{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T02:50:53Z","timestamp":1767581453636,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,23]],"date-time":"2022-12-23T00:00:00Z","timestamp":1671753600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,23]]},"DOI":"10.1145\/3590837.3590906","type":"proceedings-article","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T18:36:51Z","timestamp":1685471811000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["An Analytical Approach on Artificial Intelligence Based Models for Anomaly Detection in Sensor Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-9192-7861","authenticated-orcid":false,"given":"Archana Ramrao","family":"Ugale","sequence":"first","affiliation":[{"name":"School of Engineering &amp; Technology, D Y Patil University Ambi Pune, Maharashtra, India, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3621-4639","authenticated-orcid":false,"given":"Amol Dnyaneshwar","family":"Potgantwar","sequence":"additional","affiliation":[{"name":"School of Engineering &amp; Technology, D Y Patil University Ambi Pune, Maharashtra, India, India"}]}],"member":"320","published-online":{"date-parts":[[2023,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","article-title":"Harish Radhappa, Lei Pan, Practical overview of security issues in wireless sensor network applications","year":"2017","unstructured":"J.X.Z.S.W. Harish Radhappa, Lei Pan, Practical overview of security issues in wireless sensor network applications, Int. J. Comput. Appl. (2017) 1\u201312.","journal-title":"Int. J. Comput. Appl. ("},{"key":"e_1_3_2_1_2_1","unstructured":"S.S. Walaa Elsayed Mohamed Elhoseny A. Riad Self-maintenance model for wireless sensor networks Comput. Electr. Eng. (2017) 1\u201314."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3187426"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3082158"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2022.3168529"},{"key":"e_1_3_2_1_6_1","volume-title":"International Conference on Computing, Communication and Networking Technologies (ICCCNT). (pp. 1 -7). IEEE.","author":"Verma P","year":"2018","unstructured":"Verma P, Shadab K, Shayan A. and Sunil B. (2018). Network Intrusion Detect ion using Clustering and Gradient Boosting. International Conference on Computing, Communication and Networking Technologies (ICCCNT). (pp. 1 -7). IEEE."},{"key":"e_1_3_2_1_7_1","volume-title":"International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST). (pp. 643-646)","author":"Kazi A.","year":"2019","unstructured":"Kazi A., Billal M. and Mahbubur R. (2019). Network Intrusion Detect ion using Supervised Machine Learning Technique with feature selection. International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST). (pp. 643-646). IEEE."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet"},{"key":"e_1_3_2_1_9_1","volume-title":"International Journal of Computer Network and Information Security, 4. Researchgate (19-25)","author":"Iqbal","year":"2019","unstructured":"Iqbal and Aftab. (2019). A Feed-Forward ANN and Pat tern Recognition ANN Model for Network Intrusion Detect ion. International Journal of Computer Network and Information Security, 4. Researchgate (19-25)"},{"key":"e_1_3_2_1_10_1","volume-title":"International Journal of Research in Engineering, Science and Management. IJRESM. (290-296).","author":"Vinoth Y.","year":"2020","unstructured":"Vinoth Y. and Kamatchi K. (2020). Anomaly Based Network Intrusion Detection using Ensemble Machine Learning Technique. International Journal of Research in Engineering, Science and Management. IJRESM. (290-296)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0029-9_50"},{"key":"e_1_3_2_1_12_1","volume-title":"International Journal of Intelligent Engineering and Systems. INASS. (433-445)","author":"Maniriho","year":"2020","unstructured":"Maniriho (2020). Detect ing Intrusions in Computer Network Traffic with Machine Learning Approaches. International Journal of Intelligent Engineering and Systems. INASS. (433-445)"},{"key":"e_1_3_2_1_13_1","volume-title":"International Journal of Computer Science Trends and Technology (IJCST). (163-169).","author":"Ponthapalli R.","year":"2020","unstructured":"Ponthapalli R. (2020). Implementation of Machine Learning Algorithms for Detection of Network Intrusion. International Journal of Computer Science Trends and Technology (IJCST). (163-169)."},{"key":"e_1_3_2_1_14_1","volume-title":"KPI-TSAD: A Time-Series Anomaly Detector for KPI Monitoring in Cloud Applications. Symmetry","author":"Qiu J.","year":"2019","unstructured":"Qiu, J.; Du, Q.; Qian, C. KPI-TSAD: A Time-Series Anomaly Detector for KPI Monitoring in Cloud Applications. Symmetry 2019, 11, 1350."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1111\/coin.12146"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106405"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-019-04288-5"},{"key":"e_1_3_2_1_18_1","first-page":"16","article-title":"Spatiotemporal Anomaly Detection Using Deep Learning for Real-Time Video Surveillance","volume":"2020","author":"Nawaratne R.","unstructured":"Nawaratne, R.; Alahakoon, D.; De Silva, D.; Yu, X. Spatiotemporal Anomaly Detection Using Deep Learning for Real-Time Video Surveillance. IEEE Trans. Ind. Informatics 2020, 16, 393\u2013402.","journal-title":"IEEE Trans. Ind. Informatics"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219845"},{"key":"e_1_3_2_1_20_1","volume-title":"accessed","author":"Datahub","year":"2022","unstructured":"Datahub, accessed Nov 2022. <https:\/\/datahub.io\/machine-learning\/kddcup99>"},{"key":"e_1_3_2_1_21_1","volume-title":"accessed","author":"University of New Brunswick","year":"2022","unstructured":"University of New Brunswick, accessed Nov 2022, <https:\/\/www.unb.ca\/cic\/datasets\/nsl.html>"},{"key":"e_1_3_2_1_22_1","volume-title":"accessed","author":"University of New Brunswick","year":"2022","unstructured":"University of New Brunswick, accessed Nov 2022, <https:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html>"}],"event":{"name":"ICIMMI 2022: International Conference on Information Management & Machine Intelligence","acronym":"ICIMMI 2022","location":"Jaipur India"},"container-title":["Proceedings of the 4th International Conference on Information Management &amp; Machine Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590837.3590906","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3590837.3590906","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T02:47:31Z","timestamp":1767581251000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590837.3590906"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,23]]},"references-count":22,"alternative-id":["10.1145\/3590837.3590906","10.1145\/3590837"],"URL":"https:\/\/doi.org\/10.1145\/3590837.3590906","relation":{},"subject":[],"published":{"date-parts":[[2022,12,23]]},"assertion":[{"value":"2023-05-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}