{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:22:48Z","timestamp":1730305368664,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/wimob.2019.8923607","type":"proceedings-article","created":{"date-parts":[[2019,12,6]],"date-time":"2019-12-06T02:28:23Z","timestamp":1575599303000},"page":"183-190","source":"Crossref","is-referenced-by-count":4,"title":["Identifying Mass-based local anomalies using Binary Space Partitioning"],"prefix":"10.1109","author":[{"given":"Alia","family":"Ghaddar","sequence":"first","affiliation":[]},{"given":"Lama","family":"Darwish","sequence":"additional","affiliation":[]},{"given":"Fadi","family":"Yamout","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref32","article-title":"Intel berkeley research lab"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909750"},{"key":"ref30","first-page":"1511","article-title":"Fast anomaly detection for streaming data","author":"tan","year":"2011","journal-title":"IJCAI 2011 Proceedings of the 22nd International Joint Conference on Artificial Intelligence"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-14680-1_101"},{"key":"ref11","first-page":"1","article-title":"An improved arima-based tra?c anomaly detection algorithm for wireless sensor networks","author":"yu","year":"2016","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"ref12","first-page":"87","article-title":"Wavelet analysis-based real-time anomaly detection algorithm for wireless sensor network","volume":"1","author":"zhiyuan","year":"2014","journal-title":"Journal of Nanjing University"},{"key":"ref13","article-title":"Advancements of data anomaly detection research in wireless sensor networks: A survey and open issues","volume":"13","author":"murad","year":"2013"},{"article-title":"Introduction to time series analysis and forecasting","year":"2015","author":"douglas c montgomery","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1177\/1550147716686161"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SSD.2015.7348091"},{"key":"ref17","article-title":"A comparative study on nearest-neighbor based outlier detection in data mining","volume":"8","author":"kuppusamy","year":"2016","journal-title":"Journal on Future Engineering and Technology"},{"key":"ref18","first-page":"93","article-title":"Lof: Identifying density-based local outliers","volume":"29","author":"markus","year":"2000","journal-title":"Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2013.07.005"},{"key":"ref28","first-page":"413","article-title":"Isolation forest","author":"fei tony liu","year":"2008","journal-title":"in Eighth IEEE International Conference on Data Mining"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1177\/1550147718794614"},{"key":"ref27","article-title":"Detecting anomalous user behavior using an extended isolation forest algorithm: An enterprise case study","author":"sun","year":"2016","journal-title":"CoRR"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEEIMT.2017.8116858"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2019.2912883"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-012-5303-x"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.10.007"},{"article-title":"Adaptive and online data anomaly detection for wireless sensor systems","year":"2014","author":"murad","key":"ref8"},{"key":"ref7","article-title":"Anomaly detection techniques for wireless sensor networks - a survey","volume":"2","author":"satish","year":"2013","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT.2014.40"},{"key":"ref9","volume":"274","author":"y","year":"2014","journal-title":"Mobile Ubiquitous and Intelligent Computing"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2779844"},{"key":"ref20","first-page":"105","article-title":"Adaptive scheme for outliers detection in wireless sensor networks","volume":"5","author":"y","year":"2017","journal-title":"International Journal of Computer Networks and Communications Security"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14419\/ijet.v7i4.6.20460"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2017.080850"},{"key":"ref24","first-page":"294","article-title":"One class svms outlier detection for wireless sensor networks in harsh environments: Analysis","volume":"7","author":"chander","year":"2018","journal-title":"International Journal of Recent Technology and Engineering (IJRTE)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ASCC.2015.7244794"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-014-0847-9"},{"key":"ref25","article-title":"Isolation based anomaly detection: A re-examination","author":"bandaragoda","year":"2015","journal-title":"PhD thesis"}],"event":{"name":"2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)","start":{"date-parts":[[2019,10,21]]},"location":"Barcelona, Spain","end":{"date-parts":[[2019,10,23]]}},"container-title":["2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8913409\/8923119\/08923607.pdf?arnumber=8923607","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T17:49:09Z","timestamp":1658080149000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8923607\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/wimob.2019.8923607","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}