2017 International Conference on Information Networking (ICOIN) 2017
DOI: 10.1109/icoin.2017.7899541
|View full text |Cite
|
Sign up to set email alerts
|

Performance and accuracy trade-off analysis of techniques for anomaly detection in IoT sensors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…However, choosing the wrong algorithm may delay or even compromise the detection process. Some studies also compare anomaly detection algorithms [11] [12]. However, their analysis does not cover important aspects such as the impact of running anomaly detection algorithms in edge devices regarding temperature and power consumption.…”
Section: Related Workmentioning
confidence: 99%
“…However, choosing the wrong algorithm may delay or even compromise the detection process. Some studies also compare anomaly detection algorithms [11] [12]. However, their analysis does not cover important aspects such as the impact of running anomaly detection algorithms in edge devices regarding temperature and power consumption.…”
Section: Related Workmentioning
confidence: 99%
“…However, choosing the wrong algorithm may delay or even compromise the detection process. Some studies also compare anomaly detection algorithms [19] [20] [6]. However, their analysis does not cover important aspects such as the impact of running anomaly detection algorithms in edge devices regarding temperature and power consumption.…”
Section: Related Workmentioning
confidence: 99%
“…In order to provide efficient and reliable feedback, data processing becomes a priority task, while other tasks are often overlooked. As a consequence, sensors may be compromised by failures or even manipulated by attackers to induce erroneous decision-making [5] [6].…”
Section: Introductionmentioning
confidence: 99%
“…In supervised learning, a user defines a target value and classifies each instance with explicitly predefined labels and then these techniques put the future instances into proper classes. On the other hand, in unsupervised learning techniques, instead of users, it is the machine that automatically classifies instances based on similarities [5]. K-Nearest Neighbors (kNN), decision trees, Bayesian classifiers, logistic regression, Support Vector Machines (SVM), and Artificial Neural Networks (ANN) are some algorithms among the supervised learning techniques.…”
Section: Data Miningmentioning
confidence: 99%