., Anand, G., Vig, L., Agarwal, P., Shroff, G.: LSTM-based encoder-decoder for multi-sensor anomaly detection (2016)"},{"key":"37_CR34","unstructured":"Ruff, L., et al.: Deep semi-supervised anomaly detection. In: ICLR 2020 (2020)"},{"key":"37_CR35","unstructured":"Abadi, M., et al.: TensorFlow: large-scale machine learning on heterogeneous distributed systems. arXiv Preprint arXiv:1603.04467 (2016)"},{"key":"37_CR36","unstructured":"Kingma, D.P., Lei Ba, J.: ADAM: a method for stochastic optimization (2014)"},{"key":"37_CR37","unstructured":"Teach, learn, and make with the Raspberry Pi Foundation. https:\/\/www.raspberrypi.org\/. Accessed 07 Nov 2022"},{"key":"37_CR38","unstructured":"TensorFlow Lite. https:\/\/www.tensorflow.org\/lite\/guide. Accessed 07 Dec 2022"},{"key":"37_CR39","unstructured":"IBA-Group-IT\/IoT-data-simulator: Generic IoT data simulator. Provides possibility to replay datasets or generates data on fly. Supports various IoT platforms out of the box. https:\/\/github.com\/IBA-Group-IT\/IoT-data-simulator. Accessed 24 Oct 2022"},{"key":"37_CR40","unstructured":"Goh, S.T.: Machine Learning Approaches to Challenging Problems: Interpretable Imbalanced Classification, Interpretable Density Estimation, and Causal Inference. Massachusetts Institute of Technology (2018)"},{"key":"37_CR41","unstructured":"Koyejo, O., Natarajan, N., Ravikumar, P., Dhillon, I.S.: Consistent binary classification with generalized performance metrics. In: Advances in Neural Information Processing Systems, vol. 27 (2014)"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of the 2023 International Conference on Advances in Computing Research (ACR\u201923)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-33743-7_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T13:02:45Z","timestamp":1685106165000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-33743-7_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031337420","9783031337437"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-33743-7_37","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"27 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing Research","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando, FL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 May 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 May 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acr2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iicser.org\/ACR23\/call_papers.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}