{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T23:08:22Z","timestamp":1777072102425,"version":"3.51.4"},"reference-count":106,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2012,11,16]],"date-time":"2012-11-16T00:00:00Z","timestamp":1353024000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Artif Intell Rev"],"published-print":{"date-parts":[[2015,2]]},"DOI":"10.1007\/s10462-012-9370-y","type":"journal-article","created":{"date-parts":[[2012,11,15]],"date-time":"2012-11-15T08:17:33Z","timestamp":1352967453000},"page":"193-228","source":"Crossref","is-referenced-by-count":80,"title":["Characteristics and classification of outlier detection techniques for wireless sensor networks in harsh environments: a survey"],"prefix":"10.1007","volume":"43","author":[{"given":"Nauman","family":"Shahid","sequence":"first","affiliation":[]},{"given":"Ijaz Haider","family":"Naqvi","sequence":"additional","affiliation":[]},{"given":"Saad Bin","family":"Qaisar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,11,16]]},"reference":[{"key":"9370_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-84996-098-4","volume-title":"Support vector machines for pattern classification","author":"S Abe","year":"2010","unstructured":"Abe S (2010) Support vector machines for pattern classification. Springer, New York"},{"key":"9370_CR2","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38:393\u2013422","journal-title":"Comput Netw"},{"key":"9370_CR3","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/S1389-1286(03)00345-1","volume":"43","author":"IF Akyildiz","year":"2003","unstructured":"Akyildiz IF, Akan zgr B, Akan OB, Chen C, Fang J, Su W (2003) Interplanetary internet: state-of-the-art and research challenges. Comput Netw 43:75\u2013112","journal-title":"Comput Netw"},{"key":"9370_CR4","unstructured":"Aly M (2005) Survey on multiclass classification methods. Neural Netw 1\u20139"},{"key":"9370_CR5","unstructured":"Bahrepour M, Meratnia N, Havinga PJM (2008) Automatic fire detection: a survey from wireless sensor network perspective. Centre for Telematics and Information Technology University of Twente, Enschede, technical report TR-CTIT-08-73, Dec 2008. http:\/\/eprints.eemcs.utwente.nl\/14624\/"},{"key":"9370_CR6","doi-asserted-by":"crossref","unstructured":"Bahrepour M, Meratnia N, Havinga PJM (2009a) Sensor fusion-based event detection in wireless sensor networks. In: SensorFusion, Toronto, Canada. IEEE, Los Alamitos, pp 1\u20138","DOI":"10.4108\/ICST.MOBIQUITOUS2009.7056"},{"key":"9370_CR7","doi-asserted-by":"crossref","unstructured":"Bahrepour M, Meratnia N, Havinga PJM (2009b) Use of ai techniques for residential fire detection in wireless sensor networks. In: AIAI 2009 workshop proceedings, Greece, vol 475, July 2009, pp 311\u2013321. ceur-ws.org","DOI":"10.1109\/ISSNIP.2009.5416749"},{"key":"9370_CR8","doi-asserted-by":"crossref","unstructured":"Bahrepour M, Zhang Y, Meratnia N, Havinga PJM (2009c) Use of event detection approaches for outlier detection in wireless sensor networks. In: Proceedings of symposium on theoretical and practical aspects of large-scale wireless sensor networks, the 5th international conference on intelligent sensors, sensor networks and information processing 2009 (ISSNIP 2009), Melbourne, Australia. IEEE Press, Victoria, Dec 2009, pp 439\u2013444","DOI":"10.1109\/ISSNIP.2009.5416749"},{"issue":"2","key":"9370_CR9","doi-asserted-by":"crossref","first-page":"215","DOI":"10.30638\/eemj.2010.031","volume":"9","author":"M Bahrepour","year":"2010","unstructured":"Bahrepour M, Meratnia N, Havinga PJM (2010a) Fast and accurate residential fire detection using wireless sensor networks. Environ Eng Manag J 9(2):215\u2013221","journal-title":"Environ Eng Manag J"},{"key":"9370_CR10","doi-asserted-by":"crossref","unstructured":"Bahrepour M, Meratnia N, Poel M, Taghikhaki Z, Havinga PJM (2010b) Distributed event detection in wireless sensor networks for disaster management. In: International conference on intelligent networking and collaborative systems, INCoS 2010, Thessaloniki, Greece. IEEE Computer Society, USA, pp 507\u2013512","DOI":"10.1109\/INCOS.2010.24"},{"key":"9370_CR11","doi-asserted-by":"crossref","unstructured":"Bahrepour M, van der Zwaag BJ, Meratnia N, Havinga P JM (2010c) Fire data analysis and feature reduction using computational intelligence methods. In: Phillips-Wren G, Jain LC, Nakamatsu K (eds) Proceedings of the second KES international symposium on advances in intelligent decision technologies, IDT 2010, Baltimore, Maryland, USA, series smart innovation, systems and technologies, vol 4. Springer, Berlin\/Heidelberg, July 2010, pp 289\u2013298","DOI":"10.1007\/978-3-642-14616-9_28"},{"key":"9370_CR12","volume-title":"Outliers in statistical data","author":"V Barnett","year":"1994","unstructured":"Barnett V, Lewis T (1994) Outliers in statistical data. Wiley, Lonon"},{"key":"9370_CR13","doi-asserted-by":"crossref","unstructured":"Bettencourt LMA, Hagberg AA, Larkey LB (2007) Separating the wheat from the chaff: practical anomaly detection schemes in ecological applications of distributed sensor networks. In: Computing distributed in sensor systems (DCOSS 2007), Santa Fe, NM, USA, June 2007, pp 223\u2013239","DOI":"10.1007\/978-3-540-73090-3_15"},{"key":"9370_CR14","doi-asserted-by":"crossref","unstructured":"Bezdek J, Havens T, Keller J, Leckie C, Park L, Palaniswami M, Rajasegarar S (2010) Clustering elliptical anomalies in sensor networks. In: 2010 IEEE international conference on fuzzy systems (FUZZ), pp 1\u20138","DOI":"10.1109\/FUZZY.2010.5584464"},{"key":"9370_CR15","doi-asserted-by":"crossref","unstructured":"Bezdek J, Rajasegarar S, Moshtaghi M, Leckie C, Palaniswami M, Havens T (2011) Anomaly detection in environmental monitoring networks [application notes]. Comput Intell Mag IEEE 6(2):52\u201358","DOI":"10.1109\/MCI.2011.940751"},{"key":"9370_CR16","doi-asserted-by":"crossref","first-page":"33","DOI":"10.3233\/HSN-2006-276","volume":"15","author":"V Bhuse","year":"2006","unstructured":"Bhuse V, Gupta A (2006) Anomaly intrusion detection in wireless sensor networks. J High Speed Netw 15:33\u201351","journal-title":"J High Speed Netw"},{"key":"9370_CR17","unstructured":"Branch J, Szymanski B, Giannella C, Wolff R, and Kargupta H (2006) In-network outlier detection in wireless sensor networks. In: 26th IEEE international conference on distributed computing systems, 2006. ICDCS 2006, p 51"},{"issue":"2","key":"9370_CR18","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1080\/15501320590966422","volume":"1","author":"R Cardell-Olivera","year":"2005","unstructured":"Cardell-Olivera R, Kranza M, Smettemb K, Mayerc K (2005) A reactive soil moisture sensor network: design and field evaluation. Int J Distrib Sens Netw 1(2):149\u2013162","journal-title":"Int J Distrib Sens Netw"},{"key":"9370_CR19","doi-asserted-by":"crossref","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41:15:1\u201315:58. doi: 10.1145\/1541880.1541882","DOI":"10.1145\/1541880.1541882"},{"key":"9370_CR20","unstructured":"Ch V, Banerjee A, Kumar V, Chandola V (2007) Outlier detection: a survey"},{"key":"9370_CR21","doi-asserted-by":"crossref","unstructured":"Chen J, Kher S, Somani A (2006) Distributed fault detection of wireless sensor networks. In: Proceedings of the 2006 workshop on dependability issues in wireless ad hoc networks and sensor networks, series DIWANS \u201906. ACM, New York, NY, pp 65\u201372. doi: 10.1145\/1160972.1160985","DOI":"10.1145\/1160972.1160985"},{"key":"9370_CR22","doi-asserted-by":"crossref","unstructured":"Chintalapudi K, Govindan R (2003) Localized edge detection in sensor fields. In: Proceedings of the first IEEE 2003 international workshop on sensor network protocols and applications, May 2003, pp 59\u201370","DOI":"10.1109\/SNPA.2003.1203357"},{"key":"9370_CR23","doi-asserted-by":"crossref","unstructured":"da Silva APR, Martins MHT, Rocha BPS, Loureiro AAF, Ruiz LB, Wong HC (2005) Decentralized intrusion detection in wireless sensor networks. In Proceedings of the 1st ACM international workshop on quality of service & security in wireless and mobile networks, series Q2SWinet \u201905. ACM, New York, NY, pp 16\u201323. doi: 10.1145\/1089761.1089765","DOI":"10.1145\/1089761.1089765"},{"key":"9370_CR24","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1016\/j.adhoc.2005.01.004","volume":"3","author":"IA Dario","year":"2005","unstructured":"Dario IA, Akyildiz IF, Pompili D, Melodia T (2005) Underwater acoustic sensor networks: research challenges. Ad Hoc Netw 3:257\u2013279","journal-title":"Ad Hoc Netw"},{"issue":"1","key":"9370_CR25","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/1993042.1993045","volume":"8","author":"E Dereszynski","year":"2011","unstructured":"Dereszynski E, Dietterich T (2011) Spatiotemporal models for data-anomaly detection in dynamic environmental monitoring campaigns. ACM Trans Sens Netw 8(1):3","journal-title":"ACM Trans Sens Netw"},{"key":"9370_CR26","doi-asserted-by":"crossref","unstructured":"Ding M, Cheng X (2009) Robust event boundary detection in sensor networks\u2014a mixture model based approach. In: IEEE INFOCOM 2009, April 2009, pp 2991\u20132995","DOI":"10.1109\/INFCOM.2009.5062273"},{"key":"9370_CR27","unstructured":"Ding M, Chen D, Xing K, Cheng X (2005) Localized fault-tolerant event boundary detection in sensor networks. In: Proceedings IEEE of 24th annual joint conference of the IEEE computer and communications societies INFOCOM 2005, vol 2, pp 902\u2013913"},{"key":"9370_CR28","unstructured":"Ekstr\u00f6m J (2011) Mahalanobis distance beyond normal distributions. UCLA Stat (preprint)"},{"key":"9370_CR29","doi-asserted-by":"crossref","unstructured":"Elnahrawy E, Nath B (2004) Context-aware sensors. In: European workshop on wireless sensor, networks, pp\u00a077\u201393","DOI":"10.1007\/978-3-540-24606-0_6"},{"key":"9370_CR30","doi-asserted-by":"crossref","DOI":"10.1201\/9781420082333","volume-title":"Knowledge discovery from sensor data","author":"AR Ganguly","year":"2008","unstructured":"Ganguly AR (2008) Knowledge discovery from sensor data. CRC Press, Boca Raton"},{"issue":"3","key":"9370_CR31","first-page":"264","volume":"7","author":"CF Garca-Hernndez","year":"2004","unstructured":"Garca-Hernndez CF, Ibargengoytia-Gonzlez PH, Garca-Hernndez J, PrezDaz JA (2004) Wireless sensor networks and applications: a survey. Int J Comput Sci Netw Secur 7(3):264\u2013273","journal-title":"Int J Comput Sci Netw Secur"},{"issue":"3","key":"9370_CR32","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1109\/MCOM.2010.5434384","volume":"48","author":"S George","year":"2010","unstructured":"George S, Zhou W, Chenji H, Won M, Lee Y, Pazarloglou A, Stoleru R, Barooah P (2010) Distressnet: a wireless ad hoc and sensor network architecture for situation management in disaster response. IEEE Commun Mag 48(3):128\u2013136","journal-title":"IEEE Commun Mag"},{"key":"9370_CR33","doi-asserted-by":"crossref","unstructured":"Giatrakos N, Kotidis Y, Deligiannakis A (2010a) Pao: power-efficient attribution of outliers in wireless sensor networks. In: Proceedings of the seventh international workshop on data management for sensor networks. ACM, pp 33\u201338","DOI":"10.1145\/1858158.1858168"},{"key":"9370_CR34","doi-asserted-by":"crossref","unstructured":"Giatrakos N, Kotidis Y, Deligiannakis A, Vassalos V, Theodoridis Y (2010b) Taco: tunable approximate computation of outliers in wireless sensor networks. In: Proceedings of the 2010 international conference on management of data. ACM, pp 279\u2013290","DOI":"10.1145\/1807167.1807199"},{"issue":"6","key":"9370_CR35","doi-asserted-by":"crossref","first-page":"2975","DOI":"10.1109\/TSP.2011.2125961","volume":"59","author":"V Gomez-Verdejo","year":"2011","unstructured":"Gomez-Verdejo V, Arenas-Garcia J, Lazaro-Gredilla M, Navia-Vazquez A (2011) Adaptive one-class support vector machine. IEEE Trans Signal Process 59(6):2975\u20132981","journal-title":"IEEE Trans Signal Process"},{"issue":"2","key":"9370_CR36","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1109\/18.825799","volume":"46","author":"P Gupta","year":"2000","unstructured":"Gupta P, Kumar P (2000) The capacity of wireless networks. IEEE Trans Inf Theory 46(2):388\u2013404","journal-title":"IEEE Trans Inf Theory"},{"key":"9370_CR37","volume-title":"Data mining: concepts and techniques","author":"J Han","year":"2006","unstructured":"Han J, Kamber M (2006) Data mining: concepts and techniques. Morgan Kaufmann, Los Altos"},{"issue":"2","key":"9370_CR38","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1007\/s10489-007-0101-z","volume":"30","author":"P Hao","year":"2009","unstructured":"Hao P, Chiang J, Lin Y (2009) A new maximal-margin spherical-structured multi-class support vector machine. Appl Intell 30(2):98\u2013111","journal-title":"Appl Intell"},{"key":"9370_CR39","unstructured":"Hassan A, et al (2011) A heuristic approach for sensor network outlier detection. Int J Res Rev Wirel Sens Netw 1(4):66\u201372"},{"key":"9370_CR40","unstructured":"Hill DJ, Minsker BS, Amir E (2007) Real-time bayesian anomaly detection for environmental sensor data. In: Proceedings of the 32nd conference of IAHR, 2007"},{"key":"9370_CR41","doi-asserted-by":"crossref","unstructured":"Hodge VJ, Austin J (2004) A survey of outlier detection methodologies. Artif Intell Rev 22:85\u2013126. doi: 10.1007\/s10462-004-4304-y","DOI":"10.1007\/s10462-004-4304-y"},{"key":"9370_CR42","unstructured":"http:\/\/connekt.seecs.nust.edu.pk\/SAHSE.php"},{"key":"9370_CR43","unstructured":"http:\/\/www.genuki.org.uk\/big\/eng\/LAN\/Haydock\/WoodPitExplosion.html"},{"key":"9370_CR44","unstructured":"http:\/\/www.humanite.fr\/2006-03-10_Societe_-Catastrophe-de-Courrieres-une-expression-impropre"},{"key":"9370_CR45","unstructured":"http:\/\/www.msha.gov\/MSHAINFO\/FactSheets\/MSHAFCT8.HTM"},{"key":"9370_CR46","unstructured":"Janakiram D, Adi Mallikarjuna Reddy V, Phani Kumar A (2006) Outlier detection in wireless sensor networks using bayesian belief networks. In: Communication system software and middleware, 2006. Comsware 2006, pp 1\u20136"},{"key":"9370_CR47","unstructured":"John GH (1995) Robust decision trees: removing outliers from databases. In: In knowledge discovery and data mining. AAAI Press, Menlo Park, pp 174\u2013179"},{"key":"9370_CR48","doi-asserted-by":"crossref","unstructured":"Jun MC, Jeong H, Kuo C-CJ (2005) Distributed spatio-temporal outlier detection in sensor networks","DOI":"10.1117\/12.604764"},{"key":"9370_CR49","doi-asserted-by":"crossref","unstructured":"Keally M, Zhou G, Xing G (2010) Watchdog: confident event detection in heterogeneous sensor networks. In: 2010 16th IEEE on real-time and embedded technology and applications symposium (RTAS), pp 279\u2013288","DOI":"10.1109\/RTAS.2010.15"},{"key":"9370_CR50","doi-asserted-by":"crossref","unstructured":"Keerthi S, Sundararajan S, Chang K, Hsieh C, Lin C (2008) A sequential dual method for large scale multi-class linear svms. In: Proceeding of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, pp 408\u2013416","DOI":"10.1145\/1401890.1401942"},{"key":"9370_CR51","unstructured":"Knorr EM, Ng RT (1988) Algorithms for mining distance-based outliers in large datasets, pp 392\u2013403"},{"issue":"3","key":"9370_CR52","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1109\/TC.2004.1261832","volume":"53","author":"B Krishnamachari","year":"2004","unstructured":"Krishnamachari B, Iyengar S (2004) Distributed bayesian algorithms for fault-tolerant event region detection in wireless sensor networks. IEEE Trans Comput 53(3):241\u2013250","journal-title":"IEEE Trans Comput"},{"key":"9370_CR53","doi-asserted-by":"crossref","unstructured":"Lazarevic A, Ozgur A, Ertoz L, Srivastava J, Kumar V (2003) A comparative study of anomaly detection schemes in network intrusion detection. In: Proceedings of the third SIAM international conference on data mining","DOI":"10.1137\/1.9781611972733.3"},{"key":"9370_CR54","doi-asserted-by":"crossref","unstructured":"Liu S, Liu Y, Wang B (2007) An improved hyper-sphere support vector machine. In: Third international conference on natural computation, 2007. ICNC 2007, vol 1. IEEE, pp 497\u2013500","DOI":"10.1109\/ICNC.2007.213"},{"key":"9370_CR55","doi-asserted-by":"crossref","unstructured":"Liu C, Yang Y, Tang C (2010) An improved method for multi-class support vector machines. In: 2010 International conference on measuring technology and mechatronics automation (ICMTMA), vol 1, pp 504\u2013508","DOI":"10.1109\/ICMTMA.2010.34"},{"key":"9370_CR56","doi-asserted-by":"crossref","unstructured":"Luo X, Dong M, Huang Y (2006) On distributed fault-tolerant detection in wireless sensor networks. IEEE Trans Comput 55(1):58\u201370","DOI":"10.1109\/TC.2006.13"},{"key":"9370_CR57","doi-asserted-by":"crossref","unstructured":"Madden S, Franklin MJ, Hellerstein JM, Hong W (2002) Tag: a tiny aggregation service for ad-hoc sensor networks. In: IN OSDI, 2002","DOI":"10.1145\/1060289.1060303"},{"key":"9370_CR58","doi-asserted-by":"crossref","unstructured":"Mainwaring A, Culler D, Polastre J, Szewczyk R, Anderson J (2002) Wireless sensor networks for habitat monitoring. In: Proceedings of the 1st ACM international workshop on wireless sensor networks and applications, series WSNA \u201902. ACM, New York, NY, pp 88\u201397. doi: 10.1145\/570738.570751","DOI":"10.1145\/570738.570751"},{"issue":"4","key":"9370_CR59","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MCOM.2010.5439078","volume":"48","author":"P Misra","year":"2010","unstructured":"Misra P, Kanhere S, Ostry D, Jha S (2010) Safety assurance and rescue communication systems in high-stress environments: a mining case study. Commun Mag IEEE 48(4):66\u201373","journal-title":"Commun Mag IEEE"},{"issue":"1","key":"9370_CR60","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.patcog.2010.07.024","volume":"44","author":"M Moshtaghi","year":"2011","unstructured":"Moshtaghi M, Havens T, Bezdek J, Park L, Leckie C, Rajasegarar S, Keller J, Palaniswami M (2011a) Clustering ellipses for anomaly detection. Pattern Recog 44(1):55\u201369","journal-title":"Pattern Recog"},{"key":"9370_CR61","doi-asserted-by":"crossref","unstructured":"Moshtaghi M, Leckie C, Karunasekera S, Bezdek J, Rajasegarar S, Palaniswami M (2011b) Incremental elliptical boundary estimation for anomaly detection in wireless sensor networks. In: 2011 IEEE 11th international conference on data mining (ICDM), pp 467\u2013476","DOI":"10.1109\/ICDM.2011.80"},{"key":"9370_CR62","doi-asserted-by":"crossref","unstructured":"Moshtaghi M, Rajasegarar S, Leckie C, Karunasekera S (2011c) An efficient hyperellipsoidal clustering algorithm for resource-constrained environments. Pattern Recog 44:2197\u20132209","DOI":"10.1016\/j.patcog.2011.03.007"},{"key":"9370_CR63","doi-asserted-by":"crossref","unstructured":"Ni L, Liu Y, Lau YC, Patil A (2003) Landmarc: indoor location sensing using active rfid. In: Proceedings of the first IEEE international conference on pervasive computing and communications, 2003 (PerCom 2003), March 2003, pp 407\u2013415","DOI":"10.1109\/PERCOM.2003.1192765"},{"key":"9370_CR64","doi-asserted-by":"crossref","unstructured":"Ozdemir S, Xiao Y (2011) Outlier detection based fault tolerant data aggregation for wireless sensor networks. In: 2011 5th IEEE international conference on application of information and communication technologies, pp 1\u20135","DOI":"10.1109\/ICAICT.2011.6110983"},{"key":"9370_CR65","doi-asserted-by":"crossref","unstructured":"Palpanas T, Papadopoulos D, Kalogeraki V, Gunopulos D (2003) Distributed deviation detection in sensor networks. SIGMOD Rec 32:77\u201382. doi: 10.1145\/959060.959074","DOI":"10.1145\/959060.959074"},{"key":"9370_CR66","unstructured":"Phua C, Lee V, Smith K, Gayler R (2010) A comprehensive survey of data mining-based fraud detection research. Arxiv, preprint arXiv:1009.6119"},{"key":"9370_CR67","unstructured":"Rajasegarar S, Leckie C, Palaniswami M, Bezdek JC (2006) Distributed anomaly detection in wireless sensor networks. In: 10th IEEE Singapore international conference on communication systems, 2006. ICCS 2006, Oct 2006, pp 1\u20135"},{"key":"9370_CR68","unstructured":"Rajasegarar S, Leckie C, Palaniswami M, Bezdek J (2007) Quarter sphere based distributed anomaly detection in wireless sensor networks. In: IEEE international conference on communications. ICC \u201907, June 2007, pp 3864\u20133869"},{"issue":"4","key":"9370_CR69","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MWC.2008.4599219","volume":"15","author":"S Rajasegarar","year":"2008","unstructured":"Rajasegarar S, Leckie C, Palaniswami M (2008a) Anomaly detection in wireless sensor networks. IEEE Wirel Commun 15(4):34\u201340","journal-title":"IEEE Wirel Commun"},{"key":"9370_CR70","doi-asserted-by":"crossref","unstructured":"Rajasegarar S, Leckie C, Palaniswami M (2008b) Cesvm: centered hyperellipsoidal support vector machine based anomaly detection. In: IEEE international conference on communications, 2008. ICC \u201908, May 2008, pp 1610\u20131614","DOI":"10.1109\/ICC.2008.311"},{"issue":"3","key":"9370_CR71","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1109\/TIFS.2010.2051543","volume":"5","author":"S Rajasegarar","year":"2010","unstructured":"Rajasegarar S, Leckie C, Bezdek J, Palaniswami M (2010a) Centered hyperspherical and hyperellipsoidal one-class support vector machines for anomaly detection in sensor networks. IEEE Trans Inf Forensic Secur 5(3):518\u2013533","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"9370_CR72","doi-asserted-by":"crossref","unstructured":"Rajasegarar S, Bezdek JC, Leckie C, Palaniswami M (2010b) Elliptical anomalies in wireless sensor networks. ACM Trans Sens Netw 6:7:1\u20137:28 [Online]. 10.1145\/1653760.1653767","DOI":"10.1145\/1653760.1653767"},{"key":"9370_CR73","doi-asserted-by":"crossref","unstructured":"Rajasegarar S, Bezdek J, Moshtaghi M, Leckie C, Havens T, Palaniswami M (2012) Measures for clustering and anomaly detection in sets of higher dimensional ellipsoids. In: The 2012 international joint conference on IEEE in neural networks (IJCNN), pp 1\u20138","DOI":"10.1109\/IJCNN.2012.6252703"},{"key":"9370_CR74","doi-asserted-by":"crossref","unstructured":"Ramaswamy S, Rastogi R, Shim K (2000) Efficient algorithms for mining outliers from large data sets. SIGMOD Rec 29:427\u2013438. doi: 10.1145\/335191.335437","DOI":"10.1145\/335191.335437"},{"key":"9370_CR75","doi-asserted-by":"crossref","unstructured":"Ross G, Tasoulis D, Adams N (2009) Online annotation and prediction for regime switching data streams. In: Proceedings of the 2009 ACM symposium on applied computing, pp 1501\u20131505","DOI":"10.1145\/1529282.1529617"},{"key":"9370_CR76","volume-title":"Robust regression and outlier detection","author":"P Rousseeuw","year":"1996","unstructured":"Rousseeuw P, Leroy A (1996) Robust regression and outlier detection. Wiley, London"},{"key":"9370_CR77","doi-asserted-by":"crossref","unstructured":"Schieferdecker D, V\u00f6lker M, Wagner D (2011) Efficient algorithms for distributed detection of holes and boundaries in wireless networks. Exp Algorithm 6630:388\u2013399","DOI":"10.1007\/978-3-642-20662-7_33"},{"key":"9370_CR78","doi-asserted-by":"crossref","unstructured":"Shahid N, Naqvi IH (2011) Energy efficient outlier detection in wsns based on temporal and attribute correlations. In: International conference on emerging technologies, 2011","DOI":"10.1109\/ICET.2011.6048470"},{"key":"9370_CR79","doi-asserted-by":"crossref","unstructured":"Shahid N, Naqvi IH, Qaisar SB (2012a) Quarter-sphere SVM: attribute and spatio-temporal correlations based outlier & event detection in wireless sensor networks. In: 2012 IEEE wireless communications and networking conference: mobile and wireless networks (IEEE WCNC 2012 track 3 mobile & wireless), France, Paris","DOI":"10.1109\/WCNC.2012.6214127"},{"key":"9370_CR80","doi-asserted-by":"crossref","unstructured":"Shahid N, Naqvi IH, Qaisar SB (2012b) Real time energy efficient approach to outlier & event detection in wireless sensor networks. In: 13th IEEE international conference on communication systems 2012 (IEEE ICCS\u201912), Singapore, Singapore","DOI":"10.1109\/ICCS.2012.6406130"},{"issue":"3","key":"9370_CR81","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1145\/1754414.1754419","volume":"6","author":"A Sharma","year":"2010","unstructured":"Sharma A, Golubchik L, Govindan R (2010) Sensor faults: detection methods and prevalence in real-world datasets. ACM Trans Sens Netw 6(3):23","journal-title":"ACM Trans Sens Netw"},{"key":"9370_CR82","doi-asserted-by":"crossref","unstructured":"Sheng B, Li Q, Mao W, jin W (2007) Outlier detection in sensor networks","DOI":"10.1145\/1288107.1288137"},{"key":"9370_CR83","doi-asserted-by":"crossref","unstructured":"Shnayder V, Hempstead M, rong Chen B, Allen GW, Welsh M (2004) Simulating the power consumption of large-scale sensor network applications. In: In Sensys. ACM Press, pp 188\u2013200","DOI":"10.1145\/1031495.1031518"},{"key":"9370_CR84","doi-asserted-by":"crossref","unstructured":"Somorjai R, Dolenko B, Nikulin A, Roberson W, Thiessen N (2011) Class proximity measures-dissimilarity-based classification and display of high-dimensional data. J Biomed Inf 44(5):775\u2013788","DOI":"10.1016\/j.jbi.2011.04.004"},{"key":"9370_CR85","unstructured":"Subramaniam S, Palpanas T, Papadopoulos D, Kalogeraki V, Gunopulos D (2006) Online outlier detection in sensor data using non-parametric models. In: Proceedings of the 32nd international conference on very large data bases, series VLDB \u201906. VLDB endowment, pp 187\u2013198. Available on http:\/\/portal.acm.org\/citation.cfm?id=1182635.1164145"},{"key":"9370_CR86","doi-asserted-by":"crossref","unstructured":"Suthaharan S, Alzahrani M, Rajasegarar S, Leckie C, Palaniswami M (2010a) Labelled data collection for anomaly detection in wireless sensor networks. In: 2010 sixth international conference on intelligent sensors, sensor networks and information processing (ISSNIP), Dec 2010, pp 269\u2013274","DOI":"10.1109\/ISSNIP.2010.5706782"},{"key":"9370_CR87","doi-asserted-by":"crossref","unstructured":"Suthaharan S, Leckie C, Moshtaghi M, Karunasekera S, Rajasegarar S (2010b) Sensor data boundary estimation for anomaly detection in wireless sensor networks. In: 2010 IEEE 7th international conference on mobile adhoc and sensor systems (MASS), pp 546\u2013551","DOI":"10.1109\/MASS.2010.5663896"},{"key":"9370_CR88","volume-title":"Introduction to data mining","author":"P Tan","year":"2006","unstructured":"Tan P, Steinback M, Kumar V (2006) Introduction to data mining. Addison Wesley, Reading"},{"key":"9370_CR89","unstructured":"Tax DMJ, Duin RPW (1999) Data domain description using support vectors. In: ESANN\u201999, pp 251\u2013256"},{"key":"9370_CR90","unstructured":"Tutorial on wireless communications and electronic tracking, 2009"},{"issue":"6","key":"9370_CR91","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.1109\/TSMCB.2006.876189","volume":"36","author":"D Wang","year":"2006","unstructured":"Wang D, Yeung DS, Tsang ECC (2006) Structured one-class classification. IEEE Trans Syst Man Cybern Part B Cybern 36(6):1283\u20131295","journal-title":"IEEE Trans Syst Man Cybern Part B Cybern"},{"key":"9370_CR92","doi-asserted-by":"crossref","unstructured":"Wu W, Cheng X, Ding M, Xing K, Liu F, Deng P (2007) Localized outlying and boundary data detection in sensor networks. IEEE Trans Knowl Data Eng 19(8):1145\u20131157","DOI":"10.1109\/TKDE.2007.1067"},{"key":"9370_CR93","doi-asserted-by":"crossref","unstructured":"Xu T (2009) A new sphere-structure multi-class classifier. In: Pacific-Asia conference on circuits, communications and systems, 2009. PACCS\u201909. IEEE, pp 520\u2013525","DOI":"10.1109\/PACCS.2009.64"},{"key":"9370_CR94","doi-asserted-by":"crossref","unstructured":"Xu T, He D, Luo Y (2007) A new orientation for multi-class svm. In: Eighth ACIS international conference on software engineering, artificial intelligence, networking, and parallel\/distributed computing, 2007. SNPD 2007, vol 3. IEEE, pp 899\u2013904","DOI":"10.1109\/SNPD.2007.209"},{"key":"9370_CR95","doi-asserted-by":"crossref","unstructured":"Xue W, Luo Q, Chen L, Liu Y (2006) Contour map matching for event detection in sensor networks. In: Proceedings of the 2006 ACM SIGMOD international conference on management of data, series SIGMOD \u201906. ACM, New York, NY, 2006, pp 145\u2013156. doi: 10.1145\/1142473.1142491","DOI":"10.1145\/1142473.1142491"},{"key":"9370_CR96","unstructured":"Yang Z, Meratnia N, Havinga P (2008) An online outlier detection technique for wireless sensor networks using unsupervised quarter-sphere support vector machine. In: International conference on intelligent sensors, sensor networks and information processing, 2008. ISSNIP 2008, pp 151\u2013156"},{"key":"9370_CR97","unstructured":"Yozo CP, Hida Y, Huang P, Nishtala R (2004) Aggregation query under uncertainty in sensor networks, technical report"},{"key":"9370_CR98","unstructured":"Zhang Y (2010) Observing the unobservable\u2014distributed online outlier detection in wireless sensor networks. Ph.D. dissertation, University of Twente"},{"key":"9370_CR99","unstructured":"Zhang Y, Meratnia N, Havinga PJM (2007a) A taxonomy framework for unsupervised outlier detection techniques for multi-type data sets. Centre for Telematics and Information Technology University of Twente, Enschede, technical report TR-CTIT-07-79, Nov 2007. http:\/\/eprints.eemcs.utwente.nl\/11366\/"},{"key":"9370_CR100","doi-asserted-by":"crossref","unstructured":"Zhang K, Shi S, Gao H, Li J, (2007b) Unsupervised outlier detection in sensor networks using aggregation tree. In: Proceedings of the 3rd international conference on advanced data mining and applications, series ADMA \u201907. Springer, Berlin\/Heidelberg, pp 158\u2013169. [Online]. Available http:\/\/dx.doi.org\/10.1007\/978-3-540-73871-8_16","DOI":"10.1007\/978-3-540-73871-8_16"},{"key":"9370_CR101","doi-asserted-by":"crossref","unstructured":"Zhang Y, Meratnia N, Havinga P (2009a) Adaptive and online one-class support vector machine-based outlier detection techniques for wireless sensor networks. In: Proceedings of international conference on advanced information networking and applications workshops WAINA \u201909, pp 990\u2013995","DOI":"10.1109\/WAINA.2009.200"},{"key":"9370_CR102","doi-asserted-by":"crossref","unstructured":"Zhang Y, Meratnia N, Havinga PJM (2009b) Hyperellipsoidal svm-based outlier detection technique for geosensor networks. In: Third international conference on geosensor networks, Oxford, UK, series lecture notes in computer science, vol 5659. Springer, Berlin, July 2009, pp 31\u201341","DOI":"10.1007\/978-3-642-02903-5_4"},{"issue":"2","key":"9370_CR103","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1109\/SURV.2010.021510.00088","volume":"12","author":"Y Zhang","year":"2010","unstructured":"Zhang Y, Meratnia N, Havinga P (2010) Outlier detection techniques for wireless sensor networks: a survey. IEEE Commun Surv Tutor 12(2):159\u2013170","journal-title":"IEEE Commun Surv Tutor"},{"key":"9370_CR104","doi-asserted-by":"crossref","unstructured":"Zhang Y, Hamm NAS, Meratnia N, Stein A, van de Voort M, Havinga PJM (2012) Statistics-based outlier detection for wireless sensor networks. Int J Geogr Inf Sci 26(8):1373\u20131392","DOI":"10.1080\/13658816.2012.654493"},{"key":"9370_CR105","unstructured":"Zhuang Y, Chen L (2006) In-network outlier cleaning for data collection in sensor networks. In: In CleanDB, workshop in VLDB. APPENDIX 2006, pp 41\u201348"},{"key":"9370_CR106","doi-asserted-by":"crossref","unstructured":"Zoumboulakis M, Roussos G (2007) Escalation: complex event detection in wireless sensor networks. Smart Sens Context 4793:270\u2013285","DOI":"10.1007\/978-3-540-75696-5_17"}],"container-title":["Artificial Intelligence Review"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-012-9370-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10462-012-9370-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-012-9370-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,20]],"date-time":"2025-04-20T22:27:04Z","timestamp":1745188024000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10462-012-9370-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11,16]]},"references-count":106,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,2]]}},"alternative-id":["9370"],"URL":"https:\/\/doi.org\/10.1007\/s10462-012-9370-y","relation":{},"ISSN":["0269-2821","1573-7462"],"issn-type":[{"value":"0269-2821","type":"print"},{"value":"1573-7462","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,11,16]]}}}