{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T20:10:06Z","timestamp":1751659806171,"version":"3.41.0"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319914459"},{"type":"electronic","value":"9783319914466"}],"license":[{"start":{"date-parts":[[2018,5,27]],"date-time":"2018-05-27T00:00:00Z","timestamp":1527379200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-319-91446-6_1","type":"book-chapter","created":{"date-parts":[[2018,5,26]],"date-time":"2018-05-26T04:54:03Z","timestamp":1527310443000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Dynamic Time Warping Analysis for Security Purposes in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Tomasz","family":"Andrysiak","sequence":"first","affiliation":[]},{"given":"\u0141ukasz","family":"Saganowski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,27]]},"reference":[{"key":"1_CR1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470666388","volume-title":"Fundamentals of Wireless Sensor Networks","author":"W Dargie","year":"2010","unstructured":"Dargie, W., Poellabauer, C.: Fundamentals of Wireless Sensor Networks. John Wiley & Sons Ltd., Chichester (2010)"},{"key":"1_CR2","doi-asserted-by":"publisher","DOI":"10.1002\/9780470516782","volume-title":"Security in Wireless Ad Hoc and Sensor Networks","author":"E Cayirci","year":"2009","unstructured":"Cayirci, E., Rong, C.: Security in Wireless Ad Hoc and Sensor Networks. John Wiley & Sons Ltd, Chichester (2009)"},{"issue":"1","key":"1_CR3","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1109\/SURV.2013.050113.00191","volume":"16","author":"I Butun","year":"2014","unstructured":"Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Comm. Surv. Tutorials 16(1), 266\u2013282 (2014)","journal-title":"IEEE Comm. Surv. Tutorials"},{"key":"1_CR4","unstructured":"Goszczy\u0144ski, T.: Problemy bezpiecze\u0144stwa w bezprzewodowych sieciach sensorowych (2011). http:\/\/www.par.pl\/automatyka\/bezpieczenstwo\/413-problemy-bezpieczenstwa-w-bezprzewodowych-sieciach-sensorowych.html"},{"issue":"3","key":"1_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chondola","year":"2009","unstructured":"Chondola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 1\u201372 (2009)","journal-title":"ACM Comput. Surv."},{"issue":"4","key":"1_CR6","doi-asserted-by":"publisher","first-page":"1302","DOI":"10.1016\/j.jnca.2011.03.004","volume":"34","author":"M Xie","year":"2011","unstructured":"Xie, M., Han, S., Tian, B., Parvin, S.: Anomaly detection in wireless sensor networks: a survey. J. Netw. Comput. Appl. 34(4), 1302\u20131325 (2011)","journal-title":"J. Netw. Comput. Appl."},{"key":"1_CR7","first-page":"125","volume-title":"Advances in Intelligent and Soft Computing","author":"Aitor Corchero Rodriguez","year":"2010","unstructured":"Rodriguez, A., Mozos, M.: Improving network security through traffic log anomaly detection using time series analysis. In: Computational Intelligence in Security for Information Systems, pp. 125\u2013133 (2010)"},{"key":"1_CR8","first-page":"255","volume-title":"Advances in Intelligent Systems and Computing","author":"Tomasz Andrysiak","year":"2015","unstructured":"Andrysiak, T., Saganowski, \u0141.: Network anomaly detection based on ARFIMA model. In: Image Processing & Communications, Challenges 6. Advances in Intelligent Systems and Computing, vol. 313, pp. 255\u2013261. Springer (2015)"},{"key":"1_CR9","first-page":"1","volume-title":"Advances in Intelligent Systems and Computing","author":"Tomasz Andrysiak","year":"2015","unstructured":"Andrysiak, T., Saganowski, \u0141.: Network anomaly detection based on statistical models with long-memory dependence. In: Theory and Engineering of Complex Systems and Dependability. Advances in Intelligent Systems and Computing, vol. 365,\u00a0pp. 1\u201310. Springer (2015)"},{"key":"1_CR10","first-page":"567","volume-title":"International Joint Conference SOCO\u201917-CISIS\u201917-ICEUTE\u201917 Le\u00f3n, Spain, September 6\u20138, 2017, Proceeding","author":"Tomasz Andrysiak","year":"2017","unstructured":"Andrysiak, T., Saganowski, \u0141., Maszewski, M.: Time series forecasting using Holt-Winters model applied to anomaly detection in network traffic. In: International Conference CISIS 2017. Advances in Intelligent Systems and Computing, pp. 567\u2013576. Springer (2017)"},{"key":"1_CR11","first-page":"1","volume-title":"Proceedings of the 2001 SIAM International Conference on Data Mining","author":"Eamonn J. Keogh","year":"2001","unstructured":"Keogh, E., Pazzani, M.: Derivative dynamic time warping. In: First SIAM International Conference on Data Mining (SDM 2001), pp. 1\u201311 (2001)"},{"issue":"15","key":"1_CR12","doi-asserted-by":"publisher","first-page":"2911","DOI":"10.1002\/sec.1550","volume":"9","author":"\u0141ukasz Saganowski","year":"2016","unstructured":"Saganowski, \u0141., Andrysiak, T., Kozik, R., Chora\u015b, M.: DWT-based anomaly detection method for cyber security of wireless sensor networks. Secur. Commun. Networks 9(15), 2911\u20132922 (2016)","journal-title":"Security and Communication Networks"},{"key":"1_CR13","unstructured":"Waraksa, M., \u017burek, J.: Bezpiecze\u0144stwo transmisji danych w sieciach sensorowych, Zeszyty Naukowe Akademii Morskiej w Gdyni. Wybrane zagadnienia telekomunikacji, Gdynia, str., pp. 88\u201398 (2011)"},{"key":"1_CR14","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/990680.990707","volume":"47","author":"A Perrig","year":"2004","unstructured":"Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47, 53\u201357 (2004)","journal-title":"Commun. ACM"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: IEEE Infocom (2003)","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Karapistoli, E., Economides, A.A.: Wireless sensor network security visualization. In: 4th International Congress on Ultra-Modern Telecommunications and Control Systems and Workshops (ICUMT), pp. 850\u2013856 (2012)","DOI":"10.1109\/ICUMT.2012.6459781"},{"issue":"10","key":"1_CR17","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"AD Wood","year":"2002","unstructured":"Wood, A.D., Stnakovic, J.A.: Denial of service in sensor networks. IEEE Comput. 35(10), 54\u201362 (2002)","journal-title":"IEEE Comput."},{"key":"1_CR18","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/S1570-8705(03)00008-8","volume":"1","author":"C Karlof","year":"2003","unstructured":"Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Sensor Networks 1, 293\u2013315 (2003)","journal-title":"Ad Hoc Sensor Networks"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Loo, C.E., Ng, M.Y., Leckie, C., Palaniswami, M.: Intrusion detection for sensor networks. Int. J. Distrib. Sensor Networks (2006)","DOI":"10.1080\/15501320600692044"},{"key":"1_CR20","unstructured":"Jackson, K.: Intrusion Detection Systems (IDS), Product Survey. Los Alamos National Library, LA-UR-99-3883 (1999)"},{"issue":"1","key":"1_CR21","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1080\/00401706.1977.10489493","volume":"19","author":"RD Cook","year":"1977","unstructured":"Cook, R.D.: Detection of influential observations in linear regression. Technometrics 19(1), 15\u201318 (1977)","journal-title":"Technometrics"},{"key":"1_CR22","unstructured":"Kruskall, J., Liberman, M.: The symmetric time warping problem: from continuous to discrete. In: Time Warps, String Edits and Macromolecules: The Theory and Practice of Sequence Comparison, pp. 125\u2013161, Addison-Wesley Publishing Co., Reading (1983)"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Keogh, E., Pazzani, M.: Scaling up dynamic time warping for datamining applications. In: Proceedings of the Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Boston, Massachusetts, pp. 285\u2013289 (2000)","DOI":"10.1145\/347090.347153"},{"issue":"8","key":"1_CR24","doi-asserted-by":"publisher","first-page":"653232","DOI":"10.1155\/2015\/653232","volume":"11","author":"Pu Cheng","year":"2015","unstructured":"Cheng, P., Zhu, M.: Lightweight anomaly detection for wireless sensor networks. Int. J. Distrib. Sensor Networks, vol. 2015, Article ID 653232 (2015)","journal-title":"International Journal of Distributed Sensor Networks"},{"issue":"3","key":"1_CR25","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TMC.2014.2324572","volume":"14","author":"S Ji","year":"2015","unstructured":"Ji, S., Chen, T., Zhong, S.: Wormhole attack detection algorithms in wireless network coding systems. IEEE Trans. Mob. Comput. 14(3), 660\u2013674 (2015)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"1_CR26","unstructured":"TinyOS WSN operation system. https:\/\/github.com\/tinyos\/tinyos-main"}],"container-title":["Advances in Intelligent Systems and Computing","Contemporary Complex Systems and Their Dependability"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91446-6_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T19:42:49Z","timestamp":1751658169000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-91446-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,27]]},"ISBN":["9783319914459","9783319914466"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91446-6_1","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018,5,27]]}}}