{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:21:03Z","timestamp":1761402063511},"reference-count":36,"publisher":"Engineering and Technology Publishing","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["jcm"],"published-print":{"date-parts":[[2019]]},"DOI":"10.12720\/jcm.14.6.455-462","type":"journal-article","created":{"date-parts":[[2019,12,30]],"date-time":"2019-12-30T03:54:36Z","timestamp":1577678076000},"page":"455-462","source":"Crossref","is-referenced-by-count":14,"title":["An Outlier Detection Method to Improve Gathered Datasets for Network Behavior Analysis in IoT"],"prefix":"10.12720","author":[{"name":"Faculy of Computer Science, \u00d8stfold University College, Halden 1783, Norway","sequence":"first","affiliation":[]},{"given":"Amin","family":"Shahraki","sequence":"first","affiliation":[]},{"given":"\u00d8ystein","family":"Haugen","sequence":"additional","affiliation":[]}],"member":"4977","published-online":{"date-parts":[[2019]]},"reference":[{"key":"ref0","doi-asserted-by":"publisher","unstructured":"[1] S. Y. Lim and A. Jones, \"Network anomaly detection system: The state of art of network behaviour analysis,\" in Proc. International Conference on Convergence and Hybrid Information Technology, Busan, 2008, pp. 459-465.","DOI":"10.1109\/ICHIT.2008.249"},{"key":"ref1","doi-asserted-by":"publisher","unstructured":"[2] F. Tegeler, X. Fu, G. Vigna, and C. Kruegel, \"Botfinder: Finding bots in network traffic without deep packet inspection,\" in Proc. 8th International Conference on Emerging Networking Experiments and Technologies, Nice, 2012, pp. 349-360.","DOI":"10.1145\/2413176.2413217"},{"key":"ref2","unstructured":"[3] J. Hayes, Modeling and Analysis of Computer Communications Networks: Springer Science & Business Media, 2013."},{"key":"ref3","unstructured":"[4] V. Gazis, \"A survey of standards for Machine to Machine (M2M) and the Internet of Things (IoT),\" IEEE Communications Surveys & Tutorials, 2016."},{"key":"ref4","unstructured":"[5] W. X. Li, J. Xu, and H. Jiang, \"Queuing states analysis on a hybrid scheduling strategies for heterogeneous traffics in iot,\" in Proc. International Conference on Computer Science & Service System, Nanjing, 2012, pp. 1007-1008."},{"key":"ref5","doi-asserted-by":"publisher","unstructured":"[6] A. Baz, A. A. Al-Naja, and M. Baz, \"Statistical model for IoT\/5G networks,\" in Proc. Seventh International Conference on Ubiquitous and Future Networks (ICUFN), Sapporo, 2015, pp. 109-111.","DOI":"10.1109\/ICUFN.2015.7182511"},{"key":"ref6","doi-asserted-by":"publisher","unstructured":"[7] W. H. Hsu, Q. Li, X. H. Han, and C. W. Huang, \"A hybrid IoT traffic generator for mobile network performance assessment,\" in Proc. 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, 2017, pp. 441-445.","DOI":"10.1109\/IWCMC.2017.7986326"},{"key":"ref7","doi-asserted-by":"publisher","unstructured":"[8] P. Rawat, K. D. Singh, H. Chaouchi, and J. M. Bonnin, \"Wireless sensor networks: A survey on recent developments and potential synergies,\" The Journal of Supercomputing, vol. 68, pp. 1-48, 2014.","DOI":"10.1007\/s11227-013-1021-9"},{"key":"ref8","doi-asserted-by":"publisher","unstructured":"[9] O. H. A. Shahraki and H. Taherzadeh, \"Last significant trend change detection method for offline poisson distribution datasets,\" presented at the IEEE International Symposium on Networks, Computers and Communications, Marrakech, 2017.","DOI":"10.1109\/ISNCC.2017.8071994"},{"key":"ref9","doi-asserted-by":"publisher","unstructured":"[10] Y. Wang, M. C. Vuran, and S. Goddard, \"Cross-layer analysis of the end-to-end delay distribution in wireless sensor networks,\" IEEE\/ACM Transactions on Networking (TON), vol. 20, pp. 305-318, 2012.","DOI":"10.1109\/TNET.2011.2159845"},{"key":"ref10","unstructured":"[11] M. Dehmer, S. Pickl, and Z. Wang, \"A short survey on statistical network analysis,\" in Proc. International Conference on Foundations of Computer Science (FCS), Nevada, 2015, p. 110."},{"key":"ref11","doi-asserted-by":"publisher","unstructured":"[12] M. P. Raj and C. G. Rao, \"Data mining-past, present and future-a typical survey on data streams,\" Procedia Technology, vol. 12, pp. 255-263, 2014.","DOI":"10.1016\/j.protcy.2013.12.483"},{"key":"ref12","doi-asserted-by":"publisher","unstructured":"[13] S. Muthukrishnan, \"Data streams: Algorithms and applications,\" Foundations and Trends\u00ae in Theoretical Computer Science, vol. 1, pp. 117-236, 2005.","DOI":"10.1561\/0400000002"},{"key":"ref13","doi-asserted-by":"publisher","unstructured":"[14] G. Krempl, I. \u017dliobaite, D. Brzezi\u0144ski, E. H\u00fcllermeier, M. Last, V. Lemaire, et al., \"Open challenges for data stream mining research,\" ACM SIGKDD Explorations Newsletter, vol. 16, pp. 1-10, 2014.","DOI":"10.1145\/2674026.2674028"},{"key":"ref14","doi-asserted-by":"publisher","unstructured":"[15] S. Ram\u00edrez-Gallego, B. Krawczyk, S. Garc\u00eda, M. Wo\u017aniak, and F. Herrera, \"A survey on data preprocessing for data stream mining: Current status and future directions,\" Neurocomputing, vol. 239, pp. 39-57, 2017.","DOI":"10.1016\/j.neucom.2017.01.078"},{"key":"ref15","doi-asserted-by":"publisher","unstructured":"[16] C. Heinz, J. Kramer, T. Riemenschneider, and B. Seeger, \"Toward simulation-based optimization in data stream management systems,\" in Proc. IEEE 24th International Conference on Data Engineering, Cancun, 2008, pp. 1580-1583.","DOI":"10.1109\/ICDE.2008.4497626"},{"key":"ref16","doi-asserted-by":"publisher","unstructured":"[17] M. Cammert, J. Kramer, B. Seeger, and S. Vaupel, \"A cost-based approach to adaptive resource management in data stream systems,\" IEEE Transactions on Knowledge and Data Engineering, vol. 20, pp. 230-245, 2008.","DOI":"10.1109\/TKDE.2007.190686"},{"key":"ref17","doi-asserted-by":"publisher","unstructured":"[18] I. Botan, G. Alonso, P. M. Fischer, D. Kossmann, and N. Tatbul, \"Flexible and scalable storage management for data-intensive stream processing,\" in Proc. 12th International Conference on Extending Database Technology: Advances in Database Technology, Saint-Petersburg, 2009, pp. 934-945.","DOI":"10.1145\/1516360.1516467"},{"key":"ref18","unstructured":"[19] N. Marz and J. Warren, Big Data: Principles and Best Practices of Scalable Realtime Data Systems: Manning Publications Co., 2015."},{"key":"ref19","doi-asserted-by":"publisher","unstructured":"[20] M. Gupta, J. Gao, C. C. Aggarwal, and J. Han, \"Outlier detection for temporal data: A survey,\" IEEE Transactions on Knowledge and Data Engineering, vol. 26, pp. 2250-2267, 2014.","DOI":"10.1109\/TKDE.2013.184"},{"key":"ref20","doi-asserted-by":"publisher","unstructured":"[21] P. Thakkar, J. Vala, and V. Prajapati, \"Survey on outlier detection in data stream,\" International Journal of Computer Applications (0975-8887) Volume, 2016.","DOI":"10.5120\/ijca2016908257"},{"key":"ref21","unstructured":"[22] E. M. Knox and R. T. Ng, \"Algorithms for mining distancebased outliers in large datasets,\" in Proc. International Conference on Very Large Data Bases, New York, 1998, pp. 392-403."},{"key":"ref22","doi-asserted-by":"publisher","unstructured":"[23] L. I. Kuncheva, \"Change detection in streaming multivariate data using likelihood detectors,\" IEEE Transactions on Knowledge and Data Engineering, vol. 25, pp. 1175-1180, 2013.","DOI":"10.1109\/TKDE.2011.226"},{"key":"ref23","doi-asserted-by":"publisher","unstructured":"[24] M. Shuai, K. Xie, G. Chen, X. Ma, and G. Song, \"A Kalman filter based approach for outlier detection in sensor networks,\" in Proc. International Conference on Computer Science and Software Engineering, Wuhan, 2008, pp. 154-157.","DOI":"10.1109\/CSSE.2008.1240"},{"key":"ref24","doi-asserted-by":"publisher","unstructured":"[25] S. Ando and E. Suzuki, \"Detection of unique temporal segments by information theoretic meta-clustering,\" in Proc. 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2009, pp. 59-68.","DOI":"10.1145\/1557019.1557033"},{"key":"ref25","doi-asserted-by":"publisher","unstructured":"[26] A. K. Jain, \"Data clustering: 50 years beyond K-means,\" Pattern Recognition Letters, vol. 31, pp. 651-666, 2010.","DOI":"10.1016\/j.patrec.2009.09.011"},{"key":"ref26","unstructured":"[27] D. Agarwal, \"An empirical bayes approach to detect anomalies in dynamic multidimensional arrays,\" in Proc. Fifth IEEE International Conference on Data Mining, Washington, 2005, p. 8."},{"key":"ref27","doi-asserted-by":"publisher","unstructured":"[28] U. Rebbapragada, P. Protopapas, C. E. Brodley, and C. Alcock, \"Finding anomalous periodic time series,\" Machine Learning, vol. 74, pp. 281-313, 2009.","DOI":"10.1007\/s10994-008-5093-3"},{"key":"ref28","doi-asserted-by":"publisher","unstructured":"[29] E. Keogh, S. Lonardi, and B. Y. C. Chiu, \"Finding surprising patterns in a time series database in linear time and space,\" in Proc. Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2002, pp. 550-556.","DOI":"10.1145\/775047.775128"},{"key":"ref29","doi-asserted-by":"publisher","unstructured":"[30] S. Basu and M. Meckesheimer, \"Automatic outlier detection for time series: an application to sensor data,\" Knowledge and Information Systems, vol. 11, pp. 137-154, 2007.","DOI":"10.1007\/s10115-006-0026-6"},{"key":"ref30","doi-asserted-by":"publisher","unstructured":"[31] D. J. Hill and B. S. Minsker, \"Anomaly detection in streaming environmental sensor data: A data-driven modeling approach,\" Environmental Modelling & Software, vol. 25, pp. 1014-1022, 2010.","DOI":"10.1016\/j.envsoft.2009.08.010"},{"key":"ref31","unstructured":"[32] D. J. Hill, B. S. Minsker, and E. Amir, \"Real-time Bayesian anomaly detection for environmental sensor data,\" in Proc. Congress-International Association for Hydraulic Research, Venice, 2007, p. 503."},{"key":"ref32","doi-asserted-by":"publisher","unstructured":"[33] P. Showbridge, M. Kraetzl, and D. Ray, \"Detection of abnormal change in dynamic networks,\" in Proc. Information, Decision and Control, IDC 99. Proceedings. 1999, Sydney, 1999, pp. 557-562.","DOI":"10.1109\/IDC.1999.754216"},{"key":"ref33","doi-asserted-by":"publisher","unstructured":"[34] P. Dickinson, H. Bunke, A. Dadej, and M. Kraetzl, \"Median graphs and anomalous change detection in communication networks,\" in Proc. Final Program and Abstracts Information, Decision and Control, 2002, pp. 59-64.","DOI":"10.1109\/IDC.2002.995366"},{"key":"ref34","doi-asserted-by":"publisher","unstructured":"[35] F. R. Hampel, \"The influence curve and its role in robust estimation,\" Journal of the American Statistical Association, vol. 69, pp. 383-393, 1974.","DOI":"10.1080\/01621459.1974.10482962"},{"key":"ref35","doi-asserted-by":"publisher","unstructured":"[36] M. Schwarz, C. Sauer, H. Daduna, R. Kulik, and R. Szekli, \"M\/M\/1 queueing systems with inventory,\" Queueing Systems, vol. 54, pp. 55-78, 2006.","DOI":"10.1007\/s11134-006-8710-5"}],"container-title":["Journal of Communications"],"original-title":[],"link":[{"URL":"http:\/\/www.jocm.us\/uploadfile\/2019\/0509\/20190509033803778.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,31]],"date-time":"2020-12-31T02:09:06Z","timestamp":1609380546000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jocm.us\/index.php?m=content&c=index&a=show&catid=221&id=1372"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":36,"URL":"https:\/\/doi.org\/10.12720\/jcm.14.6.455-462","relation":{},"ISSN":["2374-4367"],"issn-type":[{"type":"print","value":"2374-4367"}],"subject":[],"published":{"date-parts":[[2019]]}}}