{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:21:13Z","timestamp":1772644873022,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2014,11,28]],"date-time":"2014-11-28T00:00:00Z","timestamp":1417132800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1007\/s11276-014-0858-z","type":"journal-article","created":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T07:41:34Z","timestamp":1417419694000},"page":"1425-1442","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Anomaly detection and foresight response strategy for wireless sensor networks"],"prefix":"10.1007","volume":"21","author":[{"given":"Mohammad","family":"GhasemiGol","sequence":"first","affiliation":[]},{"given":"Abbas","family":"Ghaemi-Bafghi","sequence":"additional","affiliation":[]},{"given":"Mohammad Hossein","family":"Yaghmaee-Moghaddam","sequence":"additional","affiliation":[]},{"given":"Hadi","family":"Sadoghi-Yazdi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,28]]},"reference":[{"issue":"4","key":"858_CR1","doi-asserted-by":"crossref","first-page":"1302","DOI":"10.1016\/j.jnca.2011.03.004","volume":"34","author":"M Xie","year":"2011","unstructured":"Xie, M., Han, S., Tian, B., et al. (2011). Anomaly detection in wireless sensor networks: A survey. Journal of Network and Computer Applications, 34(4), 1302\u20131325.","journal-title":"Journal of Network and Computer Applications"},{"issue":"10","key":"858_CR2","first-page":"1224","volume":"30","author":"RW Anwar","year":"2014","unstructured":"Anwar, R. W., Bakhtiari, M., Zainal, A., et al. (2014). Security issues and attacks in wireless sensor network. World Applied Sciences Journal, 30(10), 1224\u20131227.","journal-title":"World Applied Sciences Journal"},{"key":"858_CR3","doi-asserted-by":"crossref","unstructured":"Alrajeh, N. A., Khan, S., & Shams, B. (2013). Intrusion detection systems in wireless sensor networks: A review. International Journal of Distributed Sensor Networks, 2013, 1\u20137.","DOI":"10.1155\/2013\/374796"},{"key":"858_CR4","doi-asserted-by":"crossref","unstructured":"Butun, I., & Sankar, R. (2011). A brief survey of access control in wireless sensor networks. In Consumer communications and networking conference (CCNC), pp. 11181119.","DOI":"10.1109\/CCNC.2011.5766345"},{"issue":"2007","key":"858_CR5","first-page":"94","volume":"800","author":"K Scarfone","year":"2007","unstructured":"Scarfone, K., & Mell, P. (2007). Guide to intrusion detection and prevention systems (IDPS). NIST Special Publication, 800(2007), 94.","journal-title":"NIST Special Publication"},{"issue":"3","key":"858_CR6","doi-asserted-by":"crossref","first-page":"1223","DOI":"10.1109\/SURV.2012.121912.00006","volume":"15","author":"A Abduvaliyev","year":"2013","unstructured":"Abduvaliyev, A., Pathan, A.-S. K., Zhou, J., et al. (2013). On the vital areas of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys and Tutorials, 15(3), 1223\u20131237.","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"4","key":"858_CR7","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1007\/s00778-006-0002-5","volume":"16","author":"L Khan","year":"2007","unstructured":"Khan, L., Awad, M., & Thuraisingham, B. (2007). A new intrusion detection system using support vector machines and hierarchical clustering. The VLDB Journal\u2014The International Journal on Very Large Data Bases, 16(4), 507\u2013521.","journal-title":"The VLDB Journal\u2014The International Journal on Very Large Data Bases"},{"key":"858_CR8","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/11563952_30","volume-title":"Intrusion detection of DoS\/DDoS and probing attacks for web services. Advances in Web-Age Information Management","author":"J Zheng","year":"2005","unstructured":"Zheng, J., & Hu, M.-Z. (2005). Intrusion detection of DoS\/DDoS and probing attacks for web services. Advances in Web-Age Information Management (pp. 333\u2013344). Berlin: Springer."},{"key":"858_CR9","unstructured":"Ghosh, A. K. & Schwartzbard, A. (1999). A study in using neural networks for anomaly and misuse detection. Proceedings of the 8th conference on USENIX Security Symposium, Washington, DC."},{"issue":"4","key":"858_CR10","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MWC.2008.4599219","volume":"15","author":"S Rajasegarar","year":"2008","unstructured":"Rajasegarar, S., Leckie, C., & Palaniswami, M. (2008). Anomaly detection in wireless sensor networks. IEEE Wireless Communications, 15(4), 34\u201340.","journal-title":"IEEE Wireless Communications"},{"key":"858_CR11","unstructured":"Zamani, M. (2013). Machine learning techniques for intrusion detection. arXiv preprint arXiv:1312.2177."},{"key":"858_CR12","volume-title":"Data mining and machine learning in cybersecurity","author":"S Dua","year":"2014","unstructured":"Dua, S., & Du, X. (2014). Data mining and machine learning in cybersecurity. Baco Racton: CRC Press."},{"issue":"1","key":"858_CR13","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1109\/SURV.2013.050113.00191","volume":"16","author":"I Butun","year":"2014","unstructured":"Butun, I., Morgera, S., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Communication Surveys & Tutorials, 16(1), 266\u2013282.","journal-title":"IEEE Communication Surveys & Tutorials"},{"issue":"2","key":"858_CR14","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1109\/SURV.2010.021510.00088","volume":"12","author":"Y Zhang","year":"2010","unstructured":"Zhang, Y., Meratnia, N., & Havinga, P. (2010). Outlier detection techniques for wireless sensor networks: A survey. IEEE Communications Surveys & Tutorials, 12(2), 159\u2013170.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"858_CR15","doi-asserted-by":"crossref","first-page":"735","DOI":"10.1007\/11760146_111","volume":"3975","author":"T Phuong Van","year":"2006","unstructured":"Van Phuong, T., Hung, L. X., Cho, S. J., et al. (2006). An anomaly detection algorithm for detecting attacks in wireless sensor networks. Intelligence and Security Informatics, 3975, 735\u2013736.","journal-title":"Intelligence and Security Informatics"},{"issue":"11","key":"858_CR16","doi-asserted-by":"crossref","first-page":"1191","DOI":"10.1016\/S0167-8655(99)00087-2","volume":"20","author":"DM Tax","year":"1999","unstructured":"Tax, D. M., & Duin, R. P. (1999). Support vector domain description. Pattern Recognition Letters, 20(11), 1191\u20131199.","journal-title":"Pattern Recognition Letters"},{"issue":"1","key":"858_CR17","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.patcog.2008.07.003","volume":"42","author":"S-M Guo","year":"2009","unstructured":"Guo, S.-M., Chen, L.-C., & Tsai, J. S. H. (2009). A boundary method for outlier detection based on support vector domain description. Pattern Recognition, 42(1), 77\u201383.","journal-title":"Pattern Recognition"},{"key":"858_CR18","unstructured":"da Silva, A. P. R., Martins, M. H., Rocha, B. P. et al. (2005) Decentralized intrusion detection in wireless sensor networks In Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks. Montreal, Canada, pp. 16\u201323."},{"key":"858_CR19","unstructured":"Ioannis, K., Dimitriou, T., & Freiling, F. C. (2007) Towards intrusion detection in wireless sensor networks. In Proceeding of the 13th European Wireless Conference, Paris, France."},{"issue":"1","key":"858_CR20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1687-417X-2014-3","volume":"2014","author":"E Karapistoli","year":"2014","unstructured":"Karapistoli, E., & Economides, A. A. (2014). ADLU: a novel anomaly detection and location-attribution algorithm for UWB wireless sensor networks. EURASIP Journal on Information Security, 2014(1), 1\u201312.","journal-title":"EURASIP Journal on Information Security"},{"issue":"4","key":"858_CR21","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1145\/959060.959074","volume":"32","author":"T Palpanas","year":"2003","unstructured":"Palpanas, T., Papadopoulos, D., Kalogeraki, V., et al. (2003). Distributed deviation detection in sensor networks. ACM SIGMOD Record, 32(4), 77\u201382.","journal-title":"ACM SIGMOD Record"},{"key":"858_CR22","doi-asserted-by":"crossref","unstructured":"Ngai, E.-H., Liu, J., & Lyu, M. R. (2006). On the intruder detection for sinkhole attack in wireless sensor networks. In Proceedings of the 2006 IEEE international conference on communications (ICC\u201906). Istanbul, Turkey, pp. 3383\u20133389.","DOI":"10.1109\/ICC.2006.255595"},{"key":"858_CR23","doi-asserted-by":"crossref","unstructured":"Onat, I., & Miri, A. (2005) A real-time node-based traffic anomaly detection algorithm for wireless sensor networks. In Proceedings of systems communications, Montreal, Canada, pp. 422\u2013427.","DOI":"10.1109\/ICW.2005.16"},{"issue":"18","key":"858_CR24","doi-asserted-by":"crossref","first-page":"4324","DOI":"10.1016\/j.comcom.2008.06.020","volume":"31","author":"G Li","year":"2008","unstructured":"Li, G., He, J., & Fu, Y. (2008). Group-based intrusion detection system in wireless sensor networks. Computer Communications, 31(18), 4324\u20134332.","journal-title":"Computer Communications"},{"issue":"3","key":"858_CR25","first-page":"74","volume":"4","author":"S Siripanadorn","year":"2010","unstructured":"Siripanadorn, S., Hattagam, W., & Teaumroong, N. (2010). Anomaly detection in wireless sensor networks using self-organizing map and wavelets. International Journal of Communications, 4(3), 74\u201383.","journal-title":"International Journal of Communications"},{"issue":"1","key":"858_CR26","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/s10115-011-0474-5","volume":"34","author":"JW Branch","year":"2013","unstructured":"Branch, J. W., Giannella, C., Szymanski, B., et al. (2013). In-network outlier detection in wireless sensor networks. Knowledge and Information Systems, 34(1), 23\u201354.","journal-title":"Knowledge and Information Systems"},{"issue":"3","key":"858_CR27","doi-asserted-by":"crossref","first-page":"1413","DOI":"10.1109\/SURV.2013.112813.00168","volume":"16","author":"C OReilly","year":"2014","unstructured":"OReilly, C., Gluhak, A., Imran, M., et al. (2014). Anomaly detection in wireless sensor networks in a non-stationary environment. IEEE Communications Surveys and Tutorials, 16(3), 1413\u20131432.","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"858_CR28","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.comnet.2014.02.004","volume":"64","author":"M Moshtaghi","year":"2014","unstructured":"Moshtaghi, M., Leckie, C., Karunasekera, S., et al. (2014). An adaptive elliptical anomaly detection model for wireless sensor networks. Computer Networks, 64, 195\u2013207.","journal-title":"Computer Networks"},{"key":"858_CR29","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/978-1-4614-8495-0_8","volume-title":"Handbook of medical and healthcare technologies","author":"O Salem","year":"2013","unstructured":"Salem, O., Guerassimov, A., Mehaoua, A., et al. (2013). Anomaly detection scheme for medical wireless sensor networks. In B. Furht & A. Agarwal (Eds.), Handbook of medical and healthcare technologies (pp. 207\u2013222). New York: Springer."},{"issue":"3","key":"858_CR30","doi-asserted-by":"crossref","first-page":"1062","DOI":"10.1016\/j.adhoc.2012.11.001","volume":"11","author":"Y Zhang","year":"2013","unstructured":"Zhang, Y., Meratnia, N., & Havinga, P. J. (2013). Distributed online outlier detection in wireless sensor networks using ellipsoidal support vector machine. Ad Hoc Networks, 11(3), 1062\u20131074.","journal-title":"Ad Hoc Networks"},{"issue":"1","key":"858_CR31","doi-asserted-by":"crossref","first-page":"1833","DOI":"10.1016\/j.jpdc.2013.09.005","volume":"74","author":"S Rajasegarar","year":"2014","unstructured":"Rajasegarar, S., Leckie, C., & Palaniswami, M. (2014). Hyperspherical cluster based distributed anomaly detection in wireless sensor networks. Journal of Parallel and Distributed Computing, 74(1), 1833\u20131847.","journal-title":"Journal of Parallel and Distributed Computing"},{"issue":"1","key":"858_CR32","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/s10776-012-0179-z","volume":"20","author":"HM Salmon","year":"2013","unstructured":"Salmon, H. M., de Farias, C. M., Loureiro, P., et al. (2013). Intrusion detection system for wireless sensor networks using danger theory immune-inspired techniques. International Journal of Wireless Information Networks, 20(1), 39\u201366.","journal-title":"International Journal of Wireless Information Networks"},{"key":"858_CR33","doi-asserted-by":"crossref","unstructured":"Ahmadi Livani, M., & Abadi, M. (2011) A PCA-based distributed approach for intrusion detection in wireless sensor networks. In Proceedings of the 2011 international symposium on computer networks and distributed systems (CNDS), Tehran, Iran, pp. 55\u201360.","DOI":"10.1109\/CNDS.2011.5764585"},{"key":"858_CR34","doi-asserted-by":"crossref","unstructured":"Wang, H.-B, Yuan, Z., Wang, C.-D. (2009). Intrusion detection for wireless sensor networks based on multi-agent and refined clustering. In International conference on communications and mobile computing, Kunming, Yunnan, China, pp. 450\u2013454.","DOI":"10.1109\/CMC.2009.172"},{"key":"858_CR35","doi-asserted-by":"crossref","unstructured":"Rajasegarar, S., Leckie, C., Palaniswami, M. et al. (2006). Distributed anomaly detection in wireless sensor networks. In 10th IEEE singapore international conference on communication systems, Singapore, pp. 1\u20135.","DOI":"10.1109\/ICCS.2006.301508"},{"key":"858_CR36","doi-asserted-by":"crossref","unstructured":"S. Rajasegarar, C. Leckie, M. Palaniswami et al. (2007) Quarter sphere based distributed anomaly detection in wireless sensor networks. In: IEEE International Conference on Communications (ICC\u201907), Glasgow, Scotland, pp. 3864\u20133869.","DOI":"10.1109\/ICC.2007.637"},{"issue":"3","key":"858_CR37","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1109\/TIFS.2010.2051543","volume":"5","author":"S Rajasegarar","year":"2010","unstructured":"Rajasegarar, S., Leckie, C., Bezdek, J. C., et al. (2010). Centered hyperspherical and hyperellipsoidal one-class support vector machines for anomaly detection in sensor networks. IEEE Transactions on Information Forensics and Security, 5(3), 518\u2013533.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"858_CR38","doi-asserted-by":"crossref","unstructured":"Tax, D. M. & Duin R. P. (2000) Data description in subspaces. In Proceedings of 15th international conference on pattern recognition, Barcelona, Spain, pp. 672\u2013675.","DOI":"10.1109\/ICPR.2000.906164"},{"issue":"1","key":"858_CR39","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1023\/B:MACH.0000008084.60811.49","volume":"54","author":"DM Tax","year":"2004","unstructured":"Tax, D. M., & Duin, R. P. (2004). Support vector data description. Machine Learning, 54(1), 45\u201366.","journal-title":"Machine Learning"},{"issue":"5","key":"858_CR40","doi-asserted-by":"crossref","first-page":"1299","DOI":"10.1162\/089976698300017467","volume":"10","author":"B Sch\u00f6lkopf","year":"1998","unstructured":"Sch\u00f6lkopf, B., Smola, A., & M\u00fcller, K.-R. (1998). Nonlinear component analysis as a kernel eigenvalue problem. Neural Computation, 10(5), 1299\u20131319.","journal-title":"Neural Computation"},{"issue":"4","key":"858_CR41","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1515\/PIKO.2004.228","volume":"27","author":"P Laskov","year":"2004","unstructured":"Laskov, P., Sch\u00e4fer, C., Kotenko, I., et al. (2004). Intrusion detection in unlabeled data with quarter-sphere support vector machines. Praxis der Informationsverarbeitung und Kommunikation, 27(4), 228\u2013236.","journal-title":"Praxis der Informationsverarbeitung und Kommunikation"},{"key":"858_CR42","doi-asserted-by":"crossref","unstructured":"Song, M. & He, B. (2007). Capacity analysis for flat and clustered wireless sensor networks. In International conference on wireless algorithms, systems and applications, Chicago, Illinois, USA, pp. 249\u2013253.","DOI":"10.1109\/WASA.2007.30"},{"issue":"1","key":"858_CR43","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/0041-5553(80)90061-0","volume":"20","author":"LG Khachiyan","year":"1980","unstructured":"Khachiyan, L. G. (1980). Polynomial algorithms in linear programming. USSR Computational Mathematics and Mathematical Physics, 20(1), 53\u201372.","journal-title":"USSR Computational Mathematics and Mathematical Physics"},{"key":"858_CR44","doi-asserted-by":"crossref","unstructured":"Griva, I., Nash, S. G., & Sofer, A. (2009). Linear and nonlinear optimization: Siam.","DOI":"10.1137\/1.9780898717730"},{"issue":"1","key":"858_CR45","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1145\/2422.322418","volume":"31","author":"N Megiddo","year":"1984","unstructured":"Megiddo, N. (1984). Linear programming in linear time when the dimension is fixed. Journal of the ACM (JACM), 31(1), 114\u2013127.","journal-title":"Journal of the ACM (JACM)"},{"key":"858_CR46","unstructured":"IBRL dataset. (2012). http:\/\/db.lcs.mit.edu\/labdata\/labdata.html"},{"key":"858_CR47","doi-asserted-by":"crossref","unstructured":"Szewczyk, R., Mainwaring, A., Polastre, J. et al. (2004) An analysis of a large scale habitat monitoring application. In Proceedings of the 2nd international conference on Embedded networked sensor systems, Baltimore, Maryland, USA, pp. 214\u2013226.","DOI":"10.1145\/1031495.1031521"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-014-0858-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-014-0858-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-014-0858-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,17]],"date-time":"2019-08-17T20:18:31Z","timestamp":1566073111000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-014-0858-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,28]]},"references-count":47,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,7]]}},"alternative-id":["858"],"URL":"https:\/\/doi.org\/10.1007\/s11276-014-0858-z","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11,28]]}}}