2021
DOI: 10.1155/2021/9954951
|View full text |Cite
|
Sign up to set email alerts
|

AdaGUM: An Adaptive Graph Updating Model-Based Anomaly Detection Method for Edge Computing Environment

Abstract: With the rapid development of Internet of Things (IoT), massive sensor data are being generated by the sensors deployed everywhere at an unprecedented rate. As the number of Internet of Things devices is estimated to grow to 25 billion by 2021, when facing the explicit or implicit anomalies in the real-time sensor data collected from Internet of Things devices, it is necessary to develop an effective and efficient anomaly detection method for IoT devices. Recent advances in the edge computing have significant … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(14 citation statements)
references
References 39 publications
0
14
0
Order By: Relevance
“…Application Primary Focus Secondary Focus [38] malicious actor IDS - [39] malicious actor IDS - [40] malicious actor DDoS - [41] malicious actor SYN attack - [11] malicious actor botnet - [42] malicious actor -- [14] malicious actor -time series data [43] malicious actor malware detection - [46] malicious actor feature selection - [12] malicious actor -- [44] malicious actor IDS - [10] malicious actor IDS - [45] malicious actor IDS - [47] sensor performance water systems time series data [48] sensor performance charging system - [49] sensor performance nuclear power plant - [51] sensor performance edge connection fault detection - [15] sensor performance emergency detection - [54] time series data IIoT sensor drift - [7] time series data -- [13] time series data multivariate time series data - [55] time series data -- [57] general AD time series data multi-class detection [56] general AD automated vehicles - [58] general AD time series data energy efficiency [52] distributed AD -- [53] distributed AD time series data -…”
Section: Referencementioning
confidence: 99%
See 4 more Smart Citations
“…Application Primary Focus Secondary Focus [38] malicious actor IDS - [39] malicious actor IDS - [40] malicious actor DDoS - [41] malicious actor SYN attack - [11] malicious actor botnet - [42] malicious actor -- [14] malicious actor -time series data [43] malicious actor malware detection - [46] malicious actor feature selection - [12] malicious actor -- [44] malicious actor IDS - [10] malicious actor IDS - [45] malicious actor IDS - [47] sensor performance water systems time series data [48] sensor performance charging system - [49] sensor performance nuclear power plant - [51] sensor performance edge connection fault detection - [15] sensor performance emergency detection - [54] time series data IIoT sensor drift - [7] time series data -- [13] time series data multivariate time series data - [55] time series data -- [57] general AD time series data multi-class detection [56] general AD automated vehicles - [58] general AD time series data energy efficiency [52] distributed AD -- [53] distributed AD time series data -…”
Section: Referencementioning
confidence: 99%
“…Table A4 lists all the data-sets used in the works surveyed here. IEEE Xplore 2020 [3] IEEE Xplore 2020 [44] IEEE Xplore 2021 NN and logistic regression (ensemble) 5 [2] IEEE Xplore 2021 STGNN, GCN 3+N (max) [14] IEEE Xplore 2021 GTA l5 [43] IEEE Xplore 2021 GraphSAGE, MLP K+1 [23] Journal of Physics 2021 [24] Nature 2021 GCN (encoder) [10] Science Direct 2019 MLP [45] Wiley 2021 MLP 6 (max) [52] Wiley 2021 CNN, MLP Table A2. Breakdown of hyperparameters in surveyed works.…”
Section: Appendix a Dataset And Breakdown Of Approachesmentioning
confidence: 99%
See 3 more Smart Citations