{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:51:25Z","timestamp":1730209885690,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/controlo.2018.8514551","type":"proceedings-article","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T22:54:37Z","timestamp":1544223277000},"page":"425-429","source":"Crossref","is-referenced-by-count":0,"title":["Data Anomaly Detection in Wireless Sensor Networks with Application to an Oil Refinery"],"prefix":"10.1109","author":[{"given":"P.","family":"Gil","sequence":"first","affiliation":[]},{"given":"H.","family":"Martins","sequence":"additional","affiliation":[]},{"given":"F.","family":"Januario","sequence":"additional","affiliation":[]},{"given":"A.","family":"Santos","sequence":"additional","affiliation":[]},{"given":"L.","family":"Palma","sequence":"additional","affiliation":[]},{"given":"A.","family":"Cardoso","sequence":"additional","affiliation":[]},{"given":"J.","family":"Henriques","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2005.09.027"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-9096-9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.881713"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1007\/s00500-012-0937-y","article-title":"The support vector machine based on intuitionistic fuzzy number and kernel function","volume":"17","author":"ha","year":"2013","journal-title":"Soft Computing"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2529975"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2013.2288519"},{"key":"ref4","first-page":"929","article-title":"An outlier detection approach with data mining in wireless sensor network","volume":"4","author":"govindarajan","year":"2014","journal-title":"International Journal of Current Engineering and Technology"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/13658816.2012.654493"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2013.06.001"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.11.001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/s130810087"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.12.026"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2013.2293710"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"1833","DOI":"10.1016\/j.jpdc.2013.09.005","article-title":"Hyperspherical cluster based distributed anomaly detection in wireless sensor networks","volume":"74","author":"rajasegarar","year":"2014","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CCDC.2011.5968820"}],"event":{"name":"2018 13th APCA International Conference on Automatic Control and Soft Computing (CONTROLO)","start":{"date-parts":[[2018,6,4]]},"location":"Ponta Delgada","end":{"date-parts":[[2018,6,6]]}},"container-title":["2018 13th APCA International Conference on Control and Soft Computing (CONTROLO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8424300\/8514172\/08514551.pdf?arnumber=8514551","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T19:15:30Z","timestamp":1643224530000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8514551\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/controlo.2018.8514551","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}