标题
An edge computing based anomaly detection method in IoT industrial sustainability
作者
关键词
-
出版物
APPLIED SOFT COMPUTING
Volume -, Issue -, Pages 109486
出版商
Elsevier BV
发表日期
2022-08-11
DOI
10.1016/j.asoc.2022.109486
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Edge Computing for Data Anomaly Detection of Multi-Sensors in Underground Mining
- (2021) Chunde Liu et al. Electronics
- Location Privacy Challenges in Mobile Edge Computing: Classification and Exploration
- (2020) Zhihong Tian et al. IEEE NETWORK
- A Survey on Access Control in the Age of Internet of Things
- (2020) Jing Qiu et al. IEEE Internet of Things Journal
- Deep learning based emotion analysis of microblog texts
- (2020) Dongliang Xu et al. Information Fusion
- A data-driven method for future Internet route decision modeling
- (2019) Zhihong Tian et al. Future Generation Computer Systems-The International Journal of eScience
- Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment
- (2019) Zhihong Tian et al. IEEE Transactions on Industrial Informatics
- Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory
- (2019) Zhihong Tian et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- A Distributed Deep Learning System for Web Attack Detection on Edge Devices
- (2019) Zhihong Tian et al. IEEE Transactions on Industrial Informatics
- Nei-TTE: Intelligent Traffic Time Estimation Based on Fine-Grained Time Derivation of Road Segments for Smart City
- (2019) Jing Qiu et al. IEEE Transactions on Industrial Informatics
- Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles
- (2019) Zhihong Tian et al. IEEE Internet of Things Journal
- Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems
- (2019) Mohan Li et al. IEEE Internet of Things Journal
- Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection
- (2018) Meng Shen et al. IEEE Transactions on Information Forensics and Security
- Security in Mobile Edge Caching with Reinforcement Learning
- (2018) Liang Xiao et al. IEEE WIRELESS COMMUNICATIONS
- Towards a Comprehensive Insight into the Eclipse Attacks of Tor Hidden Services
- (2018) Qingfeng Tan et al. IEEE Internet of Things Journal
- Real-time Detection of Power System Disturbances Based on k-Nearest Neighbor Analysis
- (2017) Lianfang Cai et al. IEEE Access
- Supervised Anomaly Detection in Uncertain Pseudoperiodic Data Streams
- (2016) Jiangang Ma et al. ACM Transactions on Internet Technology
- Sparse kernel learning-based feature selection for anomaly detection
- (2015) Zhimin Peng et al. IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS
- Distributed Real-Time Anomaly Detection in Networked Industrial Sensing Systems
- (2015) Po-Yu Chen et al. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS
- Physics-Based Anomaly Detection Defined on Manifold Space
- (2014) Hao Huang et al. ACM Transactions on Knowledge Discovery from Data
- Adaptive fuzzy clustering based anomaly data detection in energy system of steel industry
- (2013) Jun Zhao et al. INFORMATION SCIENCES
- Efficient distance-based outlier detection on uncertain datasets of Gaussian distribution
- (2013) Salman A. Shaikh et al. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS
- Effectiveness of template detection on noise reduction and websites summarization
- (2012) Derar Alassi et al. INFORMATION SCIENCES
- Isolation-Based Anomaly Detection
- (2012) Fei Tony Liu et al. ACM Transactions on Knowledge Discovery from Data
- A view of cloud computing
- (2010) Michael Armbrust et al. COMMUNICATIONS OF THE ACM
- Graph Regularized Nonnegative Matrix Factorization for Data Representation
- (2010) Deng Cai et al. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE
- Intrusion detection by machine learning: A review
- (2009) Chih-Fong Tsai et al. EXPERT SYSTEMS WITH APPLICATIONS
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now