{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T09:49:36Z","timestamp":1743068976847,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031813351"},{"type":"electronic","value":"9783031813368"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-81336-8_9","type":"book-chapter","created":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T16:43:42Z","timestamp":1739292222000},"page":"114-124","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Data Anomaly Detection in Wireless Sensor Network Using Principal Component Analysis and Decision Tree"],"prefix":"10.1007","author":[{"given":"Rahul","family":"Mishra","sequence":"first","affiliation":[]},{"given":"Sudhanshu Kumar","family":"Jha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,12]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Majid, M., et al.: Applications of wireless sensor networks and internet of things frameworks in the industry revolution 4.0: a systematic literature review. Sensors. 22(6), 2087 (2022)","DOI":"10.3390\/s22062087"},{"key":"9_CR2","doi-asserted-by":"publisher","first-page":"8015","DOI":"10.3390\/s23198015","volume":"23","author":"H Allioui","year":"2023","unstructured":"Allioui, H., Mourdi, Y.: Exploring the full potentials of IoT for better financial growth and stability: a comprehensive survey. Sensors. 23, 8015 (2023)","journal-title":"Sensors."},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"975","DOI":"10.3390\/s23020975","volume":"23","author":"A Alaerjan","year":"2023","unstructured":"Alaerjan, A.: Towards Sustainable distributed sensor networks: an approach for addressing power limitation issues in WSNs. Sensors. 23, 975 (2023)","journal-title":"Sensors."},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"2293","DOI":"10.1007\/s11277-023-10630-x","volume":"132","author":"P Yadav","year":"2023","unstructured":"Yadav, P., Sharma, S.C.: Unveiling the Cutting edge: a comprehensive survey of localization techniques in WSN, leveraging optimization and machine learning approaches. Wireless Pers. Commun. 132, 2293\u20132362 (2023)","journal-title":"Wireless Pers. Commun."},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Chang, Z., Liu, S., Xiong, X., Cai, Z., Tu, G.: A survey of recent advances in EdgeComputing-powered artificial intelligence of things. IEEE Internet Things J. 8(18), 13849\u201313875 (2021)","DOI":"10.1109\/JIOT.2021.3088875"},{"key":"9_CR6","unstructured":"Luo, Y., et al.: Technology roadmap for flexible sensors. ACS Nano 17(6), 52115295 (2023)"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Fahmy, H.M.A.: WSNs Applications: Concepts, Applications, Experimentation and Analysis of Wireless Sensor Networks, pp. 67\u2013242. Springer Nature Switzerland, Cham (2023)","DOI":"10.1007\/978-3-031-20709-9_3"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Fang, W., et al.: Detecting anomalies and de-noising monitoring data from sensors: a smart data approach. Adv. Eng. Inf. 55, 101870 (2023)","DOI":"10.1016\/j.aei.2022.101870"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Kashinath, S.A., et al.: Review of data fusion methods for real-time and multisensor traffic flow analysis. IEEE Access 9, 51258\u201351276 (2021)","DOI":"10.1109\/ACCESS.2021.3069770"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Sniatala, P., Iyengar, S.S., Ramani, S.K.: Evolution of Smart Sensing Ecosystems with Tamper Evident Security. Springer International Publishing (2021)","DOI":"10.1007\/978-3-030-77764-7"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Jha, S.K., Panigrahi, N., Gupta, A.: Security threats for time synchronization protocols in the internet of things. In: Principles of Internet of Things (IoT) Ecosystem: Insight Paradigm, pp. 495\u2013517 (2020)","DOI":"10.1007\/978-3-030-33596-0_20"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Labr\u00edn, C., Francisco, U.: Principal Component Analysis. R for Political Data Science. Chapman and Hall\/CRC, pp. 375\u2013393 (2020)","DOI":"10.1201\/9781003010623-15"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Lee, J.-S.: AUC4. 5: AUC-based C4. 5 decision tree algorithm for imbalanced data classification. IEEE Access 7, 106034\u2013106042 (2019)","DOI":"10.1109\/ACCESS.2019.2931865"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Ravindra, C., et al.: ETELMAD: anomaly detection using enhanced transient extreme machine learning system in wireless sensor networks. Wireless Pers. Commun. 130(1), 21\u201341 (2023)","DOI":"10.1007\/s11277-023-10271-0"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Yao, C., et al.: Traffic anomaly detection in wireless sensor networks based on principal component analysis and deep convolution neural network. IEEE Access 10, 103136\u2013103149 (2022)","DOI":"10.1109\/ACCESS.2022.3210189"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Srivastava, A., Manoranjan, R.B.: Hybrid machine learning model for anomaly detection in unlabelled data of wireless sensor networks. Wireless Pers. Commun. 129(4), 2693\u20132710 (2023)","DOI":"10.1007\/s11277-023-10253-2"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Vigoya, L., et al.: Application of machine learning algorithms for the validation of a new CoAP-IoT anomaly detection dataset. Appl. Sci. 13(7), 4482 (2023)","DOI":"10.3390\/app13074482"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Cerd\u00e0-Alabern, L., Iuhasz, G., Gemmi, G.: Anomaly detection for fault detection in wireless community networks using machine learning. Comput. Commun. 202, 191\u2013203 (2023)","DOI":"10.1016\/j.comcom.2023.02.019"},{"key":"9_CR19","first-page":"19","volume":"60","author":"MS Eltanbouly","year":"2020","unstructured":"Eltanbouly, M.S., Aborizka, M.K., Ali, A.: A comprehensive survey of machine learning methods in intrusion detection systems. J. Netw. Comput. Appl. 60, 19\u201360 (2020)","journal-title":"J. Netw. Comput. Appl."},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"He, S., et al.: Collaborative sensing in internet of things: a comprehensive survey. IEEE Commun. Surv. Tutorials 24, 1435\u20131474 (2022)","DOI":"10.1109\/COMST.2022.3187138"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Rashid, B., Rehmani, M.H.: Applications of wireless sensor networks for urban areas: a survey. J. Network Comput. Appl. 60, 192219 (2016)","DOI":"10.1016\/j.jnca.2015.09.008"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Sreedevi, P., Venkateswarlu, S.: Comparative analysis of energy efficient routing protocols with optimization in WSN. In: International Journal on Interactive Design and Manufacturing (IJIDeM), pp. 1\u201316 (2022)","DOI":"10.1007\/s12008-022-00958-2"}],"container-title":["Communications in Computer and Information Science","Computational Intelligence in Communications and Business Analytics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-81336-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T16:43:58Z","timestamp":1739292238000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-81336-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031813351","9783031813368"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-81336-8_9","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"12 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CICBA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Intelligence in Communications and Business Analytics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Patna","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 January 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 January 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cicba2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cicba.in","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}