{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T02:12:30Z","timestamp":1772158350930,"version":"3.50.1"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319897424","type":"print"},{"value":"9783319897431","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-89743-1_42","type":"book-chapter","created":{"date-parts":[[2018,4,11]],"date-time":"2018-04-11T18:28:27Z","timestamp":1523471307000},"page":"487-497","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Enhancement of IoT Applications Dependability Using Bayesian Networks"],"prefix":"10.1007","author":[{"given":"Yasmine","family":"Harbi","sequence":"first","affiliation":[]},{"given":"Zibouda","family":"Aliouat","sequence":"additional","affiliation":[]},{"given":"Sarra","family":"Hammoudi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,12]]},"reference":[{"issue":"2","key":"42_CR1","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/s10796-014-9492-7","volume":"17","author":"S Li","year":"2015","unstructured":"Li, S., Xu, L.D., Zhao, S.: The Internet of Things: a survey. Inf. Syst. Front. 17(2), 243\u2013259 (2015)","journal-title":"Inf. Syst. Front."},{"issue":"7","key":"42_CR2","doi-asserted-by":"publisher","first-page":"2005","DOI":"10.1016\/j.compeleceng.2013.04.021","volume":"39","author":"I Silva","year":"2013","unstructured":"Silva, I., Leandro, R., Macedo, D., Guedes, L.A.: A dependability evaluation tool for the Internet of Things. Comput. Electr. Eng. 39(7), 2005\u20132018 (2013)","journal-title":"Comput. Electr. Eng."},{"issue":"4","key":"42_CR3","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1016\/j.bushor.2015.03.008","volume":"58","author":"I Lee","year":"2015","unstructured":"Lee, I., Lee, K.: The Internet of Things (IoT): applications, investments, and challenges for enterprises. Bus. Horiz. 58(4), 431\u2013440 (2015)","journal-title":"Bus. Horiz."},{"key":"42_CR4","doi-asserted-by":"crossref","unstructured":"Cauchi, N., Hoque, K.A., Abate, A., Stoelinga, M.: Efficient probabilistic model checking of smart building maintenance using fault maintenance trees. arXiv:1801.04263 (2018)","DOI":"10.1145\/3137133.3137138"},{"key":"42_CR5","doi-asserted-by":"crossref","unstructured":"Kakamanshadi, G., Gupta, S., Singh, S.: A survey on fault tolerance techniques in wireless sensor networks. In: International Conference on Green Computing and Internet of Things, pp. 168\u2013173 (2015)","DOI":"10.1109\/ICGCIoT.2015.7380451"},{"issue":"1","key":"42_CR6","first-page":"688","volume":"3","author":"SAA Raj","year":"2014","unstructured":"Raj, S.A.A., Ramalakshmi, K., Priyadharsini, C.: A survey on classification of fault tolerance techniques available in wireless sensor network. Int. J. Eng. Res. Technol. (IJERT) 3(1), 688\u2013691 (2014)","journal-title":"Int. J. Eng. Res. Technol. (IJERT)"},{"key":"42_CR7","volume-title":"Encyclopedia of Statistics in Quality and Reliability","author":"I Ben-Gal","year":"2008","unstructured":"Ben-Gal, I.: Bayesian networks. In: Ruggeri, F., Faltin, F., Kenett, R. (eds.) Encyclopedia of Statistics in Quality and Reliability. Wiley, Hoboken (2008)"},{"issue":"2","key":"42_CR8","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1109\/SURV.2010.021510.00088","volume":"12","author":"Y Zhang","year":"2010","unstructured":"Zhang, Y., Meratnia, N., Havinga, P.: Outlier detection techniques for wireless sensor networks: a survey. IEEE Comm. Surv. Tutor. 12(2), 159\u2013170 (2010)","journal-title":"IEEE Comm. Surv. Tutor."},{"key":"42_CR9","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511812651","volume-title":"Pattern Recognition and Neural Networks","author":"BD Ripley","year":"1996","unstructured":"Ripley, B.D.: Pattern Recognition and Neural Networks. Cambridge University Press, Cambridge (1996)"},{"issue":"1","key":"42_CR10","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1142\/S0218001401000836","volume":"15","author":"Z Ghahramani","year":"2001","unstructured":"Ghahramani, Z.: An introduction to Hidden Markov Models and Bayesian Networks. Int. J. Pattern Recogn. Artif. Intell. 15(1), 9\u201342 (2001)","journal-title":"Int. J. Pattern Recogn. Artif. Intell."},{"issue":"1","key":"42_CR11","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1016\/j.comnet.2017.10.007","volume":"129","author":"A Ayadi","year":"2017","unstructured":"Ayadi, A., Ghorbel, O., Obeida, A.M., Abida, M.: Outlier detection approaches for wireless sensor networks: a survey. Comput. Netw. 129(1), 319\u2013333 (2017)","journal-title":"Comput. Netw."},{"issue":"1","key":"42_CR12","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/s11276-015-1141-7","volume":"23","author":"M Yuvaraja","year":"2017","unstructured":"Yuvaraja, M., Sabrigiriraj, M.: Fault detection and recovery scheme for routing and lifetime enhancement in WSN. Wirel. Netw. 23(1), 267\u2013277 (2017)","journal-title":"Wirel. Netw."},{"issue":"2","key":"42_CR13","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s11277-015-2944-7","volume":"86","author":"C Titouna","year":"2016","unstructured":"Titouna, C., Aliouat, M., Gueroui, M.: FDS: Fault Detection Scheme for wireless sensor networks. Wirel. Pers. Commun. 86(2), 549\u2013562 (2016)","journal-title":"Wirel. Pers. Commun."},{"issue":"2","key":"42_CR14","first-page":"241","volume":"9","author":"C Titouna","year":"2017","unstructured":"Titouna, C., Gueroui, M., Aliouat, M., Ari, A.A.A., Amine, A.: Distributed fault-tolerant algorithm for wireless sensor network. Int. J. Commun. Netw. Inf. Secur. (IJCNIS) 9(2), 241\u2013246 (2017)","journal-title":"Int. J. Commun. Netw. Inf. Secur. (IJCNIS)"},{"key":"42_CR15","doi-asserted-by":"crossref","unstructured":"Yuan, H., Zhao, X., Yu, L.: A distributed Bayesian algorithm for data fault detection in wireless sensor networks. In: International Conference on Information Networking, pp. 63\u201368 (2015)","DOI":"10.1109\/ICOIN.2015.7057858"},{"key":"42_CR16","doi-asserted-by":"crossref","unstructured":"Sutagundar, A.V., Bennur, V.S., Bhanu, K.N.A.A.M.: Agent based fault tolerance in wireless sensor networks. In: International Conference on Inventive Computation Technologies, pp. 1\u20136 (2016)","DOI":"10.1109\/INVENTIVE.2016.7823265"},{"key":"42_CR17","doi-asserted-by":"crossref","unstructured":"Siddique, U., Hoque, K.A., Johnson, T.T.: Formal specification and dependability analysis of optical communication networks. In: 2017 Design, Automation and Test in Europe Conference and Exhibition (DATE), pp. 1564\u20131569 (2017)","DOI":"10.23919\/DATE.2017.7927239"},{"key":"42_CR18","unstructured":"Zhang, H.: The optimality of Naive Bayes. In: Seventeenth Florida Artificial Intelligence Research Society Conference (2004)"},{"key":"42_CR19","volume-title":"Machine Learning: A Probabilistic Perspective","author":"KP Murphy","year":"2012","unstructured":"Murphy, K.P.: Machine Learning: A Probabilistic Perspective. MIT Press, Cambridge (2012)"}],"container-title":["IFIP Advances in Information and Communication Technology","Computational Intelligence and Its Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-89743-1_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T16:02:51Z","timestamp":1751558571000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-89743-1_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319897424","9783319897431"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-89743-1_42","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"12 April 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}