{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:47:13Z","timestamp":1754164033696,"version":"3.41.2"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/menacomm46666.2019.8988543","type":"proceedings-article","created":{"date-parts":[[2020,2,10]],"date-time":"2020-02-10T22:46:23Z","timestamp":1581374783000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Towards Efficient Data Sampling for Temporal Anomaly Detection in Sensor Networks"],"prefix":"10.1109","author":[{"given":"Rayane El","family":"Sibai","sequence":"first","affiliation":[{"name":"LISITE ISEP,Issy-les-Moulineaux,France,92130"}]},{"given":"Yousra","family":"Chabchoub","sequence":"additional","affiliation":[{"name":"LISITE ISEP,Issy-les-Moulineaux,France,92130"}]},{"given":"Chady Abou","family":"Jaoude","sequence":"additional","affiliation":[{"name":"Antonine University,Ticket Lab., Faculty of Engineering,Baabda,Lebanon"}]},{"given":"Jacques","family":"Demerjian","sequence":"additional","affiliation":[{"name":"Lebanese University,LaRRIS, Faculty of Sciences,Fanar,Lebanon"}]},{"given":"Maurras","family":"Togbe","sequence":"additional","affiliation":[{"name":"LISITE ISEP,Issy-les-Moulineaux,France,92130"}]}],"member":"263","reference":[{"year":"2017","author":"grushka-cohen","article-title":"Sampling high throughput data for anomaly detection of data-base activity","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/MENACOMM.2018.8371015"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.2307\/1266443"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.2307\/2333009"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1016\/j.cose.2017.05.009"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/CCC.2017.15"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1080\/00224065.2014.11917973"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1002\/qre.1655"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1080\/00224065.2015.11918140"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1155\/2016\/9653230"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1016\/j.neucom.2017.04.070"},{"key":"ref3","first-page":"521","article-title":"Traitement de donn&#x00E9;es de consommation &#x00E9;lectrique par un syst&#x00E8;me de gestion de flux de donn&#x00E9;es","author":"abdessalem","year":"2007","journal-title":"EGC"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1016\/j.comnet.2016.05.019"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/1177080.1177102"},{"key":"ref8","first-page":"27","article-title":"Evaluating the impact of traffic sampling on aatac&#x2019;s ddos detection","author":"roudi\u00e8re","year":"2018","journal-title":"Proc Workshop Traffic Meas Cybersecurity"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/IHMSC.2016.62"},{"key":"ref2","article-title":"Gestion &#x00E0; grande &#x00E9;chelle de donn&#x00E9;es de capteurs h&#x00E9;t&#x00E9;rog&#x00E8;nes","author":"g\u00fcrgen","year":"2007","journal-title":"PhD thesis"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/3-540-36978-3_8"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/GLOCOM.2015.7416974"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1198\/016214505000001131"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/INFOCOM.2008.4544581"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/1330107.1330147"},{"key":"ref24","first-page":"487","article-title":"A performance study of the chain sampling algorithm","author":"sibai","year":"2015","journal-title":"Proceedings of the 7th International Conference on Intelligent Computing and Information Systems (ICICIS)"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/TCNS.2014.2357531"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1080\/00401706.1990.10484583"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/ICDEC.2016.7563142"}],"event":{"name":"2019 2nd IEEE Middle East and North Africa COMMunications Conference (MENACOMM)","start":{"date-parts":[[2019,11,19]]},"location":"Manama, Bahrain","end":{"date-parts":[[2019,11,21]]}},"container-title":["2019 2nd IEEE Middle East and North Africa COMMunications Conference (MENACOMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8967516\/8988514\/08988543.pdf?arnumber=8988543","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T18:27:34Z","timestamp":1753986454000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8988543\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/menacomm46666.2019.8988543","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}