DOI: 10.3990/1.9789036530583
|View full text |Cite
|
Sign up to set email alerts
|

Observing the unobservable : distributed online outlier detection in wireless sensor networks

Abstract: This research was conducted within the EU projects e-SENSE and SENSEI. Copyright c 2010 by Yang Zhang, Enschede, The Netherlands. All rights reserved. No part of this book may be reproduced or transmitted, in any form or by any means, electronic or mechanical, including photocopying, microfilming, and recording, or by any information storage or retrieval system, without the prior written permission of the author.Printed by Wöhrmann Print Service. AbstractThe generation of wireless sensor networks (WSNs) makes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
43
0

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(44 citation statements)
references
References 131 publications
0
43
0
Order By: Relevance
“…The purpose of an outlier and event detection technique for WSNs deployed in harsh environments should be three-fold: outlier detection, event detection and event identification Zhang et al 2010;Zhang 2010).…”
Section: Purpose Of Outlier and Event Detection Techniques For Wsns Imentioning
confidence: 99%
“…The purpose of an outlier and event detection technique for WSNs deployed in harsh environments should be three-fold: outlier detection, event detection and event identification Zhang et al 2010;Zhang 2010).…”
Section: Purpose Of Outlier and Event Detection Techniques For Wsns Imentioning
confidence: 99%
“…An instance sensor data is labelled as an outlier since the probability that the data could be generated by the model is very low (Chandola et al, 2007). These techniques assume that majority of sensor data includes normal observations (Zhang, 2010) since WSNs imperfect sensors can break the assumption especially in the presence of the faulty nodes.…”
Section: Statistics-based Outlier Detection Techniquesmentioning
confidence: 99%
“…In addition, inspectors are sometimes uncertain if a suspicious reading is in fact an anomaly unless they are experts in their domain. Although uncommon, algorithm designers may use metrics such as distance, density, or a running average to label anomalies in the original data [6]. However, these labeling techniques are themselves anomaly detection mechanisms that have their own deficiencies.…”
Section: Introductionmentioning
confidence: 97%