2012
DOI: 10.1007/978-3-642-28920-0_6
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection in Water Management Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
28
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 36 publications
(28 citation statements)
references
References 22 publications
0
28
0
Order By: Relevance
“…The second approach to event detection is based on signal processing and data driven techniques [10,[15][16][17][18][19][20]. For example, Hart et al [15] reported a linear prediction filter (LPF).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The second approach to event detection is based on signal processing and data driven techniques [10,[15][16][17][18][19][20]. For example, Hart et al [15] reported a linear prediction filter (LPF).…”
Section: Introductionmentioning
confidence: 99%
“…The MED approach provides a measure of the distance between the sampled water quality and the previously measured samples contained in the history window. Allgeier et al [17] and Raciti et al [18] utilized artificial neural networks (ANN) and support vector machines (SVM) to classify water quality data into normal and anomalous classes after supervised learning training. Perelman et al [19] and Arad et al [20] reported a general framework that integrates a data-driven estimation model with sequential probability updating to detect quality faults in water distribution systems using multivariate water quality time series.…”
Section: Introductionmentioning
confidence: 99%
“…Secondly, the use of anomaly detection in water management systems is discussed by Raciti et al, [179]. Their research is motivated by the concern over the quality of drinking water and as part of the critical infrastructure grouping, water supply security is at risk from cyber-threats.…”
Section: Existing Behavioural Researchmentioning
confidence: 99%
“…In the case of misuse detection, the inability to identify attacks, which have not previously taken place meaning that it is always one step behind new and emerging attacks, is the main problem. However, in the case of anomaly detection, new attacks can be uncovered but there is a dependence on referencing behaviour back to a control model of normality [179].…”
Section: Existing Behavioural Researchmentioning
confidence: 99%
“…It has previously been successfully used as a component in critical information infrastructure protection [22], as well as a means of detecting contaminants in drinking water [23]. Since anomaly detection is effective when searching for irregular patterns in large data sets, we have chosen ADWICE as the basis of our DLP approach.…”
Section: B Adwicementioning
confidence: 99%