Reference: | [1]C. Tsai, C. Lai, M. Chiang, and L. T. Yang, “Data Mining for Internet of Things: A Survey,” IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 77-97, 2014. [2]F. Chen, P. Deng, J. Wan, D. Zhang, A. V. Vasilakos, and X. Rong, “Data Mining for the Internet of Things: Literature Review and Challenges,” International Journal of Distributed Sensor Networks, vol. 11, no. 8, 2015. [3]G. Atluri, A. Karpatne, and V. Kumar, “Spatio-Temporal Data Mining: A Survey of Problems and Methods,” ACM Computing Surveys, vol. 51, no. 4, pp. 1-41, 2018. [4]O. Elijah, T. A. Rahman, I. Orikumhi, C. Y. Leow, and M. H. D. N. Hindia, “An Overview of Internet of Things (IoT) and Data Analytics in Agriculture: Benefits and Challenges,” IEEE Internet of Things Journal, vol. 5, no. 5, pp. 3758-3773, 2018. [5]A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, “Internet of Things for Smart Cities,” IEEE Internet of Things Journal, vol. 1, no. 1, pp. 22-32, 2014. [6]R. Jurdak, X. R. Wang, O. Obst, and P. Valencia, "Wireless Sensor Network Anomalies: Diagnosis and Detection Strategies," Intelligence-Based Systems Engineering, Intelligent Systems Reference Library, pp. 309-325, 2011. [7]V. Chandola, A. Banerjee, and V. Kumar, “Anomaly Detection: A Survey,” ACM Computing Surveys, vol. 41, no. 3, pp. 1-58, 2009. [8]V. P. Illiano and E. C. Lupu, “Detecting Malicious Data Injections in Wireless Sensor Networks: A Survey,” ACM Computing Surveys, vol. 48, no. 2, pp. 1-33, 2015. [9]A. A. Cook, G. Mısırlı, and Z. Fan, “Anomaly Detection for IoT Time-Series Data: A Survey,” IEEE Internet of Things Journal, vol. 7, no. 7, pp. 6481-6494, 2020. [10]L. Erhan, M. Ndubuaku, M. Di Mauro, W. Song, M. Chen, G. Fortino, O. Bagdasar, and A. Liotta, “Smart Anomaly Detection in Sensor Systems: A Multi-perspective Review,” Information Fusion, vol. 67, pp. 64-79, 2021. [11]M. Fahim and A. Sillitti, “Anomaly Detection, Analysis and Prediction Techniques in IoT Environment: A Systematic Literature Review,” IEEE Access, vol. 7, pp. 81664-81681, 2019. [12]M. Hasan, M. M. Islam, M. I. I. Zarif, and M. M. A. Hashem, “Attack and Anomaly Detection in IoT Sensors in IoT Sites Using Machine Learning Approaches,” Internet of Things, vol. 7, 2019. [13]I. Alrashdi, A. Alqazzaz, E. Aloufi, R. Alharthi, M. Zohdy, and H. Ming, “AD-IoT: Anomaly Detection of IoT Cyberattacks in Smart City Using Machine Learning,” in 2019 IEEE 9th Annual Computing and Communication Workshop and Conference, pp. 305-310, 2019. [14]Z. Chen, L. Tian, and C. Lin, "A Method for Detection of Anomaly Node in IOT," Algorithms and Architectures for Parallel Processing, Lecture Notes in Computer Science, pp. 777-784, 2015. [15]Z. Deng, D. Weng, J. Chen, R. Liu, Z. Wang, J. Bao, Y. Zheng, and Y. Wu, “AirVis: Visual Analytics of Air Pollution Propagation,” IEEE Transactions on Visualization and Computer Graphics, vol. 26, no. 1, pp. 800-810, 2020. [16]L. Chen, Y. Ho, H. Hsieh, S. Huang, H. Lee, and S. Mahajan, “ADF: An Anomaly Detection Framework for Large-Scale PM2.5 Sensing Systems,” IEEE Internet of Things Journal, vol. 5, no. 2, pp. 559-570, 2018. [17]A. Rodrigues, T. Camilo, J. S. Silva, and F. Boavida, “Diagnostic Tools for Wireless Sensor Networks: A Comparative Survey,” Journal of Network and Systems Management, vol. 21, no. 3, pp. 408-452, 2013. [18]S. Chou, H. Yen, and A. Pang, “A REM-Enabled Diagnostic Framework in Cellular-Based IoT Networks,” IEEE Internet of Things Journal, vol. 6, no. 3, pp. 5273-5284, 2019. [19]D. Rodenas-Herráiz, P. R. A. Fidler, T. Feng, X. Xu, S. Nawaz, and K. Soga, “A Handheld Diagnostic System for 6LoWPAN Networks,” in 2017 13th Annual Conference on Wireless On-demand Network Systems and Services, pp. 104-111, 2017. [20]A. Mahapatro and P. M. Khilar, “Fault Diagnosis in Wireless Sensor Networks: A Survey,” IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 2000-2026, 2013. [21]D. Li, Y. Wang, J. Wang, C. Wang, and Y. Duan, “Recent Advances in Sensor Fault Diagnosis: A Review,” Sensors and Actuators A: Physical, vol. 309, 2020. [22]Z. Zhang, A. Mehmood, L. Shu, Z. Huo, Y. Zhang, and M. Mukherjee, “A Survey on Fault Diagnosis in Wireless Sensor Networks,” IEEE Access, vol. 6, pp. 11349-11364, 2018. [23]C. Wang, H. T. Vo, and P. Ni, “An IoT Application for Fault Diagnosis and Prediction,” in 2015 IEEE International Conference on Data Science and Data Intensive Systems, pp. 726-731, 2015. [24]M. F. Goodchild, “Geographical Data Modeling,” Computers & Geosciences, vol. 18, no. 4, pp. 401-408, 1992. [25]R. Agrawal and R. Srikant, “Fast Algorithms for Mining Association Rules in Large Databases,” in Proceedings of the 20th International Conference on Very Large Data Bases, pp. 487–499, 1994. [26]J. Han, J. Pei, and Y. Yin, “Mining Frequent Patterns without Candidate Generation,” ACM SIGMOD Record, vol. 29, no. 2, pp. 1-12, 2000. [27]H. Lu, L. Feng, and J. Han, “Beyond Intratransaction Association Analysis: Mining Multidimensional Intertransaction Association Rules,” ACM Transactions on Information Systems, vol. 18, no. 4, pp. 423-454, 2000. [28]D. Brélaz, “New Methods to Color the Vertices of a Graph,” Communications of the ACM, vol. 22, no. 4, pp. 251-256, 1979. |