{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T00:37:34Z","timestamp":1768437454625,"version":"3.49.0"},"reference-count":192,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T00:00:00Z","timestamp":1582588800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>A wireless sensor network (WSN) is defined as a set of spatially distributed and interconnected sensor nodes. WSNs allow one to monitor and recognize environmental phenomena such as soil moisture, air pollution, and health data. Because of the very limited resources available in sensors, the collected data from WSNs are often characterized as unreliable or uncertain. However, applications using WSNs demand precise readings, and uncertainty in data reading can cause serious damage (e.g., health monitoring data). Therefore, an efficient local\/distributed data processing algorithm is needed to ensure: (1) the extraction of precise and reliable values from noisy readings; (2) the detection of anomalies from data reported by sensors; and (3) the identification of outlier sensors in a WSN. Several works have been conducted to achieve these objectives using several techniques such as machine learning algorithms, mathematical modeling, and clustering. The purpose of this paper is to conduct a systematic literature review to report the available works on outlier and anomaly detection in WSNs. The paper highlights works conducted from January 2004 to October 2018. A total of 3520 papers are reviewed in the initial search process. Later, these papers are filtered by title, abstract, and contents, and a total of 117 papers are selected. These papers are examined to answer the defined research questions. The current paper presents an improved taxonomy of outlier detection techniques. This will help researchers and practitioners to find the most relevant and recent studies related to outlier detection in WSNs. Finally, the paper identifies existing gaps that future studies can fill.<\/jats:p>","DOI":"10.3390\/sym12030328","type":"journal-article","created":{"date-parts":[[2020,2,26]],"date-time":"2020-02-26T04:18:29Z","timestamp":1582690709000},"page":"328","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":56,"title":["A Systematic Literature Review on Outlier Detection in Wireless Sensor Networks"],"prefix":"10.3390","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3924-6927","authenticated-orcid":false,"given":"Mahmood","family":"Safaei","sequence":"first","affiliation":[{"name":"School of Computing Faculty of Engineering, Universiti Teknologi Malaysia, Johor Bahru 81310, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8199-2122","authenticated-orcid":false,"given":"Shahla","family":"Asadi","sequence":"additional","affiliation":[{"name":"Department of Software Engineering &amp; Information System, Faculty of Computer Science &amp; Information Technology, Universiti Putra Malaysia, Seri Kembangan 43400, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8236-8746","authenticated-orcid":false,"given":"Maha","family":"Driss","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, Taibah University, Medina 42353, Saudi Arabia"},{"name":"RIADI Laboratory, University of Manouba, Manouba 2010, Tunisia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2133-0757","authenticated-orcid":false,"given":"Wadii","family":"Boulila","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, Taibah University, Medina 42353, Saudi Arabia"},{"name":"RIADI Laboratory, University of Manouba, Manouba 2010, Tunisia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7974-7638","authenticated-orcid":false,"given":"Abdullah","family":"Alsaeedi","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, Taibah University, Medina 42353, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6253-1822","authenticated-orcid":false,"given":"Hassan","family":"Chizari","sequence":"additional","affiliation":[{"name":"Department of Computing, University of Glouctershire, Cheltenham GL50 2RH, UK"}]},{"given":"Rusli","family":"Abdullah","sequence":"additional","affiliation":[{"name":"Department of Software Engineering &amp; Information System, Faculty of Computer Science &amp; Information Technology, Universiti Putra Malaysia, Seri Kembangan 43400, Malaysia"}]},{"given":"Mitra","family":"Safaei","sequence":"additional","affiliation":[{"name":"Fakult\u00e4t Electronic und Informatik, Gottfried Wilhelm Leibniz Universit\u00e4t Hannover, 30167 Hannover, Germany"}]}],"member":"1968","published-online":{"date-parts":[[2020,2,25]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1302","DOI":"10.1016\/j.jnca.2011.03.004","article-title":"Anomaly detection in wireless sensor networks: A survey","volume":"34","author":"Xie","year":"2011","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_2","unstructured":"Myllyla, R., and The Mendeley Support Team (2006, January 22\u201325). Vital Sign Monitoring System with Life Emergency Event Detection using Wireless Sensor Network. Proceedings of the 2006 5th IEEE Conference on Sensors, Daegu, Korea."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"2053","DOI":"10.1109\/JSEN.2008.2007681","article-title":"A Wireless, Passive Embedded Sensor for Real-Time Monitoring of Water Content in Civil Engineering Materials","volume":"8","author":"You","year":"2008","journal-title":"IEEE Sens. J."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1683","DOI":"10.1109\/JSEN.2006.884562","article-title":"Human tracking with wireless distributed pyroelectric sensors","volume":"6","author":"Hao","year":"2006","journal-title":"IEEE Sens. J."},{"key":"ref_5","unstructured":"Subramaniam, S., Palpanas, T., Papadopoulos, D., Kalogeraki, V., and Gunopulos, D. (2006, January 12\u201315). Online outlier detection in sensor data using non-parametric models. Proceedings of the VLDB \u201906: Proceedings of the 32nd International Conference on Very Large Data Bases, Seoul, Korea."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1109\/SURV.2010.021510.00088","article-title":"Outlier Detection Techniques for Wireless Sensor Networks: A Survey","volume":"12","author":"Meratnia","year":"2010","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Ganguly, A.R., Gama, J., Omitaomu, O.A., Gaber, M., and Vatsavai, R.R. (2008). Knowledge Discovery From Sensor Data, CRC Press.","DOI":"10.1201\/9781420082333"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1541880.1541882","article-title":"Anomaly Detection: A Survey","volume":"41","author":"Chandola","year":"2009","journal-title":"ACM Comput. Surv."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Esnaola-Gonzalez, I., Berm\u00fadez, J., Fern\u00e1ndez, I., Fern\u00e1ndez, S., and Arnaiz, A. (2017, January 12\u201313). Towards a Semantic Outlier Detection Framework in Wireless Sensor Networks. Proceedings of the 13th International Conference on Semantic Systems\u2013Semantics2017, Amsterdam, The Netherlands.","DOI":"10.1145\/3132218.3132226"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Fontugne, R., Ortiz, J., Tremblay, N., Borgnat, P., Flandrin, P., Fukuda, K., Culler, D., and Esaki, H. (2013, January 8\u201311). Strip, bind, and search: A method for identifying abnormal energy consumption in buildings. Proceedings of the 2013 ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN), Philadelphia, PA, USA.","DOI":"10.1145\/2461381.2461399"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Sheng, B., Li, Q., Mao, W., and Jin, W. (2007, January 9\u201314). Outlier detection in sensor networks. Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing\u2014MobiHoc \u201907, Montreal, QC, Canada.","DOI":"10.1145\/1288107.1288137"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Hawkins, D.M. (1980). Identification of Outliers, Springer.","DOI":"10.1007\/978-94-015-3994-4"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1009","DOI":"10.1007\/s11277-015-2822-3","article-title":"Outlier Detection Approach Using Bayes Classifiers in Wireless Sensor Networks","volume":"85","author":"Titouna","year":"2015","journal-title":"Wirel. Pers. Commun."},{"key":"ref_14","unstructured":"Barnett, V., and Lewis, T. (1974). Outliers in Statistical Data, Wiley."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1145\/335191.335388","article-title":"LOF: Identifying density-based local outliers","volume":"29","author":"Breunig","year":"2000","journal-title":"ACM Sigmod Rec."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1111\/j.1467-9671.2006.00256.x","article-title":"A multiscale approach for spatio-temporal outlier detection","volume":"10","author":"Cheng","year":"2006","journal-title":"Trans. GIS"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/s00778-004-0125-5","article-title":"An effective and efficient algorithm for high-dimensional outlier detection","volume":"14","author":"Aggarwal","year":"2005","journal-title":"VLDB J."},{"key":"ref_18","unstructured":"Muthukrishnan, S., Shah, R., and Vitter, J.S. (2004, January 21\u201323). Mining deviants in time series data streams. Proceedings of the 16th International Conference on Scientific and Statistical Database Management, Santorini Island, Greece."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1016\/S0167-8655(00)00131-8","article-title":"Two-phase clustering process for outliers detection","volume":"22","author":"Jiang","year":"2001","journal-title":"Pattern Recognit. Lett."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1016\/j.comnet.2017.10.007","article-title":"Outlier detection approaches for wireless sensor networks: A survey","volume":"129","author":"Ayadi","year":"2017","journal-title":"Comput. Netw."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"6869","DOI":"10.3390\/s90906869","article-title":"An overview on wireless sensor networks technology and evolution","volume":"9","author":"Buratti","year":"2009","journal-title":"Sensors"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Rajasegarar, S., Leckie, C., Palaniswami, M., and Bezdek, J. (November, January 30). Distributed Anomaly Detection in Wireless Sensor Networks. Proceedings of the 2006 10th IEEE Singapore International Conference on Communication Systems, Singapore.","DOI":"10.1109\/ICCS.2006.301508"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1109\/TC.2004.1261832","article-title":"Distributed Bayesian algorithms for fault-tolerant event region detection in wireless sensor networks","volume":"53","author":"Krishnamachari","year":"2004","journal-title":"IEEE Trans. Comput."},{"key":"ref_24","unstructured":"Ding, M., Chen, D., Xing, K., and Cheng, X. (2005, January 13\u201317). Localized Fault-Tolerant Event Boundary Detection in Sensor Networks. Proceedings of the IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Miami, FL, USA."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Bahrepour, M., Zhang, Y., Meratnia, N., and Havinga, P.J. (2009, January 7\u201310). Use of event detection approaches for outlier detection in wireless sensor networks. Proceedings of the 2009 International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), Melbourne, VIC, Australia.","DOI":"10.1109\/ISSNIP.2009.5416749"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1007\/s10462-012-9370-y","article-title":"Characteristics and classification of outlier detection techniques for wireless sensor networks in harsh environments: A survey","volume":"43","author":"Shahid","year":"2012","journal-title":"Artif. Intell. Rev."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Ghaddar, A., Razafindralambo, T., Simplot-Ryl, I., Tawbi, S., and Hijazi, A. (2011, January 28\u201331). Algorithm for temporal anomaly detection in WSNs. Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, WCNC 2011, Cancun, Quintana Roo, Mexico.","DOI":"10.1109\/WCNC.2011.5779255"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"492","DOI":"10.1016\/j.tele.2013.04.003","article-title":"A systematic review of Internet banking adoption","volume":"31","author":"Hanafizadeh","year":"2014","journal-title":"Telemat. Inform."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1191","DOI":"10.1016\/j.tele.2017.05.009","article-title":"Organizational research in the field of Green IT: A systematic literature review from 2007 to 2016","volume":"34","author":"Asadi","year":"2017","journal-title":"Telemat. Inform."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"35242","DOI":"10.1109\/ACCESS.2019.2897729","article-title":"Understanding Institutional Repository in Higher Learning Institutions: A systematic literature review and directions for future research","volume":"7","author":"Asadi","year":"2019","journal-title":"IEEE Access"},{"key":"ref_31","first-page":"1","article-title":"Procedures for performing systematic reviews","volume":"33","author":"Kitchenham","year":"2004","journal-title":"Keele Univer. Tech. Rep. UK"},{"key":"ref_32","unstructured":"Keele, S. (2007). Guidelines for Performing Systematic Literature Reviews in Software Engineering, EBSE, Keele University and Durham University. Technical Report, Ver. 2.3 EBSE Technical Report."},{"key":"ref_33","unstructured":"Bandara, W., Miskon, S., and Fielt, E. (2011). A Systematic, Tool-Supported Method for Conducting Literature Reviews in IS. Inf. Syst. J., 1\u201314."},{"key":"ref_34","first-page":"13","article-title":"Analyzing the Past to Prepare for the Future: Writing a Literature Review","volume":"26","author":"Webster","year":"2002","journal-title":"MIS Q."},{"key":"ref_35","first-page":"1","article-title":"Guidelines for performing Systematic Literature Reviews in Software Engineering","volume":"2","author":"Kitchenham","year":"2007","journal-title":"Keele Univ. Univ. Durh."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/s10115-011-0474-5","article-title":"In-Network Outlier Detection in Wireless Sensor Networks","volume":"34","author":"Branch","year":"2009","journal-title":"Knowl. Inf. Syst."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/TC.2006.13","article-title":"On distributed fault-tolerant detection in wireless sensor networks","volume":"55","author":"Luo","year":"2006","journal-title":"IEEE Trans. Comput."},{"key":"ref_38","first-page":"975","article-title":"Outlier Detection of Data in Wireless Sensor Networks Using Kernel Density Estimation","volume":"5","author":"Samparthi","year":"2010","journal-title":"Int. J. Comput. Appl."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"4680","DOI":"10.1016\/j.eswa.2008.06.019","article-title":"Some issues about outlier detection in rough set theory","volume":"36","author":"Jiang","year":"2009","journal-title":"Expert Syst. Appl."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/s10618-005-0014-6","article-title":"Fast distributed outlier detection in mixed-attribute data sets","volume":"12","author":"Otey","year":"2006","journal-title":"Data Min. Knowl. Discov."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Ghorbel, O., Obeid, A.M., Abid, M., and Snoussi, H. (2016, January 22\u201324). One class outlier detection method in wireless sensor networks: Comparative study. Proceedings of the 2016 24th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia.","DOI":"10.1109\/SOFTCOM.2016.7772168"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"272","DOI":"10.5626\/JCSE.2013.7.4.272","article-title":"Anomaly Detection in Medical Wireless Sensor Networks","volume":"7","author":"Salem","year":"2013","journal-title":"J. Comput. Sci. Eng."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"8745","DOI":"10.1016\/j.eswa.2010.06.040","article-title":"Neighborhood outlier detection","volume":"37","author":"Chen","year":"2010","journal-title":"Expert Syst. Appl."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1653760.1653767","article-title":"Elliptical anomalies in wireless sensor networks","volume":"6","author":"Rajasegarar","year":"2009","journal-title":"ACM Trans. Sens. Netw."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Bakar, Z.A., Mohemad, R., Ahmad, A., and Deris, M.M. (2006, January 7\u20139). A Comparative Study for Outlier Detection Techniques in Data Mining. Proceedings of the IEEE Conference on Cybernetics and Intelligent Systems, Bangkok, Thailand.","DOI":"10.1109\/ICCIS.2006.252287"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.inffus.2016.04.007","article-title":"Spatial anomaly detection in sensor networks using neighborhood information","volume":"33","author":"Hwj","year":"2017","journal-title":"Inf. Fusion"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Abid, A., Kachouri, A., and Mahfoudhi, A. (2016, January 21\u201324). Anomaly detection through outlier and neighborhood data in Wireless Sensor Networks. Proceedings of the 2016 2nd International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), Monastir, Tunisia.","DOI":"10.1109\/ATSIP.2016.7523045"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"1661","DOI":"10.1109\/TPDS.2012.261","article-title":"Scalable hypergrid k-NN-based online anomaly detection in wireless sensor networks","volume":"24","author":"Xie","year":"2013","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_49","first-page":"681","article-title":"New outlier detection method based on fuzzy clustering","volume":"7","author":"Yahya","year":"2010","journal-title":"WSEAS Trans. Inf."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Yang, D., Rundensteiner, E.a., and Ward, M.O. (2009, January 24\u201326). Neighbor-based pattern detection for windows over streaming data. Proceedings of the 12th International Conference on Extending Database Technology Advances in Database Technology, EDBT\u201909, Saint Petersburg, Russia.","DOI":"10.1145\/1516360.1516422"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Aggarwal, C., and Philip, S. (2008, January 24\u201326). Outlier Detection with Uncertain Data. Proceedings of the 2008 SIAM International Conference on Data Mining, Atlanta, GA, USA.","DOI":"10.1137\/1.9781611972788.44"},{"key":"ref_52","unstructured":"Branch, J., Szymanski, B., Giannella, C., Wolff, R.W.R., and Kargupta, H. (2006, January 4\u20137). In-Network Outlier Detection in Wireless Sensor Networks. Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS\u201906), Lisboa, Portugal."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Garcia-Font, V., Garrigues, C., and Rif\u00e0-Pous, H. (2018). Difficulties and challenges of anomaly detection in smart cities: A laboratory analysis. Sensors, 18.","DOI":"10.3390\/s18103198"},{"key":"ref_54","first-page":"2587948","article-title":"Abnormal Event Detection in Wireless Sensor Networks Based on Multiattribute Correlation","volume":"2017","author":"Wang","year":"2017","journal-title":"J. Electr. Comput. Eng."},{"key":"ref_55","first-page":"888","article-title":"Adaptive distributed outlier detection for WSNs","volume":"45","author":"Gaglio","year":"2015","journal-title":"IEEE Trans. Cybern."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"1833","DOI":"10.1016\/j.jpdc.2013.09.005","article-title":"Hyperspherical cluster based distributed anomaly detection in wireless sensor networks","volume":"74","author":"Rajasegarar","year":"2014","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1016\/j.eij.2013.06.001","article-title":"Outliers detection and classification in wireless sensor networks","volume":"14","author":"Fawzy","year":"2013","journal-title":"Egypt. Inform. J."},{"key":"ref_58","first-page":"823","article-title":"Recursive bayesian approaches for auto calibration in drift aware wireless sensor networks","volume":"5","author":"Takruri","year":"2010","journal-title":"J. Netw."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1109\/TSMCC.2008.2007248","article-title":"Anomaly detection and diagnosis algorithms for discrete symbol sequences with applications to airline safety","volume":"39","author":"Budalakoti","year":"2009","journal-title":"IEEE Trans. Syst. Man Cybern. Part C Appl. Rev."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1007\/s10618-008-0093-2","article-title":"Fast mining of distance-based outliers in high-dimensional datasets","volume":"16","author":"Ghoting","year":"2008","journal-title":"Data Min. Knowl. Discov."},{"key":"ref_61","unstructured":"Zhuang, Y., and Chen, L. (2006, January 12\u201315). In-network Outlier Cleaning for Data Collection in Sensor Networks. Proceedings of the Workshop in VLDB, Seoul, Korea."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1016\/j.cogsys.2018.07.007","article-title":"Parallel distributed computing based wireless sensor network anomaly data detection in IoT framework","volume":"52","author":"Li","year":"2018","journal-title":"Cogn. Syst. Res."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"155014771668616","DOI":"10.1177\/1550147716686161","article-title":"A new approach of anomaly detection in wireless sensor networks using support vector data description","volume":"13","author":"Feng","year":"2017","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Gil, P., Martins, H., Cardoso, A., and Palma, L. (2016, January 1\u20133). Outliers detection in non-stationary time-series: Support vector machine versus principal component analysis. Proceedings of the 2016 12th IEEE International Conference on Control and Automation (ICCA), Kathmandu, Nepal.","DOI":"10.1109\/ICCA.2016.7505361"},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Ghorbel, O., Abid, M., and Snoussi, H. (2014, January 17\u201319). Improved KPCA for outlier detection in Wireless Sensor Networks. Proceedings of the 2014 1st International Conference on Advanced Technologies for Signal and Image Processing, ATSIP 2014, Sousse, Tunisia.","DOI":"10.1109\/ATSIP.2014.6834666"},{"key":"ref_66","first-page":"1","article-title":"Outlier detection in wireless sensor networks using distributed principal component analysis","volume":"1","author":"Livani","year":"2013","journal-title":"J. Data Min."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"1373","DOI":"10.1080\/13658816.2012.654493","article-title":"Statistics-based outlier detection for wireless sensor networks","volume":"26","author":"Zhang","year":"2012","journal-title":"Int. J. Geogr. Inf. Sci."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1109\/TIFS.2010.2051543","article-title":"Centered hyperspherical and hyperellipsoidal one-class support vector machines for anomaly detection in sensor networks","volume":"5","author":"Rajasegarar","year":"2010","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Meratnia, N., and Havinga, P. (2008, January 15\u201318). An online outlier detection technique for wireless sensor networks using unsupervised quarter-sphere support vector machine. Proceedings of the 2008 International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), Sydney, NSW, Australia.","DOI":"10.1109\/ISSNIP.2008.4761978"},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"1145","DOI":"10.1109\/TKDE.2007.1067","article-title":"Localized outlying and boundary data detection in sensor networks","volume":"19","author":"Wu","year":"2007","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"1952","DOI":"10.1016\/j.ins.2005.11.007","article-title":"Clustering distributed data streams in peer-to-peer environments","volume":"176","author":"Bandyopadhyay","year":"2006","journal-title":"Inf. Sci."},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Ramotsoela, D., Abu-Mahfouz, A., and Hancke, G. (2018). A survey of anomaly detection in industrial wireless sensor networks with critical water system infrastructure as a case study. Sensors, 18.","DOI":"10.3390\/s18082491"},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Ayadi, A., and Ghorbel, O. (2017, January 26\u201330). Performance of outlier detection techniques based classification in Wireless Sensor Networks. Proceedings of the 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain.","DOI":"10.1109\/IWCMC.2017.7986368"},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1016\/j.asoc.2015.12.042","article-title":"Detection and accommodation of outliers in Wireless Sensor Networks within a multi-agent framework","volume":"42","author":"Gil","year":"2016","journal-title":"Appl. Soft Comput. J."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"3403","DOI":"10.1109\/JSEN.2015.2388498","article-title":"Fast and efficient outlier detection method in wireless sensor networks","volume":"15","author":"Ghorbel","year":"2015","journal-title":"IEEE Sens. J."},{"key":"ref_76","first-page":"929","article-title":"An Outlier detection approach with data mining in wireless sensor network","volume":"4","author":"Govindarajan","year":"2014","journal-title":"Int. J. Curr. Eng. Technol."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"790","DOI":"10.1016\/j.jpdc.2013.02.004","article-title":"Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling","volume":"73","author":"Kumarage","year":"2013","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"1062","DOI":"10.1016\/j.adhoc.2012.11.001","article-title":"Ad Hoc Networks Distributed online outlier detection in wireless sensor networks using ellipsoidal support vector machine","volume":"11","author":"Zhang","year":"2013","journal-title":"Ad Hoc Netw."},{"key":"ref_79","unstructured":"Peng, X., Chen, J., and Shen, H. (2010, January 26\u201328). Outlier detection method based on SVM and its application in copper-matte converting. Proceedings of the 2010 Chinese Control and Decision Conference, Xuzhou, China."},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Moshtaghi, M., Rajasegarar, S., Leckie, C., and Karunasekera, S. (2009, January 7\u201310). Anomaly Detection by Clustering Ellipsoids in Wireless Sensor Networks Masud. Proceedings of the 2009 International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), Melbourne, VIC, Australia.","DOI":"10.1109\/ISSNIP.2009.5416818"},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Agovic, A., Banerjee, A., Ganguly, A., and Protopopescu, V. (2007, January 12\u201315). Anomaly Detection in Transportation Corridors Using Manifold Embedding. Proceedings of the ACM Workshop on Knowledge Discovery from Sensor Data: The 13th International Conference on Knowledge Discovery and Data Mining, San Jose, CA, USA.","DOI":"10.1201\/9781420082333.ch6"},{"key":"ref_82","first-page":"158","article-title":"Unsupervised Outlier Detection in Sensor Networks Using Aggregation Tree","volume":"4632","author":"Zhang","year":"2007","journal-title":"Adv. Data Min. Appl."},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Janakiram, D., Reddy, V., Kumar, A.V.U.P., and V, A.M.R. (2006, January 8\u201312). Outlier Detection in Wireless Sensor Networks using Bayesian Belief Networks. Proceedings of the 2006 1st International Conference on Communication Systems Software & Middleware, New Delhi, India.","DOI":"10.1109\/COMSWA.2006.1665221"},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Granjal, J., Silva, J.M., and Louren\u00e7o, N. (2018). Intrusion detection and prevention in CoAP wireless sensor networks using anomaly detection. Sensors, 18.","DOI":"10.3390\/s18082445"},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1109\/TIFS.2016.2603961","article-title":"Distributed Segment-Based Anomaly Detection with Kullback\u2013Leibler Divergence in Wireless Sensor Networks","volume":"12","author":"Xie","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"383","DOI":"10.2298\/FUEE1603383K","article-title":"Smart outlier detection of wireless sensor network","volume":"29","author":"Kamal","year":"2016","journal-title":"Facta Univ. Ser. Electron. Energetics"},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Yao, H., Cao, H., and Li, J. (2015). Comprehensive Outlier Detection in Wireless Sensor Network with Fast Optimization Algorithm of Classification Model. Int. J. Distrib. Sens. Netw., 2015.","DOI":"10.1155\/2015\/398761"},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Shukla, D.S., Pandey, A.C., and Kulhari, A. (2014, January 28\u201329). Outlier detection: A survey on techniques of WSNs involving event and error based outliers. Proceedings of the International Conference on Innovative Applications of Computational Intelligence on Power, Energy and Controls with Their Impact on Humanity, CIPECH 2014, Ghaziabad, India.","DOI":"10.1109\/CIPECH.2014.7019101"},{"key":"ref_89","first-page":"609","article-title":"Outlier Detection in WSN- A Survey","volume":"3","author":"Ritika","year":"2013","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2240092.2240097","article-title":"Sensor network data fault detection with maximum a posteriori selection and bayesian modeling","volume":"8","author":"Ni","year":"2012","journal-title":"ACM Trans. Sens. Netw."},{"key":"ref_91","doi-asserted-by":"crossref","unstructured":"Kontaki, M., Gounaris, A., Papadopoulos, A.N., Tsichlas, K., and Manolopoulos, Y. (2011, January 11\u201316). Continuous monitoring of distance-based outliers over data streams. Proceedings of the IEEE 27th International Conference on Data Engineering, Hannover, Germany.","DOI":"10.1109\/ICDE.2011.5767923"},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1754414.1754419","article-title":"Sensor faults","volume":"6","author":"Sharma","year":"2010","journal-title":"ACM Trans. Sens. Netw."},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"755","DOI":"10.4304\/jcp.4.8.755-762","article-title":"Subtractive clustering based RBF neural network model for outlier detection","volume":"4","author":"Yang","year":"2009","journal-title":"J. Comput."},{"key":"ref_94","doi-asserted-by":"crossref","unstructured":"Shuai, M., Xie, K., Chen, G., Ma, X., and Song, G. (2008, January 12\u201314). A kalman filter based approach for outlier detection in sensor networks. Proceedings of the 2008 International Conference on Computer Science and Software Engineering, Wuhan, China.","DOI":"10.1109\/CSSE.2008.1240"},{"key":"ref_95","doi-asserted-by":"crossref","unstructured":"Angiulli, F., and Fassetti, F. (2007, January 6\u201310). Detecting distance-based outliers in streams of data. Proceedings of the Sixteenth ACM Conference on Conference On Information and Knowledge Management, CIKM \u201907, Lisbon, Portugal.","DOI":"10.1145\/1321440.1321552"},{"key":"ref_96","doi-asserted-by":"crossref","unstructured":"Birant, D., and Kut, A. (2006, January 19\u201322). Spatio-temporal outlier detection in large databases. Proceedings of the 28th International Conference on Information Technology Interfaces, Cavtat\/Dubrovnik, Croatia.","DOI":"10.1109\/ITI.2006.1708474"},{"key":"ref_97","doi-asserted-by":"crossref","unstructured":"Yahyaoui, A., Abdellatif, T., and Attia, R. (2018, January 27\u201329). READ: Reliable Event and Anomaly Detection System in Wireless Sensor Networks. Proceedings of the 2018 IEEE 27th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Paris, France.","DOI":"10.1109\/WETICE.2018.00044"},{"key":"ref_98","unstructured":"Trinh, V.V., Tran, K.P., and Huong, T.T. (2017, January 18\u201320). Data driven hyperparameter optimization of one-class support vector machines for anomaly detection in wireless sensor networks. Proceedings of the International Conference on Advanced Technologies for Communications, Quy Nhon, Vietnam."},{"key":"ref_99","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.apacoust.2016.03.013","article-title":"Cross-calibration of participatory sensor networks for environmental noise mapping","volume":"110","author":"Can","year":"2016","journal-title":"Appl. Acoust."},{"key":"ref_100","first-page":"203","article-title":"A comparative study on nearest-neighbor based outlier detection in data mining","volume":"1","author":"Kannan","year":"2015","journal-title":"A J. Manag. NISMA Noorul Islam Strateg. Manag. Ambience"},{"key":"ref_101","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/j.sigpro.2013.12.026","article-title":"Review: A Review of Novelty Detection","volume":"99","author":"Pimentel","year":"2014","journal-title":"Signal Process."},{"key":"ref_102","first-page":"76","article-title":"Hybrid approach for outlier detection over wireless sensor network real time data","volume":"6","author":"Chandore","year":"2013","journal-title":"Int. J. Comput. Sci. Addit. Appl."},{"key":"ref_103","doi-asserted-by":"crossref","unstructured":"Warriach, E.U., Nguyen, T.A., Aiello, M., and Tei, K. (2012, January 8\u201311). Notice of Violation of IEEE Publication Principles A hybrid fault detection approach for context-aware wireless sensor networks. Proceedings of the 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012), Las Vegas, NV, USA.","DOI":"10.1109\/MASS.2012.6502527"},{"key":"ref_104","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MCI.2011.940751","article-title":"Anomaly detection in environmental monitoring networks [application notes]","volume":"6","author":"Bezdek","year":"2011","journal-title":"IEEE Comput. Intell. Mag."},{"key":"ref_105","first-page":"1413","article-title":"Anomaly detection in wireless sensor networks","volume":"16","author":"Sangari","year":"2010","journal-title":"Recent Adv. Space Technol. Serv. Clim. Chang."},{"key":"ref_106","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Meratnia, N., and Havinga, P. (2009, January 26\u201329). Adaptive and Online One-Class Support Vector Machine-Based Outlier Detection Techniques for Wireless Sensor Networks. Proceedings of the 2009 International Conference on Advanced Information Networking and Applications Workshops, Bradford, UK.","DOI":"10.1109\/WAINA.2009.200"},{"key":"ref_107","unstructured":"Wang, X., Lizier, J., and Obst, O. (February, January 30). Spatiotemporal anomaly detection in gas monitoring sensor networks. Proceedings of the 5th European conference on Wireless sensor networks, Bologna, Italy."},{"key":"ref_108","doi-asserted-by":"crossref","unstructured":"Ni, K., and Pottie, G. (2007). Bayesian selection of non-faulty sensors. IEEE Int. Symp. Inf. Theory Proc., 616\u2013620.","DOI":"10.1109\/ISIT.2007.4557293"},{"key":"ref_109","doi-asserted-by":"crossref","unstructured":"Chen, J., Kher, S., and Somani, A. (2006, January 26). Distributed Fault Detection of Wireless Sensor Networks. Proceedings of the 2006 Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks, Los Angeles, CA, USA.","DOI":"10.1145\/1160972.1160985"},{"key":"ref_110","doi-asserted-by":"crossref","unstructured":"Kumar Dwivedi, R., Pandey, S., and Kumar, R. (2018, January 11\u201312). A Study on Machine Learning Approaches for Outlier Detection in Wireless Sensor Network. Proceedings of the 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India.","DOI":"10.1109\/CONFLUENCE.2018.8442992"},{"key":"ref_111","doi-asserted-by":"crossref","unstructured":"Trinh, V.V., Tran, K.P., and Mai, A.T. (2017, January 24\u201325). Anomaly Detection in Wireless Sensor Networks via Support Vector Data Description with Mahalanobis Kernels and Discriminative Adjustment. Proceedings of the 4th NAFOSTED Conference on Information and Computer Science Anomaly, Hanoi, Vietnam.","DOI":"10.1109\/NAFOSTED.2017.8108030"},{"key":"ref_112","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1016\/j.adhoc.2015.08.017","article-title":"Deployment and evaluation of a fully applicable distributed event detection system in Wireless Sensor Networks","volume":"37","author":"Dziengel","year":"2016","journal-title":"Ad Hoc Netw."},{"key":"ref_113","doi-asserted-by":"crossref","first-page":"716","DOI":"10.1109\/LGRS.2014.2359685","article-title":"Automatic data quality control of observations in wireless sensor network","volume":"12","author":"Guo","year":"2015","journal-title":"IEEE Geosci. Remote Sens. Lett."},{"key":"ref_114","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1039\/C4EM00273C","article-title":"Multi-criteria anomaly detection in urban noise sensor networks","volume":"16","author":"Dauwe","year":"2014","journal-title":"Environ. Sci. Process. Impacts"},{"key":"ref_115","doi-asserted-by":"crossref","first-page":"160523","DOI":"10.1155\/2013\/160523","article-title":"Distributed Fault-Tolerant Event Region Detection of Wireless Sensor Networks","volume":"2013","author":"Duh","year":"2013","journal-title":"J. Distrib. Sens. Netw."},{"key":"ref_116","doi-asserted-by":"crossref","unstructured":"Shahid, N., Naqvi, I.H., and Qaisar, S.B. (2012, January 21\u201323). Real time energy efficient approach to outlier & event detection in wireless sensor networks. Proceedings of the 2012 IEEE International Conference on Communication Systems (ICCS), Singapore.","DOI":"10.1109\/ICCS.2012.6406130"},{"key":"ref_117","unstructured":"Farruggia, A. (2011). A Probabilistic Approach to Anomaly Detection for Wireless Sensor Networks Abstract. [Ph.D. Thesis, Universit\u00e0 degli Studi di Palermo]."},{"key":"ref_118","unstructured":"Siripanadorn, S., Siripanadorn, S., Hattagam, W., and Teaumroong, N. (2010, January 14\u201316). Anomaly detection using self-organizing map and wavelets in wireless sensor networks. Proceedings of the 10th WSEAS International Conference on Applied Computer Science, Merida, Venezuela."},{"key":"ref_119","doi-asserted-by":"crossref","unstructured":"Bal, M., Shen, W., and Ghenniwa, H. (2009, January 11\u201314). Collaborative signal and information processing in wireless sensor networks: A review. Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics, San Antonio, TX, USA.","DOI":"10.1109\/ICSMC.2009.5346152"},{"key":"ref_120","doi-asserted-by":"crossref","unstructured":"Rajasegarar, S., Leckie, C., and Palaniswami, M. (2008). CESVM: Centered hyperellipsoidal support vector machine based anomaly detection. IEEE Int. Conf. Commun., 1610\u20131614.","DOI":"10.1109\/ICC.2008.311"},{"key":"ref_121","doi-asserted-by":"crossref","unstructured":"Rajasegarar, S., Leckie, C., Palaniswami, M., and Bezdek, J.C. (2007, January 24\u201328). Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks. Proceedings of the 2007 IEEE International Conference on Communications, Glasgow, UK.","DOI":"10.1109\/ICC.2007.637"},{"key":"ref_122","first-page":"33","article-title":"Anomaly Intrusion Detection in Wireless Sensor Networks","volume":"15","author":"Bhuse","year":"2006","journal-title":"J. High Speed Netw."},{"key":"ref_123","unstructured":"Du, W., and Fang, L. (2005, January 4\u20138). LAD: Localization Anomaly Detection for Wireless Sensor Networks. Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium, Denver, CO, USA."},{"key":"ref_124","doi-asserted-by":"crossref","unstructured":"Ahmad, B., Jian, W., Ali, Z.A., Tanvir, S., and Khan, M.S.A. (2018). Hybrid Anomaly Detection by Using Clustering for Wireless Sensor Network. Wirel. Pers. Commun., 1\u201313.","DOI":"10.1007\/s11277-018-5721-6"},{"key":"ref_125","doi-asserted-by":"crossref","unstructured":"Kanev, A., Nasteka, A., Bessonova, C., Nevmerzhitsky, D., Silaev, A., Efremov, A., and Nikiforova, K. (2017, January 3\u20137). Anomaly Detection in Wireless Sensor Network of the \u201cSmart Home\u201d System. Proceedings of the 2017 20th Conference of Open Innovations Association (FRUCT), St. Petersburg, Russia.","DOI":"10.23919\/FRUCT.2017.8071301"},{"key":"ref_126","doi-asserted-by":"crossref","unstructured":"Li, G., He, B., Huang, H., and Tang, L. (2016). Temporal data-driven sleep scheduling and spatial data-driven anomaly detection for clustered wireless sensor networks. Sensors, 16.","DOI":"10.3390\/s16101601"},{"key":"ref_127","doi-asserted-by":"crossref","first-page":"8764","DOI":"10.3390\/s150408764","article-title":"Sensor anomaly detection in wireless sensor networks for healthcare","volume":"15","author":"Haque","year":"2015","journal-title":"Sensors"},{"key":"ref_128","doi-asserted-by":"crossref","first-page":"1413","DOI":"10.1109\/SURV.2013.112813.00168","article-title":"Anomaly Detection in Wireless Sensor Networks in a Non-Stationary Environment Colin","volume":"16","author":"Gluhak","year":"2014","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref_129","doi-asserted-by":"crossref","first-page":"10087","DOI":"10.3390\/s130810087","article-title":"Advancements of data anomaly detection research in Wireless Sensor Networks: A survey and open issues","volume":"13","author":"Rassam","year":"2013","journal-title":"Sensors"},{"key":"ref_130","first-page":"972","article-title":"A parallel rough set tracking algorithm for wireless sensor networks","volume":"7","author":"Ren","year":"2012","journal-title":"J. Netw."},{"key":"ref_131","first-page":"309","article-title":"Wireless Sensor Network Anomalies: Diagnosis and Detection Strategies","volume":"10","author":"Jurdak","year":"2011","journal-title":"Intell. Syst. Ref. Libr."},{"key":"ref_132","first-page":"1469","article-title":"Distance-based outlier detection: Consolidation and renewed bearing","volume":"3","author":"Orair","year":"2010","journal-title":"Vldb"},{"key":"ref_133","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/j.peva.2008.10.007","article-title":"Quality-of-service trade-off analysis for wireless sensor networks","volume":"66","author":"Hoes","year":"2009","journal-title":"Perform. Eval."},{"key":"ref_134","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MWC.2008.4599219","article-title":"Anomaly detection in wireless sensor networks","volume":"15","author":"Rajasegarar","year":"2008","journal-title":"Wirel. Commun. IEEE"},{"key":"ref_135","doi-asserted-by":"crossref","unstructured":"Hill, D.J., Minsker, B.S., and Amir, E. (2009). Real-Time Bayesian Anomaly Detection for Environmental Sensor Data. Water Resour. Res., 45.","DOI":"10.1029\/2008WR006956"},{"key":"ref_136","doi-asserted-by":"crossref","unstructured":"Abe, N., Zadrozny, B., and Langford, J. (2006, January 20\u201323). Outlier detection by active learning. Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Philadelphia, PA, USA.","DOI":"10.1145\/1150402.1150459"},{"key":"ref_137","doi-asserted-by":"crossref","first-page":"1182","DOI":"10.1109\/TC.2005.140","article-title":"Comments on \"Distributed Bayesian algorithms for fault-tolerant event region detection in wireless sensor networks\"","volume":"54","author":"Chen","year":"2005","journal-title":"IEEE Trans. Comput."},{"key":"ref_138","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1023\/B:AIRE.0000045502.10941.a9","article-title":"A Survey of Outlier Detection Methodoligies","volume":"22","author":"Hodge","year":"2004","journal-title":"Artif. Intell. Rev."},{"key":"ref_139","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/s10922-013-9287-z","article-title":"A Survey of Methods for Finding Outliers in Wireless Sensor Networks","volume":"23","author":"McDonald","year":"2013","journal-title":"J. Netw. Syst. Manag."},{"key":"ref_140","doi-asserted-by":"crossref","unstructured":"Portocarrero, J.M.T., Delicato, F.C., Pires, P.F., G\u00e1mez, N., Fuentes, L., Ludovino, D., and Ferreira, P. (2014). Autonomic Wireless Sensor Networks: A Systematic Literature Review. J. Sens., 2014.","DOI":"10.1155\/2014\/782789"},{"key":"ref_141","first-page":"2914","article-title":"Anomaly Detection in Wireless Sensor Network","volume":"9","author":"Mamun","year":"2014","journal-title":"J. Netw."},{"key":"ref_142","doi-asserted-by":"crossref","unstructured":"Su, L., Han, W., Yang, S., Zou, P., and Jia, Y. (2007). Continuous Adaptive Outlier Detection on Distributed Data Streams. Lect. Notes Comput. Sci., 74\u201385.","DOI":"10.1007\/978-3-540-75444-2_13"},{"key":"ref_143","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/s10115-006-0036-4","article-title":"Detecting anomalies in cross-classified streams: A Bayesian approach","volume":"11","author":"Agarwal","year":"2007","journal-title":"Knowl. Inf. Syst."},{"key":"ref_144","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/s10115-006-0026-6","article-title":"Automatic outlier detection for time series: An application to sensor data","volume":"11","author":"Basu","year":"2007","journal-title":"Knowl. Inf. Syst."},{"key":"ref_145","unstructured":"Budalakoti, S., Srivastava, A., Akella, R., and Turkov, E. (2006). Anomaly Detection in Large Sets of High-Dimensional Symbol Sequences. Tech. Rep. NASA TM-2006-214553, NASA Ames Research Center."},{"key":"ref_146","doi-asserted-by":"crossref","unstructured":"He, Z., Deng, S., and Xu, X. (2005). An Optimization Model for Outlier Detection in Categorical Data. International Conference on Intelligent Computing, Springer.","DOI":"10.1007\/11538059_42"},{"key":"ref_147","first-page":"503","article-title":"Real-time Bayesian anomaly detection for environmental sensor data","volume":"32","author":"Hill","year":"2006","journal-title":"Proc. Congr.-Int. Assoc. Hydraul. Res."},{"key":"ref_148","doi-asserted-by":"crossref","unstructured":"Farruggia, A., Lo Re, G., and Ortolani, M. (2011). Probabilistic Anomaly Detection for Wireless Sensor Networks. Congress of the Italian Association for Artificial Intelligence, Springer.","DOI":"10.1007\/978-3-642-23954-0_44"},{"key":"ref_149","doi-asserted-by":"crossref","unstructured":"Chatzigiannakis, V., Papavassiliou, S., Grammatikou, M., and Maglaris, B. (2006, January 26\u201329). Hierarchical anomaly detection in distributed large-scale sensor networks. Proceedings of the 11th IEEE Symposium on Computers and Communications, ISCC\u201906, Pula-Cagliari, Sardinia, Italy.","DOI":"10.1109\/ISCC.2006.1691116"},{"key":"ref_150","first-page":"68","article-title":"Outlier Detection Using Support Vector Machine in Wireless Sensor Network Real Time Data","volume":"1","author":"Mohamed","year":"2011","journal-title":"Int. J. Soft Comput. Eng. (IJSCE)"},{"key":"ref_151","first-page":"66","article-title":"A Heuristic Approach for Sensor Network Outlier Detection","volume":"11","author":"Hassan","year":"2011","journal-title":"Science"},{"key":"ref_152","doi-asserted-by":"crossref","first-page":"2282","DOI":"10.1109\/TGRS.2006.873019","article-title":"A support vector method for anomaly detection in hyperspectral imagery","volume":"44","author":"Banerjee","year":"2006","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"ref_153","doi-asserted-by":"crossref","unstructured":"Wang, C., Viswanathan, K., Choudur, L., Talwar, V., Satterfield, W., and Schwan, K. (2011, January 23\u201327). Statistical techniques for online anomaly detection in data centers. Proceedings of the 12th IFIP\/IEEE International Symposium on Integrated Network Management, IM 2011, Dublin, Ireland.","DOI":"10.1109\/INM.2011.5990537"},{"key":"ref_154","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1016\/j.ijinfomgt.2012.11.004","article-title":"Knowledge Transfer Challenges and Mitigation Strategies in Global Software Development","volume":"33","author":"Nidhra","year":"2012","journal-title":"Int. J. Inf. Manag."},{"key":"ref_155","unstructured":"Hida, Y., Huang, P., and Nishtala, R. (2007). Aggregation Query Under Uncertainty in Sensor Networks, Department of Electrical Engineering and Computer Science, University of California."},{"key":"ref_156","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1145\/959060.959074","article-title":"Distributed deviation detection in sensor networks","volume":"32","author":"Palpanas","year":"2003","journal-title":"ACM Sigmod Rec."},{"key":"ref_157","first-page":"392","article-title":"Algorithms for Mining Distance-Based Outliers in Large Datasets","volume":"98","author":"Knorr","year":"1998","journal-title":"Proc. 24th VLDB Conf."},{"key":"ref_158","doi-asserted-by":"crossref","unstructured":"Ramaswamy, S., Rastogi, R., and Shim, K. (2000). Efficient algorithms for mining outliers from large data sets. ACM Sigmod Rec., 427\u2013438.","DOI":"10.1145\/335191.335437"},{"key":"ref_159","unstructured":"Papadimitriou, S., Kitagawa, H., Gibbons, P.B., and Faloutsos, C. (2003, January 5\u20138). LOCI: Fast outlier detection using the local correlation integral. Proceedings of the 19th International Conference on Data Engineering, Bangalore, India."},{"key":"ref_160","unstructured":"Boulila, W., Farah, I.R., Ettabaa, K.S., Solaiman, B., and Gh\u00e9zala, H.B. (2010, January 18\u201320). Spatio-Temporal Modeling for Knowledge Discovery in Satellite Image Databases. Proceedings of the CORIA 2010, 7th French Information Retrieval Conference, Sousse, Tunisia."},{"key":"ref_161","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1007\/s12145-018-00376-7","article-title":"A top-down approach for semantic segmentation of big remote sensing images","volume":"12","author":"Boulila","year":"2019","journal-title":"Earth Sci. Inform."},{"key":"ref_162","doi-asserted-by":"crossref","unstructured":"Yu, D., Sheikholeslami, G., and Zhang, A. (2002). FindOut: Finding Outliers in Very Large Datasets. Knowl. Inf. Syst.","DOI":"10.1007\/s101150200013"},{"key":"ref_163","unstructured":"Allan, J., Carbonell, J., Doddington, G., Yamron, J., and Yang, Y. (1998). Topic detection and tracking pilot study: Final report. DARPA Broadcast News Transcr. Underst. Workshop."},{"key":"ref_164","unstructured":"Marchette, D.J. (1999, January 9\u201312). A Statistical Method for Profiling Network Traffic. Proceedings of the 1st Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, USA."},{"key":"ref_165","doi-asserted-by":"crossref","unstructured":"Wu, N., and Zhang, J. (2003). Factor analysis based anomaly detection. IEEE Syst. Man Cybern. Soc. Inf. Assur. Workshop.","DOI":"10.1109\/SMCSIA.2003.1232408"},{"key":"ref_166","unstructured":"Vinueza, A., and Grudic, G. (2004). Unsupervised Outlier Detection and Semi-Supervised Learning, University of Colorado. Technical Report CU-CS-976-04."},{"key":"ref_167","unstructured":"Chan, P.K., Mahoney, M.V., and Arshad, M.H. (2003). A Machine Learning Approach to Anomaly Detection, Florida Institute of Technology."},{"key":"ref_168","doi-asserted-by":"crossref","unstructured":"Barbar\u00e1, D., Li, Y., Couto, J., Lin, J.L., and Jajodia, S. (2003, January 9\u201312). Bootstrapping a data mining intrusion detection system. Proceedings of the 2003 ACM Symposium on Applied Computing, SAC \u201903, Melbourne, FL, USA.","DOI":"10.1145\/952613.952616"},{"key":"ref_169","doi-asserted-by":"crossref","unstructured":"Barbar\u00e1, D., Li, Y., and Couto, J. (2002). COOLCAT: An Entropy-Based Algorithm for Categorical Clustering. Entropy.","DOI":"10.1145\/584792.584888"},{"key":"ref_170","unstructured":"Sander, J., Ester, M., Kriegel, H.P., and Xu, X. (1998). Density-based clustering in spatial databases: The algorithm GDBSCAN and its applications. Data Min. Knowl. Discov."},{"key":"ref_171","doi-asserted-by":"crossref","unstructured":"De Stefano, C., Sansone, C., and Vento, M. (2000). To reject or not to reject: That is the question - an answer in case of neural classifiers. IEEE Trans. Syst. Man Cybern. Part Appl. Rev.","DOI":"10.1109\/5326.827457"},{"key":"ref_172","doi-asserted-by":"crossref","unstructured":"Barbar\u00e1, D., Wu, N., and Jajodia, S. (2001, January 5\u20137). Detecting Novel Network Intrusions Using Bayes Estimators. Proceedings of the 2001 SIAM International Conference on Data Mining, Chicago, IL, USA.","DOI":"10.1137\/1.9781611972719.28"},{"key":"ref_173","doi-asserted-by":"crossref","unstructured":"Elnahrawy, E., and Nath, B. (2004). Context-aware sensors. Wirel. Sens. Netw. Proc.","DOI":"10.1007\/978-3-540-24606-0_6"},{"key":"ref_174","doi-asserted-by":"crossref","unstructured":"Hawkins, S., He, H., Williams, G., and Baxter, R. (2002). Outlier Detection Using Replicator Neural Networks. Data Warehous., 170\u2013180.","DOI":"10.1007\/3-540-46145-0_17"},{"key":"ref_175","doi-asserted-by":"crossref","unstructured":"Yamanishi, K., Takeuchi, J.I., Williams, G., and Milne, P. (2004). On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms. Data Min. Knowl. Discov.","DOI":"10.1023\/B:DAMI.0000023676.72185.7c"},{"key":"ref_176","unstructured":"Sykacek, P. (1997, January 16\u201318). Equivalent Error Bars For Neural Network Classifiers Trained By Bayesian Inference. Proceedings of the European Symposium on Artificial Neural Networks, Bruges, Belgium."},{"key":"ref_177","doi-asserted-by":"crossref","first-page":"3448","DOI":"10.1016\/j.comnet.2007.02.001","article-title":"An overview of anomaly detection techniques: Existing solutions and latest technological trends","volume":"51","author":"Patcha","year":"2007","journal-title":"Comput. Netw."},{"key":"ref_178","unstructured":"Tan, P.N. (2006). Introduction to Data Mining, Pearson Education India, University of Minnesota."},{"key":"ref_179","unstructured":"Jain, A.K., and Dubes, R.C. (1988). Algorithms for Clustering Data, Prentice-Hall, Inc."},{"key":"ref_180","first-page":"386","article-title":"A data mining based approach to predict spatiotemporal changes in satellite images","volume":"13","author":"Boulila","year":"2011","journal-title":"Int. J. Appl. Earth Obs. Geoinf."},{"key":"ref_181","unstructured":"Han, J., Pei, J., and Kamber, M. (2011). Data mining: Concepts and techniques, Elsevier."},{"key":"ref_182","doi-asserted-by":"crossref","unstructured":"Safaei, M., Ismail, A.S., Chizari, H., Driss, M., Boulila, W., Asadi, S., and Safaei, M. (2020). Standalone noise and anomaly detection in wireless sensor networks: A novel time-series and adaptive Bayesian-network-based approach. J. Softw. Pract. Exp.","DOI":"10.1002\/spe.2785"},{"key":"ref_183","doi-asserted-by":"crossref","unstructured":"He, Z., Deng, S., Xu, X., and Huang, J.Z. (2006). A fast greedy algorithm for outlier mining. Pacific-Asia Conference on Knowledge Discovery and Data Mining, Springer.","DOI":"10.1007\/11731139_67"},{"key":"ref_184","doi-asserted-by":"crossref","unstructured":"Ando, S. (2007, January 28\u201331). Clustering needles in a haystack: An information theoretic analysis of minority and outlier detection. Proceedings of the Seventh IEEE International Conference on Data Mining, Omaha, NE, USA.","DOI":"10.1109\/ICDM.2007.53"},{"key":"ref_185","unstructured":"Jolliffe, I.T. (2002). Principal component analysis and factor analysis. Principal Component Analysis, Springer."},{"key":"ref_186","doi-asserted-by":"crossref","first-page":"1813","DOI":"10.1002\/aic.690440812","article-title":"Subspace approach to multidimensional fault identification and reconstruction","volume":"44","author":"Dunia","year":"1998","journal-title":"AIChE J."},{"key":"ref_187","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1080\/00401706.1979.10489779","article-title":"Control procedures for residuals associated with principal component analysis","volume":"21","author":"Jackson","year":"1979","journal-title":"Technometrics"},{"key":"ref_188","doi-asserted-by":"crossref","unstructured":"Lijun, C., Xiyin, L., Tiejun, Z., Zhongping, Z., and Aiyong, L. (2010, January 29\u201331). A data stream outlier delection algorithm based on reverse k nearest neighbors. Proceedings of the 2010 International Symposium on Computational Intelligence and Design, Hangzhou, China.","DOI":"10.1109\/ISCID.2010.149"},{"key":"ref_189","first-page":"684952","article-title":"Anomaly detection in wireless sensor networks using immune-based bioinspired mechanism","volume":"11","author":"Rizwan","year":"2015","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_190","first-page":"99","article-title":"Outlier detection techniques for localization in wireless sensor networks: A survey","volume":"8","author":"Abukhalaf","year":"2015","journal-title":"Int. J. Future Gener. Commun. Netw."},{"key":"ref_191","doi-asserted-by":"crossref","unstructured":"Egilmez, H.E., and Ortega, A. (2014, January 4\u20139). Spectral anomaly detection using graph-based filtering for wireless sensor networks. Proceedings of the 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, Italy.","DOI":"10.1109\/ICASSP.2014.6853764"},{"key":"ref_192","doi-asserted-by":"crossref","first-page":"152788","DOI":"10.1109\/ACCESS.2019.2947855","article-title":"Deep Learning-Based Rumor Detection on Microblogging Platforms: A Systematic Review","volume":"7","author":"Boulila","year":"2019","journal-title":"IEEE Access"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/12\/3\/328\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T09:01:36Z","timestamp":1760173296000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/12\/3\/328"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,25]]},"references-count":192,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2020,3]]}},"alternative-id":["sym12030328"],"URL":"https:\/\/doi.org\/10.3390\/sym12030328","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,25]]}}}