{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T11:03:20Z","timestamp":1778670200517,"version":"3.51.4"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319594149","type":"print"},{"value":"9783319594156","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T00:00:00Z","timestamp":1496188800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-59415-6_15","type":"book-chapter","created":{"date-parts":[[2017,5,30]],"date-time":"2017-05-30T08:42:30Z","timestamp":1496133750000},"page":"151-165","source":"Crossref","is-referenced-by-count":7,"title":["Context-Aware Anomaly Detection in Embedded Systems"],"prefix":"10.1007","author":[{"given":"Fatemeh","family":"Ehsani-Besheli","sequence":"first","affiliation":[]},{"given":"Hamid R.","family":"Zarandi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,31]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1109\/TSMCC.2008.2007248","volume":"39","author":"S Budalakoti","year":"2009","unstructured":"Budalakoti, S., Srivastava, A.N., Otey, M.E.: Anomaly detection and diagnosis algorithms for discrete symbol sequences with applications to airline safety. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 39, 101\u2013113 (2009)","journal-title":"IEEE Trans. Syst. Man Cybern. Part C Appl. Rev."},{"key":"15_CR2","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/12.980003","volume":"51","author":"R Maxion","year":"2002","unstructured":"Maxion, R., Tan, K.: Anomaly detection in embedded systems. IEEE Trans. Comput. 51, 108\u2013120 (2002)","journal-title":"IEEE Trans. Comput."},{"key":"15_CR3","unstructured":"Chandola, V.: Anomaly detection for symbolic sequences and time series data, University of Minnesota (2009)"},{"key":"15_CR4","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1145\/1117454.1117473","volume":"7","author":"D Margineantu","year":"2005","unstructured":"Margineantu, D., Bay, S., Chan, P., Lane, T.: Data mining methods for anomaly detection kdd-2005 workshop report. ACM SIGKDD Explor. Newslett. 7, 132\u2013136 (2005)","journal-title":"ACM SIGKDD Explor. Newslett."},{"key":"15_CR5","volume-title":"Similarity-Based Pattern Recognition","author":"E Hancock","year":"2011","unstructured":"Hancock, E., Pelillo, M.: Similarity-Based Pattern Recognition. Springer, Heidelberg (2011)"},{"key":"15_CR6","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1109\/24.58721","volume":"39","author":"R Maxion","year":"1990","unstructured":"Maxion, R., Feather, F.E.: A case study of ethernet anomalies in a distributed computing environment. IEEE Trans. Reliab. 39, 433\u2013443 (1990)","journal-title":"IEEE Trans. Reliab."},{"key":"15_CR7","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1093\/bjaceaccp\/mkm012","volume":"7","author":"A McCluskey","year":"2007","unstructured":"McCluskey, A., Lalkhen, A.G.: Statistics I: data and correlations. Continuing Educ. Anaesth. Crit. Care Pain 7, 95\u201399 (2007)","journal-title":"Continuing Educ. Anaesth. Crit. Care Pain"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Akoglu, L., Tong, H., Vreeken, J., Faloutsos, C.: Fast and reliable anomaly detection in categorical data. In: Proceedings of the 21st ACM International Conference on Information and Knowledge Management, pp. 415\u2013424 (2012)","DOI":"10.1145\/2396761.2396816"},{"key":"15_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40537-014-0011-y","volume":"2","author":"MA Hayes","year":"2015","unstructured":"Hayes, M.A., Capretz, M.A.: Contextual anomaly detection framework for big sensor data. J. Big Data 2, 1\u201322 (2015)","journal-title":"J. Big Data"},{"key":"15_CR10","unstructured":"Jiang, Y., Zeng, C., Xu, J., Li, T.: Real time contextual collective anomaly detection over multiple data streams. In: Proceedings of the ODD, pp. 23\u201330 (2014)"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Janakiram, D., Adi Mallikarjuna Reddy, V.: Outlier detection in wireless sensor networks using Bayesian belief networks. In: First International Conference on Communication System Software and Middleware, pp. 1\u20136 (2006)","DOI":"10.1109\/COMSWA.2006.1665221"},{"key":"15_CR12","unstructured":"Srivastava, A.N.: Discovering system health anomalies using data mining techniques. In: Proceedings of Joint Army Navy NASA Airforce Conference on Propulsion (2005)"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Warrender, C., Forrest, S., Pearlmutter, B.: Detecting intrusions using system calls: alternative data models. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp. 133\u2013145 (1999)","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"15_CR14","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.mejo.2011.11.003","volume":"43","author":"M Zandrahimi","year":"2012","unstructured":"Zandrahimi, M., Zarandi, H.R., Mottaghi, M.H.: Two effective methods to detect anomalies in embedded systems. Microelectron. J. 43, 77\u201387 (2012)","journal-title":"Microelectron. J."}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Dependability Engineering of Complex Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59415-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,30]],"date-time":"2017-05-30T08:45:51Z","timestamp":1496133951000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59415-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,31]]},"ISBN":["9783319594149","9783319594156"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59415-6_15","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5,31]]}}}