×

zbMATH — the first resource for mathematics

Anomaly detection techniques in cyber-physical systems. (English) Zbl 1419.62012
Summary: Nowadays, when multiple aspects of our life depend on complex cyber-physical systems, automated anomaly detection, prevention and handling is a critical issue that influence our security and quality of life. Recent catastrophic events showed that manual (human-based) handling of anomalies in complex systems is not recommended, automatic and intelligent handling being the proper approach. This paper presents, through a number of case studies, the challenges and possible solutions for implementing computer-based anomaly detection systems.
MSC:
62-07 Data analysis (statistics) (MSC2010)
62-09 Graphical methods in statistics (MSC2010)
PDF BibTeX XML Cite
Full Text: DOI
References:
[1] V. Barnett, T. Lewis, Outliers in Statistical Data, New York: John Wiley Sons, 1994. ⇒102 · Zbl 0801.62001
[2] V. Chandola, A. Banerjee, V. Kumar, Anomaly detection: a survey, ACM Com- puting Surveys 41, 3 (2009). ⇒103, 108, 114
[3] P. Deac, M. Muste, O. Cretţ, L. Vãcariu, H. Hedesiu, A prototype for the con- tinuous and cost-effective measurement of river discharge, Proc. 2013 19th In- ternational Conference on Control Systems and Computer Science (CSCS ’13), Bucureşti, Romania, 2013, pp. 628-633. ⇒111
[4] V. P. Illiano, E. C. Lupu, Detecting malicious aata injections in wireless sensor networks: a survey, ACM Computig Surveys 48, 2 (2015). ⇒103, 104
[5] I. Kiss, Security improvement techniques for networked critical infrastructures, PhD Thesis, Technical University of Cluj-Napoca, Romania, 2016. ⇒112, 113
[6] M. A. Rassam, A. Zainal, M. A. Maarof, Advancements of data anomaly detec- tion research in wireless sensor networks: a survey and open issues, Sensors 13, 8 (2013) 10087-10122. ⇒103, 104
[7] H. Sandor, Gh. Sebestyen, Optimal security design in the Internet of Things, Digital Forensic and Security (ISDFS), 2017. ⇒116
[8] Gh. Sebestyen, I. Stoica, A. Hangan, Human activity recognition and monitoring for elderly people, Proc. 2016 IEEE 12th International Conference on Intelligent Computer Communication and Processing (ICCP), Cluj, Romania, 2016, pp. 341-347. ⇒107
[9] Gh. Sebestyen, D. Mureşan, A. Hangan, Road quality evaluation with mobile devices, Proc. 2015 16th International Carpathian Control Conference (ICCC), Bucuresti, Romania, 2015, pp. 458-464. ⇒114
[10] L. Vãcariu, A. Hangan, O. Creţ, A. Creţu, A decision support system on the cy- berwater platform, Proc. 2017 21st International Conference on Control Systems and Computer Science (CSCS ’17), Bucureşsti, Romania, 2017, pp. 591-598. ⇒ 112
[11] M. Xie, S. Han, B. Tian, S. Parvin, Anomaly detection in wireless sensor net- works:a survey, Journal of Network and Computer Applications 34, 4 (2011) 1302-1325. ⇒103, 104
[12] Y. Zhang, N. Meratnia, P. Havinga, Outlier detection techniques for wireless sensor networks: a survey, IEEE Communications Surveys and Tutorials 12, 2 (2010) 159-170. ⇒103, 104
[13] *** Rompetrol Refinery explosion, www.wall-street.ro, http://www.wall-street.ro/articol/Companii/205623/rompetrol-rafinare-trimisa-in-judecata-in-dosarul-privind-explozia-de-la-petromidia-soldata-cu-doi-morti-si-doi-raniti.html.)102
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.