{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T14:07:40Z","timestamp":1761833260896,"version":"build-2065373602"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2014,11,5]],"date-time":"2014-11-05T00:00:00Z","timestamp":1415145600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,11,5]],"date-time":"2014-11-05T00:00:00Z","timestamp":1415145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Autom. Comput."],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1007\/s11633-014-0847-9","type":"journal-article","created":{"date-parts":[[2014,11,4]],"date-time":"2014-11-04T23:48:29Z","timestamp":1415144909000},"page":"402-412","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["An isolation principle based distributed anomaly detection method in wireless sensor networks"],"prefix":"10.1007","volume":"12","author":[{"given":"Zhi-Guo","family":"Ding","sequence":"first","affiliation":[]},{"given":"Da-Jun","family":"Du","sequence":"additional","affiliation":[]},{"given":"Min-Rui","family":"Fei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,5]]},"reference":[{"issue":"4","key":"847_CR1","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"I F Akyildiz","year":"2002","unstructured":"I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci. Wireless sensor networks: A survey. Computer Networks, vol. 38, no. 4, pp. 393\u2013422, 2002.","journal-title":"Computer Networks"},{"key":"847_CR2","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.ins.2011.03.014","volume":"231","author":"J Y Huang","year":"2013","unstructured":"J. Y. Huang, I. E. Liao, Y. F. Chung, K. T. Chen. Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining. Information Sciences, vol. 231, pp. 32\u201344, 2013.","journal-title":"Information Sciences"},{"issue":"4","key":"847_CR3","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MWC.2008.4599219","volume":"15","author":"S Rajasegarar","year":"2008","unstructured":"S. Rajasegarar, C. Leckie, M. Palaniswami, Anomaly detection in wireless sensor networks. IEEE Wireless Communications, vol. 15, no. 4, pp. 34\u201340, 2008.","journal-title":"IEEE Wireless Communications"},{"key":"847_CR4","volume-title":"Observing the Unobservable: Distributed Online Outlier Detection in Wireless Sensor Networks","author":"Y Zhang","year":"2010","unstructured":"Y. Zhang. Observing the Unobservable: Distributed Online Outlier Detection in Wireless Sensor Networks, Ph.D. dissertation, University of Twente, The Netherlands, 2010."},{"issue":"2","key":"847_CR5","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1109\/SURV.2010.021510.00088","volume":"12","author":"Y Zhang","year":"2010","unstructured":"Y. Zhang, N. Meratnia, P. Havinga. Outlier detection techniques for wireless sensor networks: A survey. IEEE Communications Surveys & Tutorials, vol. 12, no. 2, pp. 159\u2013170, 2010.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"847_CR6","first-page":"76","volume-title":"Intelligent Computing for Sustainable Energy and Environment, Communications in Computer and Information Science","author":"W J Zhou","year":"2013","unstructured":"W. J. Zhou, M. R. Fei, H. Y. Zhou, Z. Li. A fast detection method for bottle caps surface defect based on sparse representation. Intelligent Computing for Sustainable Energy and Environment, Communications in Computer and Information Science, Berlin, Germany: Springer, pp. 76\u201384, 2013."},{"key":"847_CR7","first-page":"151","volume-title":"Proceedings of IEEE Intelligent Sensors, Sensor Networks and Information Processing","author":"Y Zhang","year":"2008","unstructured":"Y. Zhang, N. Meratnia, P. Havinga. An online outlier detection technique for wireless sensor networks using unsupervised quarter-sphere support vector machine. In Proceedings of IEEE Intelligent Sensors, Sensor Networks and Information Processing, IEEE, Sydney, NSW, Australia, pp. 151\u2013156, 2008."},{"key":"847_CR8","first-page":"93","volume-title":"Proceedings of International Conference on Architectural Support for Programming Language and Operating Systems","author":"J Hill","year":"2000","unstructured":"J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, K. Pister. System architecture directions for networked sensors. In Proceedings of International Conference on Architectural Support for Programming Language and Operating Systems, ACM, Cambrige, Massachusetts, USA, vol. 34, pp. 93\u2013104, 2000."},{"issue":"3","key":"847_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"V. Chandola, A. Banerjee, V. Kumar. Anomaly detection: A survey. ACM Computing Surveys, vol. 41, no. 3, pp. 1\u201358, 2009.","journal-title":"ACM Computing Surveys"},{"issue":"2","key":"847_CR10","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1023\/B:AIRE.0000045502.10941.a9","volume":"22","author":"V Hodge","year":"2004","unstructured":"V. Hodge, J. Austin. A survey of outlier detection methodologies. Artificial Intelligence Review, vol. 22, no. 2, pp. 85\u2013126, 2004.","journal-title":"Artificial Intelligence Review"},{"issue":"8","key":"847_CR11","doi-asserted-by":"publisher","first-page":"1373","DOI":"10.1080\/13658816.2012.654493","volume":"26","author":"Y Zhang","year":"2012","unstructured":"Y. Zhang, N. A. S. Hamm, N. Meratnia, A. Stein, M. V. D. Voort, P. J. M. Havinga. Statistics-based outlier detection for wireless sensor networks. International Journal of Geographical Information Science, vol. 26, no. 8, pp. 1373\u20131392, 2012.","journal-title":"International Journal of Geographical Information Science"},{"key":"847_CR12","first-page":"269","volume-title":"Proceedings of the 6th International Conference on Intelligent Sensors, Sensor Networks and Information Processing","author":"S Suthaharan","year":"2010","unstructured":"S. Suthaharan, M. Alzahrani, S. Rajasegarar, C. Leckie, M. Palaniswami. Labelled data collection for anomaly detection in wireless sensor networks. In Proceedings of the 6th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, IEEE, Brisbane, QLD, Australia, pp. 269\u2013274, 2010."},{"issue":"4","key":"847_CR13","doi-asserted-by":"publisher","first-page":"1302","DOI":"10.1016\/j.jnca.2011.03.004","volume":"34","author":"M Xie","year":"2011","unstructured":"M. Xie, S. Han, B. M. Tian, S. Parvin. Anomaly detection in wireless sensor networks: A survey. Journal of Network and Computer Applications, vol. 34, no. 4, pp. 1302\u20131325, 2011.","journal-title":"Journal of Network and Computer Applications"},{"issue":"6","key":"847_CR14","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1007\/s11633-012-0688-3","volume":"9","author":"L J Zhao","year":"2012","unstructured":"L. J. Zhao, T. Y. Chai, D. C. Yuan. Selective ensemble extreme learning machine modeling of effluent quality in wastewater treatment plants. International Journal of Automation and Computing, vol. 9, no. 6, pp. 627\u2013633, 2012.","journal-title":"International Journal of Automation and Computing"},{"issue":"1Article3","key":"847_CR15","volume":"6","year":"2012","unstructured":"F. T. Liu, K. M. Ting, Z. H. Zhou. Isolation-based anomaly detection. ACM Transactions on Knowledge Discovery from Data, vol. 6, no. 1, Article 3, 2012.","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"key":"847_CR16","first-page":"12","volume-title":"Proceedings of the 3rd IFAC International Conference on Intelligent Control and Automation Science","author":"Z G Ding","year":"2013","unstructured":"Z. G. Ding, M. R. Fei. An anomaly detection approach based on isolation forest algorithm for streaming data using sliding window. In Proceedings of the 3rd IFAC International Conference on Intelligent Control and Automation Science, IFAC, Chengdu, China, vol. 3, pp. 12\u201317, 2013."},{"key":"847_CR17","first-page":"93","volume-title":"Proceedings of ACM SIGMOD Record on Management of Data","author":"M M Breunig","year":"2000","unstructured":"M. M. Breunig, H. P. Kriegel, R. T. Ng, J. Sander. LOF: Identifying density-based local outliers. In Proceedings of ACM SIGMOD Record on Management of Data, ACM, Dallas, USA, vol. 29, pp. 93\u2013104, 2000."},{"issue":"2","key":"847_CR18","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/s11633-012-0636-2","volume":"9","author":"W G Yi","year":"2012","unstructured":"W. G. Yi, J. Duan, M. Y. Lu. Double-layer bayesian classifier ensembles based on frequent itemsets. International Journal of Automation and Computing, vol. 9, no. 2, pp. 215\u2013220, 2012.","journal-title":"International Journal of Automation and Computing"},{"key":"847_CR19","first-page":"83","volume-title":"Art of Computer Programming, vol. 4, fascicle 4: The Generating All Trees-History of Combinatorial Generation","author":"D E Knuth","year":"2006","unstructured":"D. E. Knuth. Art of Computer Programming, vol. 4, fascicle 4: The Generating All Trees-History of Combinatorial Generation, AddisonWesley Professional, pp. 83\u201398, 2006."},{"key":"847_CR20","first-page":"1511","volume":"2","author":"S C Tan","year":"2011","unstructured":"S. C. Tan, K. M. Ting, T. F. Liu. Fast anomaly detection for streaming data. In Proceedings of the 22nd International Joint Conference on Artificial Intelligence, vol. 2, pp. 1511\u20131516, 2011.","journal-title":"Proceedings of the 22nd International Joint Conference on Artificial Intelligence"},{"issue":"2","key":"847_CR21","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1023\/A:1010920819831","volume":"45","author":"D J Hand","year":"2001","unstructured":"D. J. Hand, R. J. Till. A simple generalisation of the area under the ROC curve for multiple class classification problems. Machine Learning, vol. 45, no. 2, pp. 171\u2013186, 2001.","journal-title":"Machine Learning"}],"container-title":["International Journal of Automation and Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-014-0847-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11633-014-0847-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-014-0847-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-014-0847-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T14:02:57Z","timestamp":1761832977000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11633-014-0847-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,5]]},"references-count":21,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,8]]}},"alternative-id":["847"],"URL":"https:\/\/doi.org\/10.1007\/s11633-014-0847-9","relation":{},"ISSN":["1476-8186","1751-8520"],"issn-type":[{"type":"print","value":"1476-8186"},{"type":"electronic","value":"1751-8520"}],"subject":[],"published":{"date-parts":[[2014,11,5]]},"assertion":[{"value":"9 October 2013","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 March 2014","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 November 2014","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}