2021
DOI: 10.1109/jiot.2021.3073705
|View full text |Cite
|
Sign up to set email alerts
|

Monotone Split and Conquer for Anomaly Detection in IoT Sensory Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 30 publications
0
8
0
Order By: Relevance
“…Time-series data [43,44,45,46,47,48,49,50] Smart city [51,52,53,54] Monitoring machinery health [55,5] Robotics and manufacturing [56,57,58] Detection applications for IoT sensors [59,60] Other industrial or manufacturing [61,62,63,64] Surveillance and video [65,66,67] General-purpose frameworks [68,69,70] Network and communication frameworks [71,72,73,74] User security and privacy frameworks [75,76,77] Other frameworks [78,79] Network traffic in IoT [80,81,82] Device and infrastructure security [83,21,84,85,86,87] Data transport security [88,…”
Section: Application Category Referencementioning
confidence: 99%
See 1 more Smart Citation
“…Time-series data [43,44,45,46,47,48,49,50] Smart city [51,52,53,54] Monitoring machinery health [55,5] Robotics and manufacturing [56,57,58] Detection applications for IoT sensors [59,60] Other industrial or manufacturing [61,62,63,64] Surveillance and video [65,66,67] General-purpose frameworks [68,69,70] Network and communication frameworks [71,72,73,74] User security and privacy frameworks [75,76,77] Other frameworks [78,79] Network traffic in IoT [80,81,82] Device and infrastructure security [83,21,84,85,86,87] Data transport security [88,…”
Section: Application Category Referencementioning
confidence: 99%
“…The method trains supervised models (Random Forests, Naive Bayes, and Neural Networks) to detect anomalies and cites a 30x reduction in computational time. Dang et al [64] proposes a novel monotone split and Conquer (MSC) strategy to detect short and long forms of anomalies. The MSC model has an offline training phase and an online detection phase.…”
Section: Other Industrial or Manufacturing Applicationsmentioning
confidence: 99%
“…In terms of IoT, there are a huge number of sensors generating large volumes of multidimensional data, where data anomalies caused by system errors or malicious attacks do harm to the application effectiveness or even make the system break down [16]- [18]. As a crucial challenge in IoT, anomaly detection has been widely investigated in system security and monitoring management fields, including Intrusion Detection Systems (IDSs) [16], [17], [19]- [21], fraud monitoring [22], [23], data-based decision [24]- [26] and so on. Conceptually, anomaly detection refers to digging out the abnormal data that is inconsistent with the general data in the viewpoint of given rules or features, which is also regarded as a binary-classification issue for normal data and abnormal data.…”
Section: A Backgroundmentioning
confidence: 99%
“…Therefore, a technology capable of continuously collecting data in the observation area without defects has been studied as a significant issue in recent years. For example, in areas where severe natural disasters have occurred or areas where people cannot access, such as conflict areas, essential data can be collected using various Internet of Things (IoT) devices [2][3][4]. Small sensors can be mounted and distributed in unmanned aerial vehicles such as drones, but it is not easy to evenly place small IoT devices throughout the observation area through spraying from drones.…”
Section: Introductionmentioning
confidence: 99%