2022
DOI: 10.1016/j.asoc.2022.109486
|View full text |Cite
|
Sign up to set email alerts
|

An edge computing based anomaly detection method in IoT industrial sustainability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 38 publications
(22 citation statements)
references
References 30 publications
0
22
0
Order By: Relevance
“…Application Primary Focus Secondary Focus [38] malicious actor IDS - [39] malicious actor IDS - [40] malicious actor DDoS - [41] malicious actor SYN attack - [11] malicious actor botnet - [42] malicious actor -- [14] malicious actor -time series data [43] malicious actor malware detection - [46] malicious actor feature selection - [12] malicious actor -- [44] malicious actor IDS - [10] malicious actor IDS - [45] malicious actor IDS - [47] sensor performance water systems time series data [48] sensor performance charging system - [49] sensor performance nuclear power plant - [51] sensor performance edge connection fault detection - [15] sensor performance emergency detection - [54] time series data IIoT sensor drift - [7] time series data -- [13] time series data multivariate time series data - [55] time series data -- [57] general AD time series data multi-class detection [56] general AD automated vehicles - [58] general AD time series data energy efficiency [52] distributed AD -- [53] distributed AD time series data -…”
Section: Referencementioning
confidence: 99%
See 4 more Smart Citations
“…Application Primary Focus Secondary Focus [38] malicious actor IDS - [39] malicious actor IDS - [40] malicious actor DDoS - [41] malicious actor SYN attack - [11] malicious actor botnet - [42] malicious actor -- [14] malicious actor -time series data [43] malicious actor malware detection - [46] malicious actor feature selection - [12] malicious actor -- [44] malicious actor IDS - [10] malicious actor IDS - [45] malicious actor IDS - [47] sensor performance water systems time series data [48] sensor performance charging system - [49] sensor performance nuclear power plant - [51] sensor performance edge connection fault detection - [15] sensor performance emergency detection - [54] time series data IIoT sensor drift - [7] time series data -- [13] time series data multivariate time series data - [55] time series data -- [57] general AD time series data multi-class detection [56] general AD automated vehicles - [58] general AD time series data energy efficiency [52] distributed AD -- [53] distributed AD time series data -…”
Section: Referencementioning
confidence: 99%
“…In step with [ 52 ], the work in [ 53 ]focused on distributed anomaly detection, citing the incredible increase in IoT devices over the last few years and subsequent increase in load on cloud computing systems. The primary motivation in [ 53 ] was to handle anomalies in real-time, rather than wait for an analysis to occur at the cloud level. The Internet of Vehicles (IoV) (a subset of IoT) producing anomalous sensor data was used as a motivating example.…”
Section: Anomaly Detection By Applicationmentioning
confidence: 99%
See 3 more Smart Citations