{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T17:31:20Z","timestamp":1776274280957,"version":"3.50.1"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T00:00:00Z","timestamp":1767744000000},"content-version":"vor","delay-in-days":35,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00256-9","type":"journal-article","created":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T15:37:09Z","timestamp":1764776229000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Real-time anomaly detection in IoT streams through spatiotemporal patterns"],"prefix":"10.1007","volume":"6","author":[{"given":"Yazeed","family":"AlZahrani","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,3]]},"reference":[{"key":"256_CR1","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MDAT.2016.2526612","volume":"33","author":"S Ray","year":"2016","unstructured":"Ray S, Jin Y, Raychowdhury A. The changing computing paradigm with internet of things: a tutorial introduction. IEEE Des Test. 2016;33:76\u201396.","journal-title":"IEEE Des Test"},{"key":"256_CR2","doi-asserted-by":"crossref","unstructured":"Elbouanani S, Kiram MAE, Achbarou O, Introduction to the internet of things security: standardization and research challenges, In Proc the 11th Int Conf on Information Assurance and Security (IAS), 2015, pp. 32\u201337.","DOI":"10.1109\/ISIAS.2015.7492741"},{"key":"256_CR3","doi-asserted-by":"crossref","unstructured":"Nalbandian S, A survey on internet of things: applications and challenges, In: Proc the Int Congress on Technology, Communication and Knowledge (ICTCK), 2015, pp. 165\u2013169.","DOI":"10.1109\/ICTCK.2015.7582664"},{"key":"256_CR4","doi-asserted-by":"crossref","unstructured":"Kraijak S, Tuwanut P, A survey on internet of things architecture, protocols, possible applications, security, privacy, real-world implementation and future trends, In: Proc the IEEE 16th Int Conf on Communication Technology (ICCT), 2015, pp. 26\u201331.","DOI":"10.1109\/ICCT.2015.7399787"},{"key":"256_CR5","doi-asserted-by":"crossref","unstructured":"Yue Z et al., Internet of things: architecture, technology and key problems in implementation, In: Proc the 8th Int Congress on Image and Signal Processing (CISP), 2015, pp. 1298\u20131302.","DOI":"10.1109\/CISP.2015.7408082"},{"key":"256_CR6","doi-asserted-by":"crossref","unstructured":"Khan WZ et al., Mobile RFID in internet of things: security attacks, privacy risks, and countermeasures, In: Proc the Int Conf on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET), 2016, pp. 36\u201341.","DOI":"10.1109\/ICRAMET.2016.7849578"},{"key":"256_CR7","doi-asserted-by":"crossref","unstructured":"Butun I, Kantarci B, Erol-Kantarci M, Anomaly detection and privacy preservation in cloud-centric internet of things, In: Proc the IEEE Int Conf on Communication Workshop (ICCW), 2015, pp. 2610\u20132615.","DOI":"10.1109\/ICCW.2015.7247572"},{"key":"256_CR8","volume-title":"Data mining: concepts and techniques","author":"J Han","year":"2012","unstructured":"Han J, Kamber M, Pei J. Data mining: concepts and techniques. 3rd ed. San Francisco: Elsevier; 2012.","edition":"3rd ed"},{"key":"256_CR9","volume-title":"Principles of data mining","author":"D Hand","year":"2001","unstructured":"Hand D, Mannila H, Smyth P. Principles of data mining. 1st ed. Cambridge: The MIT Press; 2001.","edition":"1st ed"},{"key":"256_CR10","doi-asserted-by":"crossref","unstructured":"Puschmann D, Barnaghi P, Tafazolli R, Marginal distribution clustering of multi-variate streaming IoT data, In: Proc the IEEE 3rd World Forum on Internet of Things (WF-IoT), 2016, pp. 466\u2013471.","DOI":"10.1109\/WF-IoT.2016.7845451"},{"key":"256_CR11","doi-asserted-by":"crossref","unstructured":"Desnitsky VA, Kotenko IV, Nogin SB, Detection of anomalies in data for monitoring of security components in the internet of things, In: Proc the XVIII Int Conf on Soft Computing and Measurements (SCM), 2015, pp. 189\u2013192.","DOI":"10.1109\/SCM.2015.7190452"},{"key":"256_CR12","doi-asserted-by":"crossref","unstructured":"Arrington B et al., Behavioral modeling intrusion detection system (BMIDS) using internet of things (IoT) behavior-based anomaly detection via immunity-inspired algorithms, In: Proc the 25th Int Conf on Computer Communication and Networks (ICCCN), 2016, pp. 1\u20136.","DOI":"10.1109\/ICCCN.2016.7568495"},{"key":"256_CR13","doi-asserted-by":"crossref","unstructured":"Ho C-W et al., Unsupervised anomaly detection using light switches for smart nursing homes, In: Proc the IEEE 14th Int Conf on Dependable, Autonomic and Secure Computing, 2016, pp. 803\u2013810.","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.139"},{"key":"256_CR14","doi-asserted-by":"crossref","unstructured":"Souza AM, Amazonas JR, An outlier detect algorithm using big data processing and internet of things architecture, In: Proc the IEEE 8th int congress on image and signal processing (CISP), 2015, pp. 1010\u20131015.","DOI":"10.1016\/j.procs.2015.05.095"},{"key":"256_CR15","unstructured":"Sarnovsky M et al., First demonstrator of hydra middleware architecture for building automation, hydra project, The Hydra project News, [Online], http:\/\/www.hydramiddleware.eu\/, accessed 29 April 2018."},{"key":"256_CR16","doi-asserted-by":"crossref","unstructured":"Zhao P et al., Advanced correlation-based anomaly detection method for predictive maintenance, In: Proc the IEEE Int Conf on Prognostics and Health Management (ICPHM), 2017, pp 78\u201383.","DOI":"10.1109\/ICPHM.2017.7998309"},{"key":"256_CR17","doi-asserted-by":"crossref","unstructured":"Hasnain SA, Jafari R, Urban heartbeat: from modelling to applications, In: Proc the IEEE Int Conf on Smart Computing (SMARTCOMP), 2017, pp. 1\u20138.","DOI":"10.1109\/SMARTCOMP.2017.7947058"},{"key":"256_CR18","doi-asserted-by":"crossref","unstructured":"Jain R, Shah H, An anomaly detection in smart cities modeled as wireless sensor network, In: Proc the Int Conf on Signal and Information Processing (IConSIP), 2016, pp. 1\u20135.","DOI":"10.1109\/ICONSIP.2016.7857445"},{"issue":"2","key":"256_CR19","first-page":"218","volume":"34","author":"M Domb","year":"2017","unstructured":"Domb M, et al. Lightweight adaptive random-forest for IoT rule generation and execution. J Inf Secur Appl. 2017;34(2):218\u201324.","journal-title":"J Inf Secur Appl"},{"issue":"3","key":"256_CR20","doi-asserted-by":"publisher","first-page":"948","DOI":"10.1016\/j.ijforecast.2015.06.001","volume":"32","author":"HN Akouemo","year":"2016","unstructured":"Akouemo HN, Povinelli RJ. Probabilistic anomaly detection in natural gas time series data. Int J Forecast. 2016;32(3):948\u201356. https:\/\/doi.org\/10.1016\/j.ijforecast.2015.06.001.","journal-title":"Int J Forecast"},{"key":"256_CR21","doi-asserted-by":"crossref","unstructured":"Liang Z et al., A personalized approach for detecting unusual sleep from time series sleep-tracking data, In: Proc the IEEE Int Conf on Healthcare Informatics, 2016, pp. 18\u201323.","DOI":"10.1109\/ICHI.2016.99"},{"key":"256_CR22","doi-asserted-by":"crossref","unstructured":"Gaikwad P et al., Anomaly detection for scientific workflow applications on networked clouds, In: Proc the IEEE Int Conf on High Performance Computing and Simulation, 2016, pp. 645\u2013652.","DOI":"10.1109\/HPCSim.2016.7568396"},{"key":"256_CR23","doi-asserted-by":"crossref","unstructured":"Lv Y, An adaptive real-time outlier detection algorithm based on ARMA model for radar\u2019s health monitoring, In: Proc the IEEE Autotestcon, 2015, pp. 1\u20137.","DOI":"10.1109\/AUTEST.2015.7356475"},{"key":"256_CR24","doi-asserted-by":"crossref","unstructured":"Mehrang S et al., Outlier detection in weight time series of connected scales, In: Proc the IEEE Int Conf on Bioinformatics and Biomedicine, 2015, pp. 1489\u20131496.","DOI":"10.1109\/BIBM.2015.7359896"},{"issue":"9","key":"256_CR25","first-page":"8312","volume":"7","author":"C Wang","year":"2019","unstructured":"Wang C, Chen J. Anomaly detection in IoT networks using machine learning: a survey. IEEE Internet Things J. 2019;7(9):8312\u201324.","journal-title":"IEEE Internet Things J"},{"key":"256_CR26","doi-asserted-by":"publisher","unstructured":"AlZahrani Y, Shen J, Yan J, Multi-layer efficient data classification methods for enterprise business applications, In: 2022 tenth international conference on advanced cloud and big data (CBD), Guilin, China, 2022, pp. 30\u201335, https:\/\/doi.org\/10.1109\/CBD58033.2022.00015.","DOI":"10.1109\/CBD58033.2022.00015"},{"key":"256_CR27","doi-asserted-by":"publisher","unstructured":"AlZahrani Y, Shen J, Yan J, The Spatio-temporal hybrid development methodology for smart IoT: a review based study, In: 2022 International conference on intelligent education and intelligent research (IEIR), Wuhan, China, 2022, pp. 169\u2013176, https:\/\/doi.org\/10.1109\/IEIR56323.2022.10050075.","DOI":"10.1109\/IEIR56323.2022.10050075"},{"key":"256_CR28","doi-asserted-by":"publisher","unstructured":"AlZahrani Y, Shen J, Yan J, Spatial goal refinement patterns for IoT applications, In: 2022 IEEE international conference on edge computing and communications (EDGE), Barcelona, Spain, 2022, pp. 50\u201359, https:\/\/doi.org\/10.1109\/EDGE55608.2022.00019.","DOI":"10.1109\/EDGE55608.2022.00019"},{"key":"256_CR29","doi-asserted-by":"publisher","unstructured":"Alzahrani Y, Shen J, Yan J. Energy-efficient data consistency based sampling rate optimization and aggregation method for IoT, In: 2023 26th international conference on computer supported cooperative work in design (CSCWD), Rio de Janeiro, Brazil, 2023, pp. 1348\u20131353, https:\/\/doi.org\/10.1109\/CSCWD57460.2023.10152779.","DOI":"10.1109\/CSCWD57460.2023.10152779"},{"key":"256_CR30","volume-title":"Artificial intelligence for robotics and autonomous systems applications studies in computational intelligence","author":"M Tolani","year":"2023","unstructured":"Tolani M, Ajasa AA, Balodi A, Bajpai A, AlZaharani Y, Sunny,. Advanced sensor systems for robotics and autonomous vehicles. In: Azar AT, Koubaa A, editors. Artificial intelligence for robotics and autonomous systems applications studies in computational intelligence, vol. 1093. Cham: Springer; 2023."},{"key":"256_CR31","doi-asserted-by":"crossref","unstructured":"Alzahrani Y. 8 development methodologies for Internet of Things: for all commercial and industrial needs, In: Recent Trends and Best Practices in Industry 4.0, River Publishers; 2023, pp.203\u2013224.","DOI":"10.1201\/9781003441717-8"},{"issue":"20","key":"256_CR32","doi-asserted-by":"publisher","first-page":"203103-1","DOI":"10.1063\/1.4936322","volume":"118","author":"A Vaskuri","year":"2015","unstructured":"Vaskuri A, Baumgartner H, K\u00e4rh\u00e4 P, Andor G, Ikonen E. Modeling the spectral shape of InGaAlP-based red light-emitting diodes. J Appl Phys. 2015;118(20):203103-1\u2013203103-7. https:\/\/doi.org\/10.1063\/1.4936322.","journal-title":"J Appl Phys"},{"issue":"5","key":"256_CR33","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/MWC.2018.1700360","volume":"25","author":"DT Hoang","year":"2018","unstructured":"Hoang DT, Niyato D, Nguyen DN, Dutkiewicz E, Wang P, Han Z. A dynamic edge caching framework for mobile 5G networks. IEEE Wirel Commun. 2018;25(5):95\u2013103. https:\/\/doi.org\/10.1109\/MWC.2018.1700360.","journal-title":"IEEE Wirel Commun"},{"issue":"9","key":"256_CR34","doi-asserted-by":"publisher","first-page":"2265","DOI":"10.1109\/TIP.2010.2047902","volume":"19","author":"H Ayasso","year":"2010","unstructured":"Ayasso H, Mohammad-Djafari A. Joint NDT image restoration and segmentation using Gauss\u2013Markov\u2013Potts prior models and variational Bayesian Computation. IEEE Trans Image Process. 2010;19(9):2265\u201377.","journal-title":"IEEE Trans Image Process"},{"key":"256_CR35","doi-asserted-by":"publisher","first-page":"78678","DOI":"10.1109\/ACCESS.2021.3081257","volume":"9","author":"MA Rahman","year":"2021","unstructured":"Rahman MA, Alam M, Pathan NU, Alam M. Anomaly detection in IoT networks using deep learning: a review. IEEE Access. 2021;9:78678\u201393. https:\/\/doi.org\/10.1109\/ACCESS.2021.3081257.","journal-title":"IEEE Access"},{"key":"256_CR36","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8761235","volume":"2020","author":"MA Rahman","year":"2020","unstructured":"Rahman MA, Alam M, Pathan NU. A survey on anomaly detection in industrial Internet of Things with deep learning and machine learning approaches. J Sens. 2020;2020:8761235. https:\/\/doi.org\/10.1155\/2020\/8761235.","journal-title":"J Sens"},{"key":"256_CR37","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/3438759","volume":"2020","author":"MA Rahman","year":"2020","unstructured":"Rahman MA, Alam M, Pathan NU. Anomaly detection in IoT systems: a deep learning approach. J Comput Netw Commun. 2020;2020:3438759. https:\/\/doi.org\/10.1155\/2020\/3438759.","journal-title":"J Comput Netw Commun"},{"key":"256_CR38","doi-asserted-by":"publisher","first-page":"12345","DOI":"10.1109\/ACCESS.2023.3247556","volume":"11","author":"MA Rahman","year":"2023","unstructured":"Rahman MA, Alam M, Pathan NU. A comprehensive survey on anomaly detection in industrial Internet of Things: techniques, applications, and challenges. IEEE Access. 2023;11:12345\u201367. https:\/\/doi.org\/10.1109\/ACCESS.2023.3247556.","journal-title":"IEEE Access"},{"key":"256_CR39","doi-asserted-by":"publisher","unstructured":"Jensen M, Rahman A, O\u2019Connor S, Mehta P, Zhou L. AI-powered anomaly detection in industrial IoT (IIoT) networks: enhancing cyber-physical security and operational resilience, Zenodo, 2025. https:\/\/doi.org\/10.5281\/zenodo.15193516.","DOI":"10.5281\/zenodo.15193516"},{"key":"256_CR40","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3537864","author":"L Tang","year":"2025","unstructured":"Tang L, Wei R, Xia B, Tang Y, Wang W, Huang Q, et al. Online anomaly detection in industrial IoT networks using a supervised contrastive learning-based spatiotemporal variational autoencoder. IEEE Internet Things J. 2025. https:\/\/doi.org\/10.1109\/JIOT.2025.3537864.","journal-title":"IEEE Internet Things J"},{"key":"256_CR41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3551207","author":"H Mancy","year":"2025","unstructured":"Mancy H, Naith QH. SwinIoT: a hierarchical transformer-based framework for behavioral anomaly detection in IoT-driven smart cities. IEEE Access. 2025. https:\/\/doi.org\/10.1109\/ACCESS.2025.3551207.","journal-title":"IEEE Access"},{"issue":"1","key":"256_CR42","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-023-02542-1","volume":"5","author":"G Almahadin","year":"2024","unstructured":"Almahadin G, Subburaj M, Hiari M, Singaram SS, Kolla BP, Dadheech P, et al. Enhancing video anomaly detection using spatio-temporal autoencoders and convolutional LSTM networks. SN Comput Sci. 2024;5(1):190. https:\/\/doi.org\/10.1007\/s42979-023-02542-1.","journal-title":"SN Comput Sci"},{"key":"256_CR43","doi-asserted-by":"publisher","unstructured":"Groenewald ES, Dodda SB, Soni M, Groenewald CA, Dhumane A, Tiwari V. Real-time anomaly detection in industrial systems using stream processing and online machine learning, In: International conference on deep learning and visual artificial intelligence, Singapore: Springer Nature Singapore, pp. 513\u2013529, 2024. https:\/\/doi.org\/10.1007\/978-981-97-4533-3_39.","DOI":"10.1007\/978-981-97-4533-3_39"},{"key":"256_CR44","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2025.3562738","author":"C Pal","year":"2025","unstructured":"Pal C, Saha S, Zhai X, Howells G, McDonald-Maier KD. \"APPARENT: AI-powered platform anomaly detection in edge computing. IEEE Trans Sustain Comput. 2025. https:\/\/doi.org\/10.1109\/TSUSC.2025.3562738.","journal-title":"IEEE Trans Sustain Comput"},{"key":"256_CR45","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2024.3443141","author":"M Jin","year":"2024","unstructured":"Jin M, Koh HY, Wen Q, Zambon D, Alippi C, Webb GI, et al. A survey on graph neural networks for time series: forecasting, classification, imputation, and anomaly detection. IEEE Trans Pattern Anal Mach Intell. 2024. https:\/\/doi.org\/10.1109\/TPAMI.2024.3443141.","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"256_CR46","doi-asserted-by":"publisher","DOI":"10.54216\/FPA.130110","author":"R Atassi","year":"2023","unstructured":"Atassi R. Anomaly detection in IoT networks: machine learning approaches for intrusion detection. Fusion Pract Appl. 2023. https:\/\/doi.org\/10.54216\/FPA.130110.","journal-title":"Fusion Pract Appl"},{"key":"256_CR47","doi-asserted-by":"publisher","first-page":"82443","DOI":"10.1109\/ACCESS.2024.3404778","volume":"12","author":"L Sana","year":"2024","unstructured":"Sana L, Nazir MM, Yang J, Hussain L, Chen YL, Ku CS, et al. Securing the IoT cyber environment: enhancing intrusion anomaly detection with vision transformers. IEEE Access. 2024;12:82443\u201368. https:\/\/doi.org\/10.1109\/ACCESS.2024.3404778.","journal-title":"IEEE Access"},{"issue":"12","key":"256_CR48","doi-asserted-by":"publisher","first-page":"9214","DOI":"10.1109\/JIOT.2021.3094295","volume":"9","author":"Y Wu","year":"2021","unstructured":"Wu Y, Dai HN, Tang H. Graph neural networks for anomaly detection in industrial Internet of Things. IEEE Internet Things J. 2021;9(12):9214\u201331. https:\/\/doi.org\/10.1109\/JIOT.2021.3094295.","journal-title":"IEEE Internet Things J"},{"key":"256_CR49","doi-asserted-by":"publisher","unstructured":"Lu C, Yu Z, Qian F, Shang D, Chen T, Luo J, Hui X, Li H. Heterogeneous data fusion and anomaly detection in industrial IoT systems using spatio-temporal graph neural networks, In: Proc 2024 4th Int Symp Artificial Intell and Intell Manuf (AIIM), 2024, pp 548\u2013556, https:\/\/doi.org\/10.1109\/AIIM64537.2024.10934344.","DOI":"10.1109\/AIIM64537.2024.10934344"},{"key":"256_CR50","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1109\/OJSP.2023.3333756","volume":"4","author":"L Barbieri","year":"2023","unstructured":"Barbieri L, Brambilla M, Stefanutti M, Romano C, De Carlo N, Roveri M. A tiny transformer-based anomaly detection framework for IoT solutions. IEEE Open J Signal Process. 2023;4:462\u201378. https:\/\/doi.org\/10.1109\/OJSP.2023.3333756.","journal-title":"IEEE Open J Signal Process"},{"issue":"6","key":"256_CR51","doi-asserted-by":"publisher","first-page":"3228","DOI":"10.1109\/JBHI.2024.335201","volume":"28","author":"IA Khan","year":"2024","unstructured":"Khan IA, Razzak I, Pi D, Zia U, Kamal S, Hussain Y. A novel collaborative SRU network with dynamic behaviour aggregation, reduced communication overhead and explainable features. IEEE J Biomed Health Inform. 2024;28(6):3228\u201335. https:\/\/doi.org\/10.1109\/JBHI.2024.335201.","journal-title":"IEEE J Biomed Health Inform"},{"key":"256_CR52","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3499942","author":"IA Khan","year":"2025","unstructured":"Khan IA, Pi D, Kamal S, Alsuhaibani M, Alshammari BM. Federated-Boosting: a distributed and dynamic boosting-powered cyber-attack detection scheme for security and privacy of consumer IoT. IEEE Trans Consum Electron. 2025. https:\/\/doi.org\/10.1109\/TCE.2024.3499942.","journal-title":"IEEE Trans Consum Electron"},{"key":"256_CR53","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.102002","author":"IA Khan","year":"2024","unstructured":"Khan IA, Razzak I, Pi D, Khan N, Hussain Y, Li B, et al. Fed-Inforce-fusion: a federated reinforcement-based fusion model for security and privacy protection of IoMT networks against cyber-attacks. Inf Fus. 2024. https:\/\/doi.org\/10.1016\/j.inffus.2023.102002.","journal-title":"Inf Fus"},{"key":"256_CR54","doi-asserted-by":"publisher","unstructured":"Sommers A, Cummins L, Mittal S, Rahimi S, Seale M, Jaboure J, Arnold T. A survey of transformer enabled time series synthesis, In: Proc 2024 IEEE 10th Int Conf Collaboration and Internet Computing (CIC), Oct. 2024, pp. 60\u201369. https:\/\/doi.org\/10.1109\/CIC62241.2024.00018.","DOI":"10.1109\/CIC62241.2024.00018"},{"key":"256_CR55","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.105964","volume":"120","author":"J Kim","year":"2023","unstructured":"Kim J, Kang H, Kang P. Time-series anomaly detection with stacked Transformer representations and 1D convolutional network. Eng Appl Artif Intell. 2023;120:105964. https:\/\/doi.org\/10.1016\/j.engappai.2023.105964.","journal-title":"Eng Appl Artif Intell"},{"issue":"22","key":"256_CR56","doi-asserted-by":"publisher","first-page":"9272","DOI":"10.3390\/s23229272","volume":"23","author":"R Baidya","year":"2023","unstructured":"Baidya R, Jeong H. Anomaly detection in time series data using reversible instance normalized anomaly transformer. Sensors. 2023;23(22):9272. https:\/\/doi.org\/10.3390\/s23229272.","journal-title":"Sensors"},{"key":"256_CR57","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-023-05772-5","author":"W Zhang","year":"2024","unstructured":"Zhang W, He P, Qin C, Yang F, Liu Y. A graph attention network-based model for anomaly detection in multivariate time series. J Supercomput. 2024. https:\/\/doi.org\/10.1007\/s11227-023-05772-5.","journal-title":"J Supercomput"},{"key":"256_CR58","doi-asserted-by":"crossref","unstructured":"Gao A. STEAD: Spatio-temporal efficient anomaly detection for time and compute sensitive applications, M.S. thesis, San Jose State Univ., San Jose, CA, USA, 2025.","DOI":"10.1109\/IROS60139.2025.11246678"},{"key":"256_CR59","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1016\/j.inffus.2022.08.011","volume":"89","author":"C Ding","year":"2023","unstructured":"Ding C, Sun S, Zhao J. MST-GAT: a multimodal spatial\u2013temporal graph attention network for time series anomaly detection. Inf Fusion. 2023;89:527\u201336. https:\/\/doi.org\/10.1016\/j.inffus.2022.08.011.","journal-title":"Inf Fusion"},{"issue":"1","key":"256_CR60","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1109\/TETC.2023.3280577","volume":"12","author":"F Xia","year":"2023","unstructured":"Xia F, Chen X, Yu S, Hou M, Liu M, You L. Coupled attention networks for multivariate time series anomaly detection. IEEE Trans Emerg Top Comput. 2023;12(1):240\u201353. https:\/\/doi.org\/10.1109\/TETC.2023.3280577.","journal-title":"IEEE Trans Emerg Top Comput"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00256-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00256-9","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00256-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T12:56:40Z","timestamp":1767790600000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00256-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,3]]},"references-count":60,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["256"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00256-9","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,3]]},"assertion":[{"value":"13 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not Applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"This research study solely involves the use of historical datasets. No human participants or animals were involved in the collection or analysis of data for this study. As a result, ethical approval was not required.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human or animal rights"}},{"value":"The author declares that there is no recent, present or anticipated employment by and organization that may gain or lose financially through publication of this manuscript.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Employment"}},{"value":"The authors declare no competing interests.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"4"}}