1 |
CHALPATHI G S S, CHAMOLA V, VAISH A, et al. Industrial Internet of Things (IIoT) applications of edge and fog computing: a review and future directions[M]// CHANG W, WU J. Fog/Edge Computing for Security, Privacy, and Applications, ADIS83. Cham: Springer: 293-325.
|
2 |
BARBARESCHI M, CASOLA V, DE DEBENEDICTIS A, et al. On the adoption of physically unclonable functions to secure IIoT devices[J]. IEEE Transactions on Industrial Informatics, 2021, 17(11): 7781-7790. 10.1109/tii.2021.3059656
|
3 |
CASOLA V, DE BENEDICTIS A, RAK M. Security monitoring in the cloud: an SLA-based approach[C]// Proceedings of the 10th International Conference on Availability, Reliability and Security. Piscataway: IEEE, 2015: 749-755. 10.1109/ares.2015.74
|
4 |
DIMITRAKOPOULOS G, DEMESTICHAS P. Intelligent transportation systems[J]. IEEE Vehicular Technology Magazine, 2010, 5(1): 77-84. 10.1109/mvt.2009.935537
|
5 |
STEVENS D L. Implementation of a national monitoring program[J]. Journal of Environmental Management, 1994, 42(1): 1-29. 10.1006/jema.1994.1057
|
6 |
PATCHA A, PARK J M. An overview of anomaly detection techniques: existing solutions and latest technological trends[J]. Computer Networks, 2007, 51(12): 3448-3470. 10.1016/j.comnet.2007.02.001
|
7 |
SONG X Y, WU M X, JERMAINE C, et al. Conditional anomaly detection[J]. IEEE Transactions on Knowledge and Data Engineering, 2007, 19(5): 631-645. 10.1109/tkde.2007.1009
|
8 |
CHANDOLA V, BANERJEE A, KUMAR V. Anomaly detection for discrete sequences: a survey[J]. IEEE Transactions on Knowledge and Data Engineering, 2012, 24(5): 823-839. 10.1109/tkde.2010.235
|
9 |
THOTTAN M, JI C Y. Anomaly detection in IP networks[J]. IEEE Transactions on Signal Processing, 2003, 51(8): 2191-2204. 10.1109/tsp.2003.814797
|
10 |
DENG F J, SONG Y B, HU A Q, et al. Abnormal traffic detection of IoT terminals based on Bloom filter[C]// Proceedings of the 2019 ACM Turing Celebration Conference - China. New York: ACM, 2019: No.126. 10.1145/3321408.3326654
|
11 |
LEE S, KIM H G, RO Y M. BMAN: bidirectional multi-scale aggregation networks for abnormal event detection[J]. IEEE Transactions on Image Processing, 2019, 29: 2395-2408. 10.1109/tip.2019.2948286
|
12 |
GIBERT X, PATEL V M, CHELLAPPA R. Deep multitask learning for railway track inspection[J]. IEEE Transactions on Intelligent Transportation Systems, 2017, 18(1): 153-164. 10.1109/tits.2016.2568758
|
13 |
HAN N, GAO S, LI J, et al. Anomaly detection in health data based on deep learning[C]// Proceedings of the 2018 International Conference on Network Infrastructure and Digital Content. Piscataway: IEEE, 2018: 188-192. 10.1109/icnidc.2018.8525737
|
14 |
FARSHCHI M, WEBER I, DELLA CORTE R, et al. Contextual anomaly detection for a critical industrial system based on logs and metrics[C]// Proceedings of the 14th European Dependable Computing Conference. Piscataway: IEEE, 2018: 140-143. 10.1109/edcc.2018.00033
|
15 |
DASGUPTA S, SHEEHAN T C, STEVENS C F, et al. A neural data structure for novelty detection[J]. Proceedings of the National Academy of Sciences of the United States of America, 2018, 115(51): 13093-13098. 10.1073/pnas.1814448115
|
16 |
LUO C, SHRIVASTAVA A. Arrays of (locality-sensitive) Count Estimators (ACE): anomaly detection on the edge[C]// Proceedings of the 2018 World Wide Web Conference. Republic and Canton of Geneva: International World Wide Web Conferences Steering Committee, 2018: 1439-1448. 10.1145/3178876.3186056
|
17 |
SAID A M, YAHYAOUI A, ABDELLATIF T. Efficient anomaly detection for smart hospital iot systems[J]. Sensors, 2021, 21(4): No.1026. 10.3390/s21041026
|
18 |
MOUSTAFA N, KESHK M, CHOO K K R, et al. DAD: a distributed anomaly detection system using ensemble one-class statistical learning in edge networks[J]. Future Generation Computer Systems, 2021, 118: 240-251. 10.1016/j.future.2021.01.011
|
19 |
WANG H, TANG M, PARK Y, et al. Locality statistics for anomaly detection in time series of graphs[J]. IEEE Transactions on Signal Processing, 2014, 62(3): 703-717. 10.1109/tsp.2013.2294594
|
20 |
ROUSSEEUW P J, HUBERT M. Anomaly detection by robust statistics[J]. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 2018, 8(2): No.e1236. 10.1002/widm.1236
|
21 |
ZHAO Y X, CHENG C, LI L, et al. BDS signal-in-space anomaly probability analysis over the last 6 years[J]. GPS Solutions, 2021, 25(2): No.49. 10.1007/s10291-021-01097-z
|
22 |
BLOOM B H. Space/time trade-offs in hash coding with allowable errors[J]. Communications of the ACM, 1970, 13(7): 422-426. 10.1145/362686.362692
|
23 |
FRANKL P, MAEHARA H. The Johnson-Lindenstrauss lemma and the sphericity of some graphs[J]. Journal of Combinatorial Theory, Series B, 1988, 44(3):355-362. 10.1016/0095-8956(88)90043-3
|
24 |
INDYK P, MOTWANI R. Approximate nearest neighbors: towards removing the curse of dimensionality[C]// Proceedings of the 13th Annual ACM Symposium on Theory of Computing. New York: ACM, 1998: 604-613. 10.1145/276698.276876
|
25 |
SHENG X R, ZHAN D C, LU S, et al. Multi-view anomaly detection: neighborhood in locality matters[C]// Proceedings of the 33rd AAAI Conference on Artificial Intelligence. Palo Alto, CA: AAAI Press, 2019: 4894-4901. 10.1609/aaai.v33i01.33014894
|
26 |
DU H W, YE Q, SUN Z P, et al. FAST-ODT: a lightweight outlier detection scheme for categorical data sets[J]. IEEE Transactions on Network Science and Engineering, 2021, 8(1): 13-24. 10.1109/tnse.2020.3022869
|
27 |
FAN J N, ZHANG Q R, ZHU J L, et al. Robust deep auto-encoding Gaussian process regression for unsupervised anomaly detection[J]. Neurocomputing, 2020, 376: 180-190. 10.1016/j.neucom.2019.09.078
|
28 |
SURBRAMANIAM S, PALPANAS T, PAPADOPOULOS D, et al. Online outlier detection in sensor data using non-parametric models[C]// Proceedings of the 32nd International Conference on Very Large Data Bases. [S.l.]: VLDB Endowment, 2006: 187-198.
|
29 |
ESKIN E, ARNOLD A, PRERAU M, et al. A geometric framework for unsupervised anomaly detection[M]// BARBARÁ D, JAJODIA S. Applications of Data Mining in Computer Security, ADIS6. Boston: Springer, 2002: 77-101.
|