101
Views
0
CrossRef citations to date
0
Altmetric
Articles

Anomaly Detection in Estimation of Load and Prediction of Load in Networked Control System Using Correlation and Regression Data Analysis

ORCID Icon &

REFERENCES

  • B. Li, J. Springer, G. Bebis, and M. H. Gunes, “A survey of network flow applications,” J. Netw. Comput. Appl., Vol. 36, no. 2, pp. 567–581, Mar. 2013.
  • L. Zhao, A. Y. Al-Dubai, and G. Min, “An efficient neighbourhood load routing metric for wireless mesh networks,” Simul. Model. Pract. Theory., Vol. 19, no. 6, pp. 1415–1426, Jun. 2011.
  • P. Zych, “Network failure detection based on correlation data analysis,” AEU-Int. J. Electron. Commun., Vol. 77, pp. 27–35, Jul. 2017.
  • X. Tao, T. Kunz, and D. Falconer, “Traffic balancing in wireless MESH networks,” in International Conference on Wireless Networks, Communications and Mobile Computing, Maui, HI, USA, Vol. 1. IEEE, 2005, pp. 169–174.
  • H. Tokito, M. Sasabe, G. Hasegawa, and H. Nakano, “Routing method for gateway load balancing in wireless mesh networks,” in Eighth International Conference on networks, Gosier, France, ICN'09. IEEE, 2009, pp. 127–132.
  • F. Li, Y. Wang, X. Y. Li, A. Nusairat, and Y. Wu, “Gateway placement for throughput optimization in wireless mesh networks,” Mobile Netw. Appl., Vol. 13, no. 1-2, pp. 198–211, Apr. 2008.
  • D. Nandiraju, L. Santhanam, N. Nandiraju, and D. P. Agrawal, “Achieving load balancing in wireless mesh networks through multiple gateways,” in IEEE International Conference on Mobile Ad Hoc and Sensor Systems, Oct. 2006, pp. 807–812.
  • A. A. Pirzada, R. Wishart, M. Portmann, and J. Indulska, “ALARM: an adaptive load-aware routing metric for hybrid wireless mesh networks,” in Proceedings of the Thirty-Second Australasian Conference on Computer science, Vol. 91. Australian Computer Society, Inc., 2009, pp. 37–46.
  • M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, “Network anomaly detection: methods, systems and tools,” IEEE Commun. Surv. Tutorials, Vol. 16, no. 1, pp. 303–336, 2014.
  • E. H. Pena, L. F. Carvalho, S. Barbon, Jr, J. J. Rodrigues, and M. L. Proença, Jr, “Anomaly detection using the correlational paraconsistent machine with digital signatures of network segment,” Inf. Sci., Vol. 420, pp. 313–328, Dec. 2017.
  • P. Gogoi, D. K. Bhattacharyya, B. Borah, and J. K. Kalita, “A survey of outlier detection methods in network anomaly identification,” Comput. J., Vol. 54, no. 4, pp. 570–588, Apr. 2011.
  • A. S. Hadi, and J. S. Simonoff, “Procedures for the identification of multiple outliers in linear models,” J. Am. Stat. Assoc., Vol. 88, no. 424, pp. 1264–1272, Dec. 1993.
  • M. Hasan, M. M. Islam, M. I. I. Zarif, and M. M. A. Hashem, “Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches,” Internet of Things, Vol. 7, p. 100059, 2019.
  • A. C. Atkinson, “Fast very robust methods for the detection of multiple outliers,” J. Am. Stat. Assoc., Vol. 89, no. 428, pp. 1329–1339, Dec. 1994.
  • C. W. Coakley, and T. P. Hettmansperger, “A bounded influence, high breakdown, efficient regression estimator,” J. Am. Stat. Assoc., Vol. 88, no. 423, pp. 872–880, Sep. 1993.
  • T. Roinila, T. Helin, M. Vilkko, T. Suntio, and H. Koivisto, “Circular correlation based identification of switching power converter with uncertainty analysis using fuzzy density approach,” Simul. Model. Pract. Theory., Vol. 17, no. 6, pp. 1043–1058, Jul. 2009.
  • D. Siano, “Three-dimensional/one-dimensional numerical correlation study of a three-pass perforated tube,” Simul. Model. Pract. Theory., Vol. 19, no. 4, pp. 1143–1153, Apr. 2011.
  • C. José, A. Pérez-Villegas, P. García-Teodoro, and G. Maciá-Fernández, “PCA-based multivariate statistical network monitoring for anomaly detection,” Comput. Secur., Vol. 59, pp. 118–137, Jun. 2016.
  • F. Palmieri, “Network anomaly detection based on logistic regression of nonlinear chaotic invariants,” J. Netw. Comput. Appl., Vol. 148, p. 102460, 2019.
  • I. Verhappen, and A. Pereira. “Foundation Fieldbus,” ISA, 2008.
  • L. Ljung, R. Pinteton, and J. Schoukens, “System identification,” in Wiley Encyclopedia of Electrical and Electronics Engineering, Vol. 2012, pp. 1–19, 1999.
  • S. C. Gupta. Fundamentals of statistics. Himalaya Publishing House, Mumbai, India, 2017.
  • T. Kara, Z. Topkarcı, S. Yılmaz, İ Akaltun, and B. Erdoğan, “Pediatric patients with psoriasis and psychiatric disorders: premorbidity and comorbidity in a case-control study,” Journal of Dermatological Treatment, Vol. 30, no. 2, pp. 129–134, 2019.
  • G. R. DeVore, B. Klas, G. Satou, and M. Sklansky, “Quantitative evaluation of fetal right and left ventricular fractional area change using speckle-tracking technology,” Ultrasound Obstet. Gynecol., Vol. 53, no. 2, pp. 219–228, 2019.
  • M. Mego, M. Karaba, G. Minarik, J. Benca, J. Silvia, T. Sedlackova, and J. M. Reuben, “Circulating tumor cells with epithelial–to–mesenchymal transition phenotypes associated with inferior outcomes in primary breast cancer,” Anticancer Res., Vol. 39, no. 4, pp. 1829–1837, 2019..

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.