All Issue

2023 Vol.22, Issue 1 Preview Page

Research Article

30 March 2023. pp. 67-74
Abstract
References
1
Bosman, H. H., Iacca, G., Tejada, A., Wörtche, H. J. and Liotta, A. (2017), “Spatial anomaly detection in sensor networks using neighborhood information”, Information Fusion, Vol.33, pp.41-56. 10.1016/j.inffus.2016.04.007
2
Chen, Z., Yeo, C. K., Lee, B. S. and Lau, C. T. (2018), “Autoencoder-based network anomaly detection”, In 2018 Wireless telecommunications symposium (WTS), Arizona, pp.1-5. 10.1109/WTS.2018.8363930
3
Dereszynski, E. W. and Dietterich, T. G. (2011), “Spatiotemporal models for data-anomaly detection in dynamic environmental monitoring campaigns”, ACM Transactions on Sensor Networks, Vol.9, No.1, pp.1-36. 10.1145/1993042.1993045
4
Duffield, N., Haffner, P., Krishnamurthy, B. and Ringberg, H. (2009), “Rule-based anomaly detection on IP flows”, In IEEE INFOCOM 2009, Rio de Janeiro, pp.424-432. 10.1109/INFCOM.2009.5061947
5
Hochreiter, S. and Schmidhuber, J. (1997), “Long short-term memory”, Neural computation, Vol.9, No.8, pp.1735-1780. 10.1162/neco.1997.9.8.17359377276
6
Ilgun, K. (1992), A real-time intrusion detection system for unix, Master Thesis, University of California Santa Barbara.
7
Jesus, G., Casimiro, A. and Oliveira, A. (2017), “A survey on data quality for dependable monitoring in wireless sensor networks”, Sensors, Vol.17, No.9, pp.2010. 10.3390/s1709201028869505PMC5620495
8
Lane, T. and Brodley, C. E. (1997), “An application of machine learning to anomaly detection”, In Proc. of the 20th national information systems security conference, Baltimore, Vol.377, pp.366-380.
9
Li, Y. and Parker, L. E. (2014), “Nearest neighbor imputation using spatial-temporal correlations in wireless sensor networks”, Information Fusion, Vol.15, pp.64-79. 10.1016/j.inffus.2012.08.00728435414PMC5396980
10
Liu, H., Shah, S. and Jiang, W. (2004), “On-line outlier detection and data cleaning”, Computers & Chemical Engineering, Vol.28, No.9, pp.1635-1647. 10.1016/j.compchemeng.2004.01.009
11
Liu, P., Sun, X., Han, Y., He, Z., Zhang, W. and Wu, C. (2022), “Arrhythmia classification of LSTM autoencoder based on time series anomaly detection”, Biomedical Signal Processing and Control, Vol.71, Part B, 103228. 10.1016/j.bspc.2021.103228
12
Mahalanobis, P. C. (1936), “On the generalised distance in statistics”, In Proc. of the National Institute of Science of India, Kolkata, Vol.12, pp.49-55.
13
Mori, A., Subramanian, S. S., Ishikawa, T. and Komatsu, M. (2017), “A case study of a cut slope failure influenced by snowmelt and rainfall”, Procedia engineering, Vol.189, pp.533-538. 10.1016/j.proeng.2017.05.085
14
Nassif, A. B., Talib, M. A., Nasir, Q. and Dakalbab, F. M. (2021), “Machine learning for anomaly detection: A systematic review”, Ieee Access, Vol.9, pp.78658-78700. 10.1109/ACCESS.2021.3083060
15
Omar, S., Ngadi, A. and Jebur, H. H. (2013), “Machine learning techniques for anomaly detection: an overview”, International Journal of Computer Applications, Vol.79, No.2. 10.5120/13715-1478
16
Rabatel, J., Bringay, S. and Poncelet, P. (2011), “Anomaly detection in monitoring sensor data for preventive maintenance”, Expert Systems with Applications, Vol.38, No.6, pp.7003-7015. 10.1016/j.eswa.2010.12.014
17
Rassam, M. A., Maarof, M. A. and Zainal, A. (2014), “Adaptive and online data anomaly detection for wireless sensor systems”, Knowledge-Based Systems, Vol.60, pp.44-57. 10.1016/j.knosys.2014.01.003
18
Rumelhart, D. E., Hinton, G. E. and Williams, R. J. (1986), “Learning representations by back-propagating errors”, Nature, Vol.323, No.6088, pp.533-536. 10.1038/323533a0
19
Teh, H. Y., Kempa-Liehr, A. W. and Wang, K. I. K. (2020), “Sensor data quality: A systematic review”, Journal of Big Data, Vol.7, No.1, pp.1-49. 10.1186/s40537-020-0285-1
20
Zhang, H., Liu, J. and Pang, A. C. (2018), “A Bayesian network model for data losses and faults in medical body sensor networks”, Computer Networks, Vol.143, pp.166-175. 10.1016/j.comnet.2018.07.009
21
Zhang, L. L., Zhang, J., Zhang, L. M. and Tang, W. H. (2011), “Stability analysis of rainfall-induced slope failure: a review”, Proc. of the Institution of Civil Engineers-Geotechnical Engineering, Vol.164, No.5, pp.299-316. 10.1680/geng.2011.164.5.299
22
Zhang, Y., Meratnia, N. and Havinga, P. J. (2010), “Ensuring high sensor data quality through use of online outlier detection techniques”, International Journal of Sensor Networks, Vol.7, No.3, pp.141-151. 10.1504/IJSNET.2010.033116
Information
  • Publisher :Korean Geosythetics Society
  • Publisher(Ko) :한국지반신소재학회
  • Journal Title :Journal of the Korean Geosynthetics Society
  • Journal Title(Ko) :한국지반신소재학회 논문집
  • Volume : 22
  • No :1
  • Pages :67-74
  • Received Date : 2023-02-23
  • Revised Date : 2023-03-16
  • Accepted Date : 2023-03-24