Anomaly detection and privacy preservation in cloud-centric internet of things

I Butun, B Kantarci… - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
Internet of Things (IoT) concept provides a number of opportunities to improve our daily lives
while also creating a potential risk of increasing the vulnerability of personal information to …

Performance analysis of anomaly detection of different IoT datasets using cloud micro services

N Rakesh - 2016 International Conference on Inventive …, 2016 - ieeexplore.ieee.org
Although IoT has been around us for a while, it's a new leading edge in technology which
has the ability to connect, communicate and remotely controlling devices via the internet …

Outlier detection approaches based on machine learning in the internet-of-things

J Jiang, G Han, L Shu, M Guizani - IEEE Wireless …, 2020 - ieeexplore.ieee.org
Outlier detection in the Internet of Things (IoT) is an essential challenge issue studied in
numerous fields, including fraud monitoring, intrusion detection, secure localization, trust …

Machine learning approaches for anomaly detection in IoT: an overview and future research directions

N Alghanmi, R Alotaibi, SM Buhari - Wireless Personal Communications, 2022 - Springer
The internet of things (IoT) is the networking of interrelated devices and sensors connected
through the internet to transfer and share data. The data gathered from these devices may …

An lof-based adaptive anomaly detection scheme for cloud computing

T Huang, Y Zhu, Q Zhang, Y Zhu… - 2013 IEEE 37th …, 2013 - ieeexplore.ieee.org
One of the most attractive things about cloud computing from the perspective of business
people is that it provides an effective means to outsource IT. The behaviors of business …

Analysis of machine learning techniques for anomaly detection in the internet of things

S Brady, D Magoni, J Murphy, H Assem… - 2018 IEEE Latin …, 2018 - ieeexplore.ieee.org
A major challenge faced in the Internet of Things (IoT) is discovering issues that can occur in
it, such as anomalies in the network or within the IoT devices. The nature of IoT hinders the …

Unsupervised outlier detection technique for intrusion detection in cloud computing

M Kumar, R Mathur - International Conference for Convergence …, 2014 - ieeexplore.ieee.org
Outlier detection is becoming a recent area of research focus in data mining. Here we are
proposing an efficient outlier detection concept DenOD (Density Based Outlier Detection) …

HADIoT: A hierarchical anomaly detection framework for IoT

H Chang, J Feng, C Duan - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things establishes the intimacy between the Internet and the physical world.
Due to portable size, most IoT devices have limited computing and storage capabilities and …

Unsupervised anomaly event detection for cloud monitoring using online arima

F Schmidt, F Suri-Payer, A Gulenko… - 2018 IEEE/ACM …, 2018 - ieeexplore.ieee.org
Virtualization offers cost efficient usage of digital resources. Thus, dedicated hardware
solutions are transferred into virtualized services running in the cloud. Such softwarization of …

Exploring time and frequency domains for accurate and automated anomaly detection in cloud computing systems

Q Guan, S Fu, N DeBardeleben… - 2013 IEEE 19th Pacific …, 2013 - ieeexplore.ieee.org
Cloud computing has become increasingly popular by obviating the need for users to own
and maintain complex computing infrastructures. However, due to their inherent complexity …