Remote Anomaly Detection in Industry 4.0 Using Resource-Constrained Devices.
Anders E. KalørDaniel MichelsantiFederico ChiariottiZheng-Hua TanPetar PopovskiPublished in: CoRR (2021)
Keyphrases
- anomaly detection
- resource constrained
- embedded systems
- resource constraints
- sensor networks
- wireless sensor networks
- detecting anomalies
- intrusion detection
- anomalous behavior
- rfid tags
- network intrusion detection
- intrusion detection system
- network traffic
- mobile devices
- unsupervised learning
- detect anomalies
- network security
- multipath
- real time
- one class support vector machines
- network anomaly detection
- machine learning
- low cost
- sensor nodes
- cumulative sum
- computer systems
- data analysis
- genetic algorithm
- negative selection algorithm
- misuse detection