{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T12:02:55Z","timestamp":1770552175417,"version":"3.49.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/wmnc.2014.6878860","type":"proceedings-article","created":{"date-parts":[[2014,8,20]],"date-time":"2014-08-20T20:19:52Z","timestamp":1408565992000},"page":"1-8","source":"Crossref","is-referenced-by-count":7,"title":["Outlier detection in 802.11 wireless access points using Hidden Markov Models"],"prefix":"10.1109","author":[{"given":"Anisa","family":"Allahdadi","sequence":"first","affiliation":[]},{"given":"Ricardo","family":"Morla","sequence":"additional","affiliation":[]},{"given":"Jaime S.","family":"Cardoso","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"1","article-title":"Outlier detection for temporal data: A survey","author":"gupta","year":"2013","journal-title":"Knowledge and Data Engineering IEEE Transactions on"},{"key":"17","year":"2013","journal-title":"R A language and environment for statistical computing R foundation for statistical computing"},{"key":"22","author":"hennig","year":"0","journal-title":"Fpc Flexible Procedures for Clustering 2013 R Package Version 2 1-6"},{"key":"18","author":"filzmoser","year":"2013","journal-title":"Mvoutlier Multivariate Outlier Detection Based on Robust Methods"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2013.6754971"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/MASSP.1986.1165342"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1002\/0471721182.ch2"},{"key":"13","author":"rigney","year":"0","journal-title":"Rfc 2139 Radius Authentication"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/LCNW.2013.6758491"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICNS.2010.44"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/iThings\/CPSCom.2011.25"},{"key":"21","doi-asserted-by":"crossref","first-page":"811","DOI":"10.1145\/1321440.1321552","article-title":"Detecting distance-based outliers in streams of data","author":"angiulli","year":"2007","journal-title":"Proceedings of the Sixteenth ACM Conference on Conference on Information and Knowledge Management Ser CIKM '07 ACM"},{"key":"3","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1145\/1023720.1023724","article-title":"Architecture and techniques for diagnosing faults in ieee 802.11 infrastructure networks","author":"adya","year":"2004","journal-title":"Proceedings of the 10th Annual International Conference on Mobile Computing and Networking Ser MobiCom '04"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1175\/2009JTECHA1299.1"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413202"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/CHINACOM.2007.4469390"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208921"},{"key":"7","article-title":"PIE in the sky: Online passive interference estimation for enterprise WLANs","author":"shrivastava","year":"2011","journal-title":"Proc of NSDI"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1134680.1134701"},{"key":"5","author":"schliep","year":"0","journal-title":"The Graphical Query Language"},{"key":"4","author":"schliep","year":"0","journal-title":"Ghmm Library"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.861066"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413202"}],"event":{"name":"2014 7th IFIP Wireless and Mobile Networking Conference (WMNC)","location":"Vilamoura, Portugal","start":{"date-parts":[[2014,5,20]]},"end":{"date-parts":[[2014,5,22]]}},"container-title":["2014 7th IFIP Wireless and Mobile Networking Conference (WMNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6871739\/6878843\/06878860.pdf?arnumber=6878860","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T16:00:38Z","timestamp":1602691238000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6878860"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/wmnc.2014.6878860","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}