{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:10:44Z","timestamp":1771657844991,"version":"3.50.1"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032179142","type":"print"},{"value":"9783032179159","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-17915-9_2","type":"book-chapter","created":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T06:36:53Z","timestamp":1771655813000},"page":"28-41","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Anomaly Detection in\u00a0Industry 4.0: A Comparative Study of\u00a0Supervised and\u00a0Semi-supervised Approaches with\u00a0OPC-UA"],"prefix":"10.1007","author":[{"given":"Henry O.","family":"Velesaca","sequence":"first","affiliation":[]},{"given":"Angel D.","family":"Sappa","sequence":"additional","affiliation":[]},{"given":"Juan A.","family":"Holgado-Terriza","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,22]]},"reference":[{"issue":"1","key":"2_CR1","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/j.cie.2012.02.002","volume":"63","author":"R Ahmad","year":"2012","unstructured":"Ahmad, R., Kamaruddin, S.: An overview of time-based and condition-based maintenance in industrial application. Comput. Ind. Eng. 63(1), 135\u2013149 (2012)","journal-title":"Comput. Ind. Eng."},{"issue":"8","key":"2_CR2","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.3390\/pr11082266","volume":"11","author":"S Beak","year":"2023","unstructured":"Beak, S., Han, Y.H., Moon, Y., Lee, J., Jeong, J.: YOLOv7-Based anomaly detection using intensity and NG types in labeling in cosmetic manufacturing processes. Processes 11(8), 2266 (2023)","journal-title":"Processes"},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1016\/j.neucom.2019.07.034","volume":"363","author":"M Canizo","year":"2019","unstructured":"Canizo, M., Triguero, I., Conde, A., Onieva, E.: Multi-head CNN-RNN for multi-time series anomaly detection: an industrial case study. Neurocomputing 363, 246\u2013260 (2019)","journal-title":"Neurocomputing"},{"issue":"3","key":"2_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 1\u201358 (2009)","journal-title":"ACM Comput. Surv."},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Chikodili, N.B., Abdulmalik, M.D., Abisoye, O.A., Bashir, S.A.: Outlier detection in multivariate time series data using a fusion of K-medoid, standardized Euclidean distance and Z-score. In: International Conference on Information and Communication Technology and Applications, pp. 259\u2013271. Springer (2020)","DOI":"10.1007\/978-3-030-69143-1_21"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Eckhardt, A., M\u00fcller, S.: Analysis of the round trip time of OPC UA and TSN based peer-to-peer communication. In: International Conference on Emerging Technologies and Factory Automation, pp. 161\u2013167. IEEE (2019)","DOI":"10.1109\/ETFA.2019.8869060"},{"issue":"8","key":"2_CR7","doi-asserted-by":"publisher","first-page":"3127","DOI":"10.1109\/TNNLS.2019.2935975","volume":"31","author":"T Ergen","year":"2019","unstructured":"Ergen, T., Kozat, S.S.: Unsupervised anomaly detection with LSTM neural networks. Trans. Neural Netw. Learn. Syst. 31(8), 3127\u20133141 (2019)","journal-title":"Trans. Neural Netw. Learn. Syst."},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Ferragut, E.M., Laska, J., Bridges, R.A.: A new, principled approach to anomaly detection. In: International Conference on Machine Learning and Applications, vol.\u00a02, pp. 210\u2013215. IEEE (2012)","DOI":"10.1109\/ICMLA.2012.151"},{"key":"2_CR9","unstructured":"Foundation, O.: OPC 40100-1 Machine Vision - Control, Configuration management, recipe management, result management. Technical report, OPC Foundation (2024). https:\/\/opcfoundation.org\/developer-tools\/documents\/view\/217"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Hinton, G.E., Salakhutdinov, R.R.: Reducing the dimensionality of data with neural networks. In: Science, vol.\u00a0313, pp. 504\u2013507. American Association for the Advancement of Science (2006)","DOI":"10.1126\/science.1127647"},{"key":"2_CR11","unstructured":"Jocher, G., Chaurasia, A., Qiu, J.: Ultralytics yolov8 (2023). https:\/\/github.com\/ultralytics\/ultralytics"},{"issue":"2","key":"2_CR12","first-page":"2547","volume":"67","author":"K Kim","year":"2021","unstructured":"Kim, K.: Real-time anomaly detection in packaged food x-ray images using supervised learning. Comput. Mater. Contin 67(2), 2547\u20132568 (2021)","journal-title":"Comput. Mater. Contin"},{"issue":"2","key":"2_CR13","doi-asserted-by":"publisher","first-page":"429","DOI":"10.3390\/s24020429","volume":"24","author":"J Klar\u00e1k","year":"2024","unstructured":"Klar\u00e1k, J.: From anomaly detection to defect classification. Sensors 24(2), 429 (2024)","journal-title":"Sensors"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Leavers, V.: Which hough transform? CVGIP: Image Understand. 58(2), 250\u2013264 (1993)","DOI":"10.1006\/ciun.1993.1041"},{"key":"2_CR15","first-page":"154","volume":"155","author":"J Lee","year":"2019","unstructured":"Lee, J., Kim, Y.: Application of OPC-UA based on IoT for monitoring and controlling manufacturing processes. Procedia Comput. Sci. 155, 154\u2013161 (2019)","journal-title":"Procedia Comput. Sci."},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Li, C.L., Sohn, K., Yoon, J., Pfister, T.: Cutpaste: Self-supervised learning for anomaly detection and localization. In: International Conference on Computer Vision and Pattern Recognition, pp. 9664\u20139674 (2021)","DOI":"10.1109\/CVPR46437.2021.00954"},{"issue":"1","key":"2_CR17","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/s11633-023-1459-z","volume":"21","author":"J Liu","year":"2024","unstructured":"Liu, J.: Deep industrial image anomaly detection: a survey. Mach. Intell. Res. 21(1), 104\u2013135 (2024)","journal-title":"Mach. Intell. Res."},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Muhammad, M.B., Yeasin, M.: Eigen-cam: class activation map using principal components. In: International Joint Conference on Neural Networks, pp.\u00a01\u20137. IEEE (2020)","DOI":"10.1109\/IJCNN48605.2020.9206626"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Pang, G., Shen, C., Cao, L., Hengel, A.v.d.: Deep learning for anomaly detection: a review. ACM Comput. Surv. 54(2), 1\u201338 (2021)","DOI":"10.1145\/3439950"},{"key":"2_CR20","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1016\/j.eswa.2016.03.002","volume":"56","author":"M Pe\u00f1a","year":"2016","unstructured":"Pe\u00f1a, M., Biscarri, F., Guerrero, J.I., Monedero, I., Le\u00f3n, C.: Rule-based system to detect energy efficiency anomalies in smart buildings, a data mining approach. Expert Syst. Appl. 56, 242\u2013255 (2016)","journal-title":"Expert Syst. Appl."},{"key":"2_CR21","doi-asserted-by":"publisher","first-page":"886","DOI":"10.1016\/j.procs.2022.12.285","volume":"217","author":"DL Pham","year":"2023","unstructured":"Pham, D.L., Chang, T.W., et al.: A YOLO-based real-time packaging defect detection system. Procedia Comput. Sci. 217, 886\u2013894 (2023)","journal-title":"Procedia Comput. Sci."},{"issue":"7","key":"2_CR22","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1162\/089976601750264965","volume":"13","author":"B Sch\u00f6lkopf","year":"2001","unstructured":"Sch\u00f6lkopf, B., Platt, J.C., Shawe-Taylor, J., Smola, A.J., Williamson, R.C.: Estimating the support of a high-dimensional distribution. Neural Comput. 13(7), 1443\u20131471 (2001)","journal-title":"Neural Comput."},{"key":"2_CR23","doi-asserted-by":"publisher","unstructured":"Velesaca., H., et al.: Anomaly detection in industrial production products using OPC-UA and deep learning. In: International Conference on Data Science, Technology and Applications, pp. 505\u2013512. INSTICC, SciTePress (2024). https:\/\/doi.org\/10.5220\/0012812600003756","DOI":"10.5220\/0012812600003756"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Velesaca, H.O., Holgado-Terriza, J.A., Guerrero, J.M.G.: Optimizing smart factory operations: a methodological approach to industrial system implementation based on OPC-UA. In: E3S Web of Conferences, vol.\u00a0532, pp. 1\u201315. EDP Sciences (2024)","DOI":"10.1051\/e3sconf\/202453202004"},{"issue":"5","key":"2_CR25","doi-asserted-by":"crossref","first-page":"947","DOI":"10.1109\/JPROC.2015.2510981","volume":"104","author":"B Vogel-Heuser","year":"2016","unstructured":"Vogel-Heuser, B., Fay, A., Schaefer, I., Tichy, M., Tr\u00e4chtler, A., Legat, C.: Architectural design of multi-agent systems in the context of OPC UA and automationML. Proc. IEEE 104(5), 947\u2013967 (2016)","journal-title":"Proc. IEEE"},{"key":"2_CR26","unstructured":"Wong, W.K., Moore, A., Cooper, G., Wagner, M.: Rule-based anomaly pattern detection for detecting disease outbreaks. In: AAAI\/IAAI, pp. 217\u2013223 (2002)"},{"key":"2_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.105835","volume":"119","author":"M Yang","year":"2023","unstructured":"Yang, M., Wu, P., Feng, H.: Memseg: a semi-supervised method for image surface defect detection using differences and commonalities. Eng. Appl. Artif. Intell. 119, 105835 (2023)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"Zavrtanik, V., Kristan, M., Sko\u010daj, D.: Draem-a discriminatively trained reconstruction embedding for surface anomaly detection. In: International Conference on Computer Vision and Pattern Recognition, pp. 8330\u20138339 (2021)","DOI":"10.1109\/ICCV48922.2021.00822"}],"container-title":["Communications in Computer and Information Science","Data Management Technologies and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-17915-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T06:36:57Z","timestamp":1771655817000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-17915-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032179142","9783032179159"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-17915-9_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"22 February 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DATA 2024","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Management Technologies and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dijon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"data2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/data.scitevents.org\/?y=2024","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}