{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T14:55:33Z","timestamp":1770821733133,"version":"3.50.1"},"reference-count":138,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2013,1,29]],"date-time":"2013-01-29T00:00:00Z","timestamp":1359417600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Artif Intell Rev"],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1007\/s10462-013-9395-x","type":"journal-article","created":{"date-parts":[[2013,1,28]],"date-time":"2013-01-28T04:17:30Z","timestamp":1359346650000},"page":"515-563","source":"Crossref","is-referenced-by-count":55,"title":["One-class support vector machines: analysis of outlier detection for wireless sensor networks in harsh environments"],"prefix":"10.1007","volume":"43","author":[{"given":"Nauman","family":"Shahid","sequence":"first","affiliation":[]},{"given":"Ijaz Haider","family":"Naqvi","sequence":"additional","affiliation":[]},{"given":"Saad Bin","family":"Qaisar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,1,29]]},"reference":[{"key":"9395_CR1","doi-asserted-by":"crossref","unstructured":"Abe S (2010) Support vector machines for pattern classification. Springer New York Inc","DOI":"10.1007\/978-1-84996-098-4"},{"key":"9395_CR2","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38:393\u2013422","journal-title":"Comput Netw"},{"key":"9395_CR3","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/S1389-1286(03)00345-1","volume":"43","author":"IF Akyildiz","year":"2003","unstructured":"Akyildiz IF, Akan \u00d6zg\u00fcr B (2003) Interplanetary internet: state-of-the-art and research challenges. Comput Netw 43:75\u2013112","journal-title":"Comput Netw"},{"key":"9395_CR4","unstructured":"Aly M (2005) Survey on multiclass classification methods. Neural Netw pp 1\u20139"},{"key":"9395_CR5","doi-asserted-by":"crossref","unstructured":"Ambwani T (2003) Multi class support vector machine implementation to intrusion detection. In: Neural networks, 2003. Proceedings of the international joint conference on, vol. 3. IEEE, pp 2300\u20132305","DOI":"10.1109\/IJCNN.2003.1223770"},{"issue":"2","key":"9395_CR6","doi-asserted-by":"crossref","first-page":"215","DOI":"10.30638\/eemj.2010.031","volume":"9","author":"M Bahrepour","year":"2010","unstructured":"Bahrepour M, Meratnia N, Havinga PJM (2010) Fast and accurate residential fire detection using wireless sensor networks. Environ Eng Manag J 9(2):215\u2013221","journal-title":"Environ Eng Manag J"},{"key":"9395_CR7","unstructured":"Bahrepour M, Meratnia N, Poel M, Taghikhaki Z, Havinga PJM (November 2010) Distributed event detection in wireless sensor networks for disaster management. In: International conference on intelligent networking and collaborative systems, INCoS (2010) Thessaloniki. Greece. IEEE Computer Society, USA, pp 507\u2013512"},{"key":"9395_CR8","doi-asserted-by":"crossref","unstructured":"Bahrepour M, van der Zwaag BJ, Meratnia N, Havinga PJM (2010) Fire data analysis and feature reduction using computational intelligence methods. In: Phillips-Wren G, Jain LC, Nakamatsu K, (eds) Advances in intelligent decision technologies. In: Proceedings of the second KES international symposium IDT 2010, Baltimore, Maryland, USA ser. Smart innovation, systems and technologies vol 4. Springer, Berlin Heidelberg, pp 289\u2013298","DOI":"10.1007\/978-3-642-14616-9_28"},{"key":"9395_CR9","unstructured":"Bahrepour M, Zhang Y, Meratnia N, Havinga PJM (December 2009) Use of event detection approaches for outlier detection in wireless sensor networks. In: Proceedings of symposium on theoretical and practical aspects of large-scale wireless sensor networks, The 5th international conference on intelligent sensors, sensor networks and information processing (2009) (ISSNIP 2009), Melbourne. Australia. IEEE Press, Victorian, pp 439\u2013444"},{"key":"9395_CR10","volume-title":"Outliers in statistical data","author":"V Barnett","year":"1994","unstructured":"Barnett V, Lewis T (1994) Outliers in statistical data. Wiley, New York"},{"key":"9395_CR11","doi-asserted-by":"crossref","unstructured":"Bettencourt LMA, Hagberg AA, Larkey LB (Jun 2007) Separating the wheat from the chaff: practical anomaly detection schemes in ecological applications of distributed sensor networks. In: Distributed computing in sensor systems (DCOSS 2007). Santa Fe, NM USA, pp 223\u2013239","DOI":"10.1007\/978-3-540-73090-3_15"},{"issue":"2","key":"9395_CR12","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MCI.2011.940751","volume":"6","author":"J Bezdek","year":"2011","unstructured":"Bezdek J, Rajasegarar S, Moshtaghi M, Leckie C, Palaniswami M, Havens T (2011) Anomaly detection in environmental monitoring networks [application notes]. IEEE Comput Intell Mag 6(2):52\u201358","journal-title":"IEEE Comput Intell Mag"},{"key":"9395_CR13","doi-asserted-by":"crossref","unstructured":"Bezdek J, Havens T, Keller J, Leckie C, Park L, Palaniswami M, Rajasegarar S (July 2010) Clustering elliptical anomalies in sensor networks. In: Fuzzy systems (FUZZ), 2010 IEEE international conference on, pp 1\u20138","DOI":"10.1109\/FUZZY.2010.5584464"},{"key":"9395_CR14","doi-asserted-by":"crossref","first-page":"33","DOI":"10.3233\/HSN-2006-276","volume":"15","author":"V Bhuse","year":"2006","unstructured":"Bhuse V, Gupta A (2006) Anomaly intrusion detection in wireless sensor networks. J High Speed Netw 15:33\u201351","journal-title":"J High Speed Netw"},{"key":"9395_CR15","unstructured":"Bishop C (2006) Pattern recognition and machine learning, ser. Information science and statistics. Springer, [Online]. Available: http:\/\/books.google.com.pk\/books?id=kTNoQgAACAAJ"},{"key":"9395_CR16","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511804441","volume-title":"Convex optimization","author":"S Boyd","year":"2004","unstructured":"Boyd S, Vandenberghe L (2004) Convex optimization. Cambridge university press, Cambridge"},{"key":"9395_CR17","doi-asserted-by":"crossref","unstructured":"Branch J, Szymanski B, Giannella C, Wolff R, Kargupta H (2006) In-network outlier detection in wireless sensor networks. In: Distributed computing systems, 2006. ICDCS 2006. 26th IEEE international conference on, p 51","DOI":"10.1109\/ICDCS.2006.49"},{"issue":"1","key":"9395_CR18","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1023\/A:1008663629662","volume":"12","author":"E Bredensteiner","year":"1999","unstructured":"Bredensteiner E, Bennett K (1999) Multicategory classification by support vector machines. Comput Optim Appl 12(1):53\u201379","journal-title":"Comput Optim Appl"},{"issue":"2","key":"9395_CR19","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1080\/15501320590966422","volume":"1","author":"R Cardell-Olivera","year":"2005","unstructured":"Cardell-Olivera R, Kranza M, Smettemb K, Mayerc K (2005) A reactive soil moisture sensor network: design and field evaluation. Int J Distrib Sens Netw 1(2):149\u2013162","journal-title":"Int J Distrib Sens Netw"},{"key":"9395_CR20","doi-asserted-by":"crossref","unstructured":"Chandola V, Banerjee A, Kumar V (July 2009) Anomaly detection: a survey, ACM Comput. Surv., vol. 41, pp 15:1\u201315:58. [Online]. Available: http:\/\/doi.acm.org\/10.1145\/1541880.1541882","DOI":"10.1145\/1541880.1541882"},{"key":"9395_CR21","doi-asserted-by":"crossref","unstructured":"Chen J, Kher S, Somani A (2006) Distributed fault detection of wireless sensor networks. In: Proceedings of the 2006 workshop on dependability issues in wireless ad hoc networks and sensor networks, ser. DIWANS \u201906. New York, NY, USA: ACM, pp 65\u201372. [Online]. Available: http:\/\/doi.acm.org\/10.1145\/1160972.1160985","DOI":"10.1145\/1160972.1160985"},{"issue":"3","key":"9395_CR22","first-page":"47","volume":"2","author":"S Cheong","year":"2004","unstructured":"Cheong S, Oh S, Lee S (2004) Support vector machines with binary tree architecture for multi-class classification. Neural Inf Process Lett Rev 2(3):47\u201351","journal-title":"Neural Inf Process Lett Rev"},{"key":"9395_CR23","doi-asserted-by":"crossref","unstructured":"da Silva APR, Martins MHT, Rocha BPS, Loureiro AAF, Ruiz LB, Wong HC (2005) Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the 1st ACM international workshop on quality of service & security in wireless and mobile networks, ser. Q2SWinet \u201905. New York, NY, USA: ACM, pp 16\u201323. [Online]. Available: http:\/\/doi.acm.org\/10.1145\/1089761.1089765","DOI":"10.1145\/1089761.1089765"},{"key":"9395_CR24","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1016\/j.adhoc.2005.01.004","volume":"3","author":"IA Dario","year":"2005","unstructured":"Dario IA, Akyildiz IF, Pompili D, Melodia T (2005) Underwater acoustic sensor networks: research challenges. Ad Hoc Netw Elsevier 3:257\u2013279","journal-title":"Ad Hoc Netw Elsevier"},{"issue":"1","key":"9395_CR25","first-page":"3","volume":"8","author":"E Dereszynski","year":"2011","unstructured":"Dereszynski E, Dietterich T (2011) Spatiotemporal models for data-anomaly detection in dynamic environmental monitoring campaigns. ACM Trans Sens Netw (TOSN) 8(1):3","journal-title":"ACM Trans Sens Netw (TOSN)"},{"key":"9395_CR26","doi-asserted-by":"crossref","unstructured":"Ding M, Cheng X (april 2009) Robust event boundary detection in sensor networks\u2013a mixture model based approach. In: INFOCOM 2009, IEEE, pp 2991\u20132995","DOI":"10.1109\/INFCOM.2009.5062273"},{"key":"9395_CR27","doi-asserted-by":"crossref","unstructured":"Ding M, Chen D, Xing K, Cheng X (march 2005) Localized fault-tolerant event boundary detection in sensor networks. In: INFOCOM 2005. 24th annual joint conference of the IEEE computer and communications societies. Proceedings IEEE, vol. 2, pp 902\u2013913 vol. 2","DOI":"10.1109\/INFCOM.2005.1498320"},{"key":"9395_CR28","doi-asserted-by":"crossref","unstructured":"Ding X, Li Y, Belatreche A, Maguire L (2012) Constructing minimum volume surfaces using level set methods for novelty detection. In: Neural networks (IJCNN), The 2012 international joint conference on. IEEE, pp 1\u20136","DOI":"10.1109\/IJCNN.2012.6252804"},{"key":"9395_CR29","first-page":"681","volume":"14","author":"A Elisseeff","year":"2002","unstructured":"Elisseeff A, Weston J (2002) Kernel methods for multi-labelled classification and categorical regression problems. Adv Neural Inf Process Syst 14:681\u2013687","journal-title":"Adv Neural Inf Process Syst"},{"key":"9395_CR30","doi-asserted-by":"crossref","unstructured":"Elnahrawy E, Nath B (2004) Context-aware sensors. European workshop on wireless sensor, networks, In, pp 77\u201393","DOI":"10.1007\/978-3-540-24606-0_6"},{"key":"9395_CR31","doi-asserted-by":"crossref","unstructured":"Franc V, Hlav\u00e1c V (2002) Multi-class support vector machine. In: Pattern Recognition, 2002. Proceedings. 16th International Conference on, vol. 2. IEEE, pp 236\u2013239","DOI":"10.1109\/ICPR.2002.1048282"},{"key":"9395_CR32","doi-asserted-by":"crossref","DOI":"10.1201\/9781420082333","volume-title":"Knowledge discovery from sensor data","author":"AR Ganguly","year":"2008","unstructured":"Ganguly AR (2008) Knowledge discovery from sensor data. CRC Press, Boca Raton"},{"issue":"3","key":"9395_CR33","first-page":"264","volume":"7","author":"CF Garc\u00eda-Hern\u00e1ndez","year":"2007","unstructured":"Garc\u00eda-Hern\u00e1ndez CF, Ibarg\u00fcengoytia-Gonz\u00e1lez PH, Garc\u00eda-Hern\u00e1ndez J, P\u00e9rez-D\u00edaz JA (2007) Wireless sensor networks and applications: a survey. IJCSNS Int J Comput Sci Netw Secur 7(3):264\u2013273","journal-title":"IJCSNS Int J Comput Sci Netw Secur"},{"issue":"3","key":"9395_CR34","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1109\/MCOM.2010.5434384","volume":"48","author":"S George","year":"2010","unstructured":"George S, Zhou W, Chenji H, Won M, Lee Y, Pazarloglou A, Stoleru R, Barooah P (2010) Distressnet: a wireless ad hoc and sensor network architecture for situation management in disaster response. IEEE Commun Mag 48(3):128\u2013136","journal-title":"IEEE Commun Mag"},{"key":"9395_CR35","doi-asserted-by":"crossref","unstructured":"Giatrakos N, Kotidis Y, Deligiannakis A (2010) Pao: power-efficient attribution of outliers in wireless sensor networks. In: Proceedings of the seventh international workshop on data management for sensor networks. ACM, pp 33\u201338","DOI":"10.1145\/1858158.1858168"},{"key":"9395_CR36","doi-asserted-by":"crossref","unstructured":"Giatrakos N, Kotidis Y, Deligiannakis A, Vassalos V, Theodoridis Y (2010) Taco: tunable approximate computation of outliers in wireless sensor networks. In: Proceedings of the 2010 international conference on management of data. ACM, pp 279\u2013290","DOI":"10.1145\/1807167.1807199"},{"issue":"6","key":"9395_CR37","doi-asserted-by":"crossref","first-page":"2975","DOI":"10.1109\/TSP.2011.2125961","volume":"59","author":"V Gomez-Verdejo","year":"2011","unstructured":"Gomez-Verdejo V, Arenas-Garcia J, Lazaro-Gredilla M, Navia-Vazquez A (2011) Adaptive one-class support vector machine. IEEE Trans Signal Process 59(6):2975\u20132981","journal-title":"IEEE Trans Signal Process"},{"key":"9395_CR38","unstructured":"Han J, Kamber M (2006) Data mining: concepts and techniques. Morgan Kaufmann"},{"issue":"2","key":"9395_CR39","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1007\/s10489-007-0101-z","volume":"30","author":"P Hao","year":"2009","unstructured":"Hao P, Chiang J, Lin Y (2009) A new maximal-margin spherical-structured multi-class support vector machine. Appl Intell 30(2):98\u2013111","journal-title":"Appl Intell"},{"key":"9395_CR40","unstructured":"Hassan A et al. (2011) A heuristic approach for sensor network outlier detection. Int J Res Rev Wirel Sens Netw (IJRRWSN) 1(4):"},{"key":"9395_CR41","volume-title":"Learning kernel classifiers: theory and algorithms","author":"R Herbrich","year":"2002","unstructured":"Herbrich R (2002) Learning kernel classifiers: theory and algorithms. The MIT press, Cambridge"},{"key":"9395_CR42","unstructured":"Hill DJ, Minsker BS, Amir E (2007) Real-time bayesian anomaly detection for environmental sensor data. In: In Proceedings of the 32nd conference of IAHR"},{"key":"9395_CR43","doi-asserted-by":"crossref","unstructured":"Hofmann T, Sch\u00f6lkopf B, Smola A (2008) Kernel methods in machine learning. Ann Stat, pp 1171\u20131220","DOI":"10.1214\/009053607000000677"},{"issue":"2","key":"9395_CR44","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1109\/72.991427","volume":"13","author":"C Hsu","year":"2002","unstructured":"Hsu C, Lin C (2002) A comparison of methods for multiclass support vector machines. IEEE Trans Neural Netw 13(2):415\u2013425","journal-title":"IEEE Trans Neural Netw"},{"key":"9395_CR45","unstructured":"http:\/\/connekt.seecs.nust.edu.pk\/SAHSE.php"},{"key":"9395_CR46","unstructured":"http:\/\/www.genuki.org.uk\/big\/eng\/LAN\/Haydock\/WoodPitExplosion.html"},{"key":"9395_CR47","unstructured":"http:\/\/www.humanite.fr\/2006-03-10Societe-Catastrophe-de-Courrieres-une-expression-impropre"},{"key":"9395_CR48","unstructured":"http:\/\/www.msha.gov\/MSHAINFO\/FactSheets\/MSHAFCT8.HTM"},{"key":"9395_CR49","doi-asserted-by":"crossref","unstructured":"Janakiram D, Adi Mallikarjuna Reddy V, Phani Kumar A (2006) Outlier detection in wireless sensor networks using bayesian belief networks. In: Communication system software and middleware, 2006. Comsware 1\u20136","DOI":"10.1109\/COMSWA.2006.1665221"},{"key":"9395_CR50","unstructured":"John GH (1995) Robust decision trees: removing outliers from databases. In: In Knowledge discovery and data mining. AAAI Press, pp 174\u2013179"},{"key":"9395_CR51","doi-asserted-by":"crossref","unstructured":"Jun MC, Jeong H, Kuo C-CJ (2005) Distributed spatio-temporal outlier detection in sensor networks","DOI":"10.1117\/12.604764"},{"key":"9395_CR52","unstructured":"Katdare M (2011) Pattern based outlier detection in mixed-attribute datasets"},{"key":"9395_CR53","unstructured":"Keally M, Zhou G, Xing G (2010) Watchdog: confident event detection in heterogeneous sensor networks. In: Real-time and embedded technology and applications symposium (RTAS), (2010) 16th IEEE. IEEE 2010:279\u2013288"},{"key":"9395_CR54","doi-asserted-by":"crossref","unstructured":"Kecman V (2005) Support vector machines-an introduction, support vector machines: theory and applications, pp 605\u2013605","DOI":"10.1007\/10984697_1"},{"key":"9395_CR55","doi-asserted-by":"crossref","unstructured":"Keerthi S, Sundararajan S, Chang K, Hsieh C, Lin C (2008) A sequential dual method for large scale multi-class linear svms. In: Proceeding of the 14th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, pp 408\u2013416","DOI":"10.1145\/1401890.1401942"},{"issue":"3","key":"9395_CR56","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1109\/TC.2004.1261832","volume":"53","author":"B Krishnamachari","year":"2004","unstructured":"Krishnamachari B, Iyengar S (2004) Distributed bayesian algorithms for fault-tolerant event region detection in wireless sensor networks. IEEE Trans Comput 53(3):241\u2013250","journal-title":"IEEE Trans Comput"},{"key":"9395_CR57","doi-asserted-by":"crossref","unstructured":"Laskov P, Sch\u00e4fer C, Kotenko I (2004) Intrusion detection in unlabeled data with quarter-sphere support vector machines. In: Proceedings DIMVA, pp 71\u201382","DOI":"10.1515\/PIKO.2004.228"},{"key":"9395_CR58","doi-asserted-by":"crossref","unstructured":"Lazarevic A, Ozgur A, Ertoz L, Srivastava J, Kumar V (2003) A comparative study of anomaly detection schemes in network intrusion detection. In: In proceedings of the third SIAM international conference on data mining","DOI":"10.1137\/1.9781611972733.3"},{"key":"9395_CR59","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1016\/j.proenv.2011.12.040","volume":"11","author":"Z Liu","year":"2011","unstructured":"Liu Z (2011) A method of svm with normalization in intrusion detection. Procedia Environ Sci 11:256\u2013262","journal-title":"Procedia Environ Sci"},{"key":"9395_CR60","doi-asserted-by":"crossref","unstructured":"Liu S, Liu Y, Wang B (2007) An improved hyper-sphere support vector machine. In: Natural computation, 2007. ICNC 2007. Third international conference on, vol. 1. IEEE, pp 497\u2013500","DOI":"10.1109\/ICNC.2007.213"},{"key":"9395_CR61","doi-asserted-by":"crossref","unstructured":"Liu C, Yang Y, Tang C (2010) An improved method for multi-class support vector machines. In: Measuring technology and mechatronics automation (ICMTMA), 2010 international conference on, vol. 1. IEEE, pp 504\u2013508","DOI":"10.1109\/ICMTMA.2010.34"},{"issue":"1","key":"9395_CR62","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/TC.2006.13","volume":"55","author":"X Luo","year":"2006","unstructured":"Luo X, Dong M, Huang Y (2006) On distributed fault-tolerant detection in wireless sensor networks. IEEE Trans Comput 55(1):58\u201370","journal-title":"IEEE Trans Comput"},{"key":"9395_CR63","doi-asserted-by":"crossref","first-page":"226","DOI":"10.4028\/www.scientific.net\/AMM.320.226","volume":"249","author":"S Ma","year":"2013","unstructured":"Ma S, Wang J, Liu Z, Jiang H (2013) Density-based distributed elliptical anomaly detection in wireless sensor networks. Appl Mech Mater 249:226\u2013230","journal-title":"Appl Mech Mater"},{"key":"9395_CR64","doi-asserted-by":"crossref","unstructured":"Madden S, Franklin MJ, Hellerstein JM, Hong W (2002) Tag: a tiny aggregation service for ad-hoc sensor networks, in IN OSDI","DOI":"10.1145\/1060289.1060303"},{"key":"9395_CR65","doi-asserted-by":"crossref","unstructured":"Mainwaring A, Culler D, Polastre J, Szewczyk R, Anderson J (2002) Wireless sensor networks for habitat monitoring. In: Proceedings of the 1st ACM international workshop on wireless sensor networks and applications, ser. WSNA \u201902. New York, NY, USA: ACM, pp 88\u201397. [Online]. Available: http:\/\/doi.acm.org\/10.1145\/570738.570751","DOI":"10.1145\/570738.570751"},{"key":"9395_CR66","doi-asserted-by":"crossref","unstructured":"Mayoraz E, Alpaydin E (1999) Support vector machines for multi-class classification. Engineering Applications of Bio-Inspired Artificial, Neural Networks, pp 833\u2013842","DOI":"10.1007\/BFb0100551"},{"key":"9395_CR67","doi-asserted-by":"crossref","unstructured":"McDonald D, Madria S, Ercal F, Birmingham R, Lake T (2012) Ctod: collaborative tree-based outlier detection in wireless sensor networks. In: Proceedings of the 10th ACM international symposium on Mobility management and wireless access. ACM, pp 1\u201310","DOI":"10.1145\/2386995.2386997"},{"issue":"4","key":"9395_CR68","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MCOM.2010.5439078","volume":"48","author":"P Misra","year":"2010","unstructured":"Misra P, Kanhere S, Ostry D, Jha S (2010) Safety assurance and rescue communication systems in high-stress environments: a mining case study. IEEE Commun Mag 48(4):66\u201373","journal-title":"IEEE Commun Mag"},{"issue":"1","key":"9395_CR69","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.patcog.2010.07.024","volume":"44","author":"M Moshtaghi","year":"2011","unstructured":"Moshtaghi M, Havens T, Bezdek J, Park L, Leckie C, Rajasegarar S, Keller J, Palaniswami M (2011) Clustering ellipses for anomaly detection. Pattern Recognit 44(1):55\u201369","journal-title":"Pattern Recognit"},{"key":"9395_CR70","doi-asserted-by":"crossref","unstructured":"Moshtaghi M, Bezdek J, Havens T, Leckie C, Karunasekera S, Rajasegarar S, Palaniswami M (2012) Streaming analysis in wireless sensor networks. Wirel Commun Mob Comput","DOI":"10.1002\/wcm.2248"},{"key":"9395_CR71","unstructured":"Moshtaghi M, Leckie C, Karunasekera S, Bezdek J, Rajasegarar S, Palaniswami M (2011) Incremental elliptical boundary estimation for anomaly detection in wireless sensor networks in Data Mining (ICDM), 2011 IEEE 11th International Conference on. IEEE, pp 467\u2013476"},{"key":"9395_CR72","doi-asserted-by":"crossref","unstructured":"Moshtaghi M, Rajasegarar S, Leckie C, Karunasekera S (2011) An efficient hyperellipsoidal clustering algorithm for resource-constrained environments. Pattern Recognit","DOI":"10.1016\/j.patcog.2011.03.007"},{"issue":"4","key":"9395_CR73","doi-asserted-by":"crossref","first-page":"1091","DOI":"10.1109\/TNN.2006.875968","volume":"17","author":"A Navia-Vazquez","year":"2006","unstructured":"Navia-Vazquez A, Gutierrez-Gonzalez D, Parrado-Hernandez E, Navarro-Abellan J (2006) Distributed support vector machines. IEEE Trans Neural Netw 17(4):1091\u20131097","journal-title":"IEEE Trans Neural Netw"},{"key":"9395_CR74","doi-asserted-by":"crossref","unstructured":"Nguyen X, Huang L, Joseph A (2008) Support vector machines, data reduction, and approximate kernel matrices. Mach Learn Knowl Discov Databases, pp 137\u2013153","DOI":"10.1007\/978-3-540-87481-2_10"},{"key":"9395_CR75","unstructured":"Ni L, Liu Y, Lau YC, Patil A, (march 2003) Landmarc: indoor location sensing using active rfid, in pervasive computing and communications, (2003) PerCom 2003. In: Proceedings of the first IEEE international conference on, pp 407\u2013415"},{"key":"9395_CR76","doi-asserted-by":"crossref","unstructured":"O\u2019Reilly C, Gluhak A, Imran M, Rajasegarar S (2012) Online anomaly rate parameter tracking for anomaly detection in wireless sensor networks. In: Sensor, Mesh and Ad Hoc communications and networks (SECON), 2012 9th annual IEEE communications society conference on. IEEE, pp 191\u2013199","DOI":"10.1109\/SECON.2012.6275776"},{"key":"9395_CR77","doi-asserted-by":"crossref","unstructured":"Ozdemir S, Xiao Y (2011) Outlier detection based fault tolerant data aggregation for wireless sensor networks. In: Application of information and communication technologies (AICT), 2011 5th international conference on. IEEE, pp 1\u20135","DOI":"10.1109\/ICAICT.2011.6110983"},{"key":"9395_CR78","doi-asserted-by":"crossref","unstructured":"Ozdemir S, Xiao Y (2012) Ftda: outlier detection-based fault-tolerant data aggregation for wireless sensor networks. Secur Commun Netw","DOI":"10.1002\/sec.604"},{"key":"9395_CR79","doi-asserted-by":"crossref","unstructured":"Palpanas T, Papadopoulos D, Kalogeraki V, Gunopulos D (December 2003) Distributed deviation detection in sensor networks, SIGMOD Rec., vol. 32, pp 77\u201382. [Online]. Available: http:\/\/doi.acm.org\/10.1145\/959060.959074","DOI":"10.1145\/959060.959074"},{"key":"9395_CR80","doi-asserted-by":"crossref","unstructured":"Paschalidis IC, Chen Y (September 2010) Statistical anomaly detection with sensor networks. ACM Trans. Sen. Netw. vol. 7, pp. 17:1\u201317:23. [Online]. Available: http:\/\/doi.acm.org\/10.1145\/1824766.1824773","DOI":"10.1145\/1824766.1824773"},{"key":"9395_CR81","doi-asserted-by":"crossref","unstructured":"Pham N, Pagh R (2012) A near-linear time approximation algorithm for angle-based outlier detection in high-dimensional data","DOI":"10.1145\/2339530.2339669"},{"key":"9395_CR82","unstructured":"Phua C, Lee V, Smith K, Gayler R (2010) A comprehensive survey of data mining-based fraud detection research. Arxiv, preprint arXiv:1009.6119"},{"issue":"4","key":"9395_CR83","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MWC.2008.4599219","volume":"15","author":"S Rajasegarar","year":"2008","unstructured":"Rajasegarar S, Leckie C, Palaniswami M (2008) Anomaly detection in wireless sensor networks. IEEE Wirel Commun 15(4):34\u201340","journal-title":"IEEE Wirel Commun"},{"issue":"3","key":"9395_CR84","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1109\/TIFS.2010.2051543","volume":"5","author":"S Rajasegarar","year":"2010","unstructured":"Rajasegarar S, Leckie C, Bezdek J, Palaniswami M (2010) Centered hyperspherical and hyperellipsoidal one-class support vector machines for anomaly detection in sensor networks. IEEE Trans Inf Forensics Secur 5(3):518\u2013533","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9395_CR85","doi-asserted-by":"crossref","unstructured":"Rajasegarar S, Bezdek JC, Leckie C, Palaniswami M (January 2010) Elliptical anomalies in wireless sensor networks. ACM Trans. Sen. Netw. vol. 6, pp. 7:1\u20137:28. [Online]. Available: http:\/\/doi.acm.org\/10.1145\/1653760.1653767","DOI":"10.1145\/1653760.1653767"},{"key":"9395_CR86","doi-asserted-by":"crossref","unstructured":"Rajasegarar S, Bezdek J, Leckie C, Palaniswami M (oct 2007) Analysis of anomalies in ibrl data from a wireless sensor network deployment. In: Sensor technologies and applications, 2007. SensorComm 2007. tnternational conference on, pp 158\u2013163","DOI":"10.1109\/SENSORCOMM.2007.4394914"},{"key":"9395_CR87","doi-asserted-by":"crossref","unstructured":"Rajasegarar S, Bezdek J, Moshtaghi M, Leckie C, Havens T, Palaniswami M (2012) Measures for clustering and anomaly detection in sets of higher dimensional ellipsoids. In: Neural networks (IJCNN), The 2012 international joint conference on. IEEE, pp 1\u20138","DOI":"10.1109\/IJCNN.2012.6252703"},{"key":"9395_CR88","doi-asserted-by":"crossref","unstructured":"Rajasegarar S, Leckie C, Palaniswami M (may 2008) Cesvm: centered hyperellipsoidal support vector machine based anomaly detection. In: Communications, 2008. ICC \u201908. IEEE international conference on, pp 1610\u20131614","DOI":"10.1109\/ICC.2008.311"},{"key":"9395_CR89","doi-asserted-by":"crossref","unstructured":"Rajasegarar S, Leckie C, Palaniswami M, Bezdek J (june 2007) Quarter sphere based distributed anomaly detection in wireless sensor networks. In: IEEE international conference on communications, 2007. ICC \u201907, pp 3864\u20133869","DOI":"10.1109\/ICC.2007.637"},{"key":"9395_CR90","doi-asserted-by":"crossref","unstructured":"Rajasegarar S, Leckie C, Palaniswami M, Bezdek JC (oct 2006) Distributed anomaly detection in wireless sensor networks. In: Communication systems, 2006. ICCS 2006. 10th IEEE Singapore International Conference on pp 1\u20135","DOI":"10.1109\/ICCS.2006.301508"},{"key":"9395_CR91","doi-asserted-by":"crossref","unstructured":"Ross G, Tasoulis D, Adams N (2009) Online annotation and prediction for regime switching data streams. In: Proceedings of the 2009 ACM symposium on applied computing. ACM, pp 1501\u20131505","DOI":"10.1145\/1529282.1529617"},{"key":"9395_CR92","doi-asserted-by":"crossref","unstructured":"Saada M, Meng Q (2012) An efficient algorithm for anomaly detection in a flight system using dynamic bayesian networks. In: Neural information processing. Springer, pp 620\u2013628","DOI":"10.1007\/978-3-642-34487-9_75"},{"key":"9395_CR93","doi-asserted-by":"crossref","unstructured":"Schieferdecker D, V\u00f6lker M, Wagner D (2011) Efficient algorithms for distributed detection of holes and boundaries in wireless networks. Experimental Algorithms, pp 388\u2013399","DOI":"10.1007\/978-3-642-20662-7_33"},{"key":"9395_CR94","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4175.001.0001","volume-title":"Learning with kernels: support vector machines, regularization, optimization, and beyond","author":"B Scholkopf","year":"2001","unstructured":"Scholkopf B, Smola AJ (2001) Learning with kernels: support vector machines, regularization, optimization, and beyond. MIT Press, Cambridge"},{"key":"9395_CR95","doi-asserted-by":"crossref","unstructured":"Sch\u00f6lkopf B, Platt JC, Shawe-Taylor JC, Smola AJ, Williamson RC (July 2001) Estimating the support of a high-dimensional distribution, Neural Comput., vol. 13, pp. 1443\u20131471. [Online]. Available: http:\/\/portal.acm.org\/citation.cfm?id=1119748.1119749","DOI":"10.1162\/089976601750264965"},{"key":"9395_CR96","doi-asserted-by":"crossref","unstructured":"Schwenker F (2000) Hierarchical support vector machines for multi-class pattern recognition. In: Knowledge-based intelligent engineering systems and allied technologies, 2000. Proceedings. Fourth international conference on, vol. 2. IEEE, pp 561\u2013565","DOI":"10.1109\/KES.2000.884111"},{"key":"9395_CR97","doi-asserted-by":"crossref","unstructured":"Shahid N, Naqvi IH (2011) Energy efficient outlier detection in wsns based on temporal and attribute correlations. In: International conference on emerging technologies","DOI":"10.1109\/ICET.2011.6048470"},{"key":"9395_CR98","doi-asserted-by":"crossref","unstructured":"Shahid N, Naqvi IH, Qaisar SB, (2012) Quarter-Sphere SVM: attribute and Spatio-Temporal correlations based outlier & event detection in wireless sensor networks. In, (2012) IEEE wireless communications and networking conference: Mobile and Wireless Networks (IEEE WCNC 2012 Track 3 Mobile & Wireless). France, Apr, Paris","DOI":"10.1109\/WCNC.2012.6214127"},{"key":"9395_CR99","doi-asserted-by":"crossref","unstructured":"Shahid N, Naqvi IH, Qaisar SB (Nov 2012) Real time energy efficient approach to outlier & event detection in wireless sensor networks. In: 13th IEEE international conference on communication systems (2012) IEEE ICCS\u201912. Singapore, Singapore","DOI":"10.1109\/ICCS.2012.6406130"},{"key":"9395_CR100","doi-asserted-by":"crossref","unstructured":"Shahid N, Naqvi I, Qaisar S (2012) Characteristics and classification of outlier detection techniques for wireless sensor networks in harsh environments: a survey. Artif Intell Rev, pp 1\u201336. [Online]. Available: http:\/\/dx.doi.org\/10.1007\/s10462-012-9370-y","DOI":"10.1007\/s10462-012-9370-y"},{"issue":"3","key":"9395_CR101","first-page":"23","volume":"6","author":"A Sharma","year":"2010","unstructured":"Sharma A, Golubchik L, Govindan R (2010) Sensor faults: detection methods and prevalence in real-world datasets. ACM Trans Sens Netw (TOSN) 6(3):23","journal-title":"ACM Trans Sens Netw (TOSN)"},{"key":"9395_CR102","doi-asserted-by":"crossref","unstructured":"Sheng B, Li Q, Mao W, jin W (2007) Outlier detection in sensor networks","DOI":"10.1145\/1288107.1288137"},{"key":"9395_CR103","unstructured":"Smola A, Sch\u00f6lkopf B (1998) Learning with kernels. Citeseer."},{"key":"9395_CR104","doi-asserted-by":"crossref","unstructured":"Stankovic S, Rakocevic G, Kojic N, Milicev D (2012) A classification and comparison of data mining algorithms for wireless sensor networks. In: Industrial Technology (ICIT), 2012 IEEE international conference on. IEEE, pp 265\u2013270","DOI":"10.1109\/ICIT.2012.6209949"},{"key":"9395_CR105","first-page":"02","volume":"67","author":"I Steinwart","year":"2008","unstructured":"Steinwart I, Christmann A (2008) Support vector machines (information science & statistics). Recherche 67:02","journal-title":"Recherche"},{"key":"9395_CR106","unstructured":"Subramaniam S, Palpanas T, Papadopoulos D, Kalogeraki V, Gunopulos D (2006) Online outlier detection in sensor data using non-parametric models. In: Proceedings of the 32nd international conference on very large data bases, ser. VLDB \u201906. VLDB Endowment, pp 187\u2013198. [Online]. Available: http:\/\/portal.acm.org\/citation.cfm?id=1182635.1164145"},{"key":"9395_CR107","doi-asserted-by":"crossref","unstructured":"Suthaharan S (2012) An iterative ellipsoid-based anomaly detection technique for intrusion detection systems. In: Southeastcon, 2012 Proceedings of IEEE. IEEE, pp 1\u20136","DOI":"10.1109\/SECon.2012.6196956"},{"key":"9395_CR108","doi-asserted-by":"crossref","unstructured":"Suthaharan S, Alzahrani M, Rajasegarar S, Leckie C, Palaniswami M (dec 2010) Labelled data collection for anomaly detection in wireless sensor networks. In: Intelligent sensors, sensor networks and information processing (ISSNIP), 2010 sixth international conference on. pp 269\u2013274","DOI":"10.1109\/ISSNIP.2010.5706782"},{"key":"9395_CR109","doi-asserted-by":"crossref","unstructured":"Suthaharan S, Leckie C, Moshtaghi M, Karunasekera S, Rajasegarar S (2010) Sensor data boundary estimation for anomaly detection in wireless sensor networks. In: Mobile Adhoc and sensor systems (MASS), 2010 IEEE 7th international conference on. IEEE, pp 546\u2013551","DOI":"10.1109\/MASS.2010.5663896"},{"key":"9395_CR110","unstructured":"Tan P, Steinback M, Kumar V (2006) Introduction to data mining. Addison Wesley, Reading"},{"key":"9395_CR111","unstructured":"Tax DMJ, Duin RPW (1999) Data domain description using support vectors. In: ESANN\u201999, pp 251\u2013256"},{"issue":"1","key":"9395_CR112","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1023\/B:MACH.0000008084.60811.49","volume":"54","author":"D Tax","year":"2004","unstructured":"Tax D, Duin R (2004) Support vector data description. Mach Learn 54(1):45\u201366","journal-title":"Mach Learn"},{"key":"9395_CR113","doi-asserted-by":"crossref","unstructured":"Trinidad M, Valle M, Toledo C (2012) Indoors and outdoors event detection for embedded wireless sensors. Embedded systems and wireless technology, theory and practical applications, p 139","DOI":"10.1201\/b12298-7"},{"key":"9395_CR114","unstructured":"Tutorial on Wireless Communications and Electronic Tracking (2009)"},{"issue":"6","key":"9395_CR115","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.1109\/TSMCB.2006.876189","volume":"36","author":"D Wang","year":"2006","unstructured":"Wang D, Yeung DS, Tsang ECC (2006) Structured one-class classification. IEEE Trans Syst Man Cybern Part B Cybern 36(6):1283\u20131295","journal-title":"IEEE Trans Syst Man Cybern Part B Cybern"},{"issue":"6","key":"9395_CR116","first-page":"219","volume":"4","author":"J Weston","year":"1999","unstructured":"Weston J, Watkins C (1999) Support vector machines for multi-class pattern recognition. Proc seventh Eur Symp Artif Neural Netw 4(6):219\u2013224","journal-title":"Proc seventh Eur Symp Artif Neural Netw"},{"key":"9395_CR117","unstructured":"Weston J, Watkins C (1998) Multi-class support vector machines. Citeseer, Tech. Rep"},{"issue":"8","key":"9395_CR118","doi-asserted-by":"crossref","first-page":"1145","DOI":"10.1109\/TKDE.2007.1067","volume":"19","author":"W Wu","year":"2007","unstructured":"Wu W, Cheng X, Ding M, Xing K, Liu F, Deng P (2007) Localized outlying and boundary data detection in sensor networks. IEEE Trans Knowl Data Eng 19(8):1145\u20131157","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"9395_CR119","doi-asserted-by":"crossref","unstructured":"Xie M, Hu J, Han S, Chen H (2012) Scalable hyper-grid k-nn-based online anomaly detection in wireless sensor networks","DOI":"10.1109\/TrustCom.2012.173"},{"key":"9395_CR120","doi-asserted-by":"crossref","unstructured":"Xie M, Hu J, Tian B (2012) Histogram-based online anomaly detection in hierarchical wireless sensor networks. In: Trust, security and privacy in computing and communications (TrustCom), 2012 IEEE 11th international conference on. IEEE, pp 751\u2013759","DOI":"10.1109\/TrustCom.2012.173"},{"key":"9395_CR121","doi-asserted-by":"crossref","unstructured":"Xu T (2009) A new sphere-structure multi-class classifier. In: Circuits, communications and systems, 2009. PACCS\u201909. Pacific-Asia Conference on. IEEE, pp 520\u2013525","DOI":"10.1109\/PACCS.2009.64"},{"key":"9395_CR122","doi-asserted-by":"crossref","unstructured":"Xue W, Luo Q, Chen L, Liu Y (2006) Contour map matching for event detection in sensor networks. In: Proceedings of the 2006 ACM SIGMOD international conference on Management of data, ser. SIGMOD \u201906. New York, NY, USA: ACM, pp. 145\u2013156. [Online]. Available: http:\/\/doi.acm.org\/10.1145\/1142473.1142491","DOI":"10.1145\/1142473.1142491"},{"key":"9395_CR123","doi-asserted-by":"crossref","unstructured":"Xu T, He D, Luo Y (2007) A new orientation for multi-class svm. In: Software engineering, artificial intelligence, networking, and parallel\/distributed computing, 2007. SNPD 2007. Eighth ACIS International Conference on, vol. 3. IEEE, pp 899\u2013904","DOI":"10.1109\/SNPD.2007.209"},{"key":"9395_CR124","doi-asserted-by":"crossref","unstructured":"Yang Z, Meratnia N, Havinga P (dec 2008) An online outlier detection technique for wireless sensor networks using unsupervised quarter-sphere support vector machine. In: Intelligent sensors, sensor networks and information processing, 2008. ISSNIP 2008. International conference on, pp 151\u2013156","DOI":"10.1109\/ISSNIP.2008.4761978"},{"issue":"2","key":"9395_CR125","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/s10994-007-5015-9","volume":"68","author":"D Yeung","year":"2007","unstructured":"Yeung D, Wang D, Ng W, Tsang E, Wang X (2007) Structured large margin machines: sensitive to data distributions. Mach learn 68(2):171\u2013200","journal-title":"Mach learn"},{"key":"9395_CR126","unstructured":"Yozo CP, Hida Y, Huang P, Nishtala R (2004) Aggregation query under uncertainty in sensor networks. Tech, Rep"},{"key":"9395_CR127","unstructured":"Zhang Y (June 2010) Observing the unobservable - distributed online outlier detection in wireless sensor networks. University of Twente, Ph.D. dissertation"},{"issue":"2","key":"9395_CR128","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1109\/SURV.2010.021510.00088","volume":"12","author":"Y Zhang","year":"2010","unstructured":"Zhang Y, Meratnia N, Havinga P (2010) Outlier detection techniques for wireless sensor networks: a survey. IEEE Commun Surv Tutor 12(2):159\u2013170","journal-title":"IEEE Commun Surv Tutor"},{"key":"9395_CR129","doi-asserted-by":"crossref","unstructured":"Zhang X, Gu C, Lin J (2006) Support vector machines for anomaly detection. In: Intelligent control and automation, 2006. WCICA 2006. The sixth world congress on, vol. 1. IEEE, pp 2594\u20132598","DOI":"10.1109\/WCICA.2006.1712831"},{"key":"9395_CR130","doi-asserted-by":"crossref","unstructured":"Zhang Y, Hamm N, Meratnia N, Stein A, van de Voort M, Havinga P (2012) Statistics-based outlier detection for wireless sensor networks","DOI":"10.1080\/13658816.2012.654493"},{"key":"9395_CR131","doi-asserted-by":"crossref","unstructured":"Zhang Y, Meratnia N, Havinga P (2009) Adaptive and online one-class support vector machine-based outlier detection techniques for wireless sensor networks. In: Proceedings international confernce advanced information networking and applications workshops WAINA \u201909, pp 990\u2013995","DOI":"10.1109\/WAINA.2009.200"},{"key":"9395_CR132","doi-asserted-by":"crossref","unstructured":"Zhang Y, Meratnia N, Havinga P (2012) Distributed online outlier detection in wireless sensor networks using ellipsoidal support vector machine, Ad Hoc Networks","DOI":"10.1016\/j.adhoc.2012.11.001"},{"key":"9395_CR133","doi-asserted-by":"crossref","unstructured":"Zhang Y, Meratnia N, Havinga PJM (July 2009) Hyperellipsoidal svm-based outlier detection technique for geosensor networks. In: Third international conference on Geosensor Networks, Oxford, UK, ser. Lecture Notes in Computer Science, vol. 5659. Berlin: Springer, pp 31\u201341","DOI":"10.1007\/978-3-642-02903-5_4"},{"key":"9395_CR134","unstructured":"Zhang Y, Meratnia N, Havinga PJM (November 2007) A taxonomy framework for unsupervised outlier detection techniques for multi-type data sets, http:\/\/eprints.eemcs.utwente.nl\/11366\/ , Centre for Telematics and Information Technology University of Twente, Enschede, Technical Report TR-CTIT-07-79"},{"key":"9395_CR135","unstructured":"Zhang K, Shi S, Gao H, Li J (2007) Unsupervised outlier detection in sensor networks using aggregation tree. In: Proceedings of the 3rd international conference on advanced data mining and applications, ser. ADMA \u201907. Berlin, Heidelberg: Springer, pp 158\u2013169. [Online]. Available: http:\/\/dx.doi.org\/10.1007\/978-3-540-73871-816"},{"key":"9395_CR136","unstructured":"Zhuang Y, Chen L (2006) In-network outlier cleaning for data collection in sensor networks. In: In CleanDB, workshop in VLDB. APPENDIX, pp 41\u201348"},{"key":"9395_CR137","doi-asserted-by":"crossref","unstructured":"Zhu M, Wang Y, Chen S, Liu X (2003) Sphere-structured support vector machines for multi-class pattern recognition. Rough Sets, Fuzzy Sets, Data Mining, and Granular, Computing, pp 589\u2013589","DOI":"10.1007\/3-540-39205-X_95"},{"key":"9395_CR138","doi-asserted-by":"crossref","unstructured":"Zoumboulakis M, Roussos G (2007) Escalation: complex event detection in wireless sensor networks. In: Smart sensing and, context, pp 270\u2013285","DOI":"10.1007\/978-3-540-75696-5_17"}],"container-title":["Artificial Intelligence Review"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-013-9395-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10462-013-9395-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-013-9395-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T18:40:06Z","timestamp":1745952006000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10462-013-9395-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1,29]]},"references-count":138,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,4]]}},"alternative-id":["9395"],"URL":"https:\/\/doi.org\/10.1007\/s10462-013-9395-x","relation":{},"ISSN":["0269-2821","1573-7462"],"issn-type":[{"value":"0269-2821","type":"print"},{"value":"1573-7462","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,1,29]]}}}