{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T19:24:09Z","timestamp":1778181849922,"version":"3.51.4"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/iecon.2016.7794093","type":"proceedings-article","created":{"date-parts":[[2017,1,5]],"date-time":"2017-01-05T11:47:13Z","timestamp":1483616833000},"page":"4683-4688","source":"Crossref","is-referenced-by-count":19,"title":["Outlier detection using k-means clustering and lightweight methods for Wireless Sensor Networks"],"prefix":"10.1109","author":[{"given":"A.T.C.","family":"Andrade","sequence":"first","affiliation":[]},{"given":"C.","family":"Montez","sequence":"additional","affiliation":[]},{"given":"R.","family":"Moraes","sequence":"additional","affiliation":[]},{"given":"A.R.","family":"Pinto","sequence":"additional","affiliation":[]},{"given":"Francisco","family":"Vasques","sequence":"additional","affiliation":[]},{"given":"G. L.","family":"da Silva","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2008.02.014"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref12","article-title":"Anomaly detection in wireless sensor networks: A survey","author":"xie","year":"2011","journal-title":"Journal of Network and ComputerApplications"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1653760.1653767"},{"key":"ref14","first-page":"1","article-title":"Peirce's criterion for the elimination of suspect experimental data","volume":"20","author":"ross","year":"2003","journal-title":"Engineering and Technology Journal"},{"key":"ref15","first-page":"284","volume":"8","author":"marzullo","year":"1990","journal-title":"Tolerating failures of continuous-valued sensors"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1177\/1077546307077457"},{"key":"ref17","first-page":"1321","article-title":"Spatio-Temporal Event Detection Using Dynamic Conditional Random Fields","author":"yin","year":"2009","journal-title":"IJCAI"},{"key":"ref18","first-page":"439","author":"bahrepour","year":"2009","journal-title":"Use of Event Detection Approaches for Outlier Detection in Wireless Sensor Networks"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2014.71"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2010.021510.00088"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1023\/B:AIRE.0000045502.10941.a9"},{"key":"ref6","author":"rassam","year":"2013","journal-title":"Advancements of data anomaly detection research in Wireless Sensor Networks A survey and open issues"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2013.06.001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2013.05.003"},{"key":"ref7","first-page":"95","author":"krishnamachari","year":"2003","journal-title":"Distributed Bayesian Algorithms for Fault-Tolerant Event Region Detection in Wireless Sensor Networks"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1024422"},{"key":"ref1","first-page":"1","article-title":"Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration?","author":"alcaraz","year":"2015","journal-title":"1st International Workshop on the Security of the Internet of Things (SecIoT'10)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2012.6489563"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"2481","DOI":"10.1016\/j.sigpro.2003.07.018","article-title":"Novelty detection: A review Part 1: Statistical approaches","volume":"83","author":"markos","year":"2003","journal-title":"Signal Processing"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CIDM.2013.6597221"},{"key":"ref21","first-page":"1","author":"oladimeji","year":"2015","journal-title":"A New Approach for Event Detection using k -means Clustering and Neural Networks"}],"event":{"name":"IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society","location":"Florence, Italy","start":{"date-parts":[[2016,10,23]]},"end":{"date-parts":[[2016,10,26]]}},"container-title":["IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7782522\/7792929\/07794093.pdf?arnumber=7794093","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T01:35:57Z","timestamp":1568684157000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7794093\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/iecon.2016.7794093","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}