Acknowledgement
This work was supported in part by the Institute of Information and Communication Technology Planning and Evaluation (IITP) Grant by the Korean Government through MSIT (Development of 5G-Based Shipbuilding and Marine Smart Communication Platform and Convergence Service) under Grant 2020-0-00869, and in part by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education under Grant 2021R1I1A3051364.
References
- F. Zhang, H. A. D. E. Kodituwakku, W. Hines, and J. B. Coble, "Multi-layer data-driven cyber-attack detection system for industrial control systems based on network, system and process data." IEEE Transactions on Industrial Informatics 15, 7, pp. 4362-4369, 2019. DOI: 10.1109/TII.2019.2891261
- D. Wijayasekara, O. Linda, M. Manic, and C. Rieger, "Mining building energy management system data using fuzzy anomaly detection and linguistic descriptions." IEEE Transactions on Industrial Informatics 10, 3, pp. 1829-1840, 2014. DOI: 10.1109/TII.2014.2328291
- M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M. J. Franklin, S. Shenker, and I. Stoica, "Resilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing." In 9th Symposium on Networked Systems Design and Implementation, pp. 15-28, 2012.
- S. A. Shinde, P. A. Nimkar, S. P. Singh, V. D. Salpe, and Y. R. Jadhav, "MQTT-message queuing telemetry transport protocol." International Journal of Research, 3(3), pp.240-244, 2016.
- C. Che, D. Zhang, P. S. Castro, N. Li, L. Sun, S. Li, Z. Wang, "iBOAT: Isolation-based online anomalous trajectory detection." IEEE Transactions on Intelligent Transportation Systems. Vol. 14(2), pp. 806-818, Feb 2013. DOI: 10.1109/TITS.2013.2238531
- P. Banerjee, P. Yawalkar, and S. Ranu, "Mantra: a scalable approach to mining temporally anomalous subtrajectories." in Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery,pp. 1415-1424, Aug 2016. DOI: 10.1145/2939672.2939846
- J.-G. Lee, J. Han, and X. Li, "Trajectory outlier detection: A partition-and-detect framework." in 2008 IEEE 24th International Conference on Data Engineering. pp. 140-149, Apr 2008. DOI: 10.1109/ICDE.2008.4497422
- Z. Zhu, D. Yao, J. Huang, H. Li, and J. Bi, "Sub-trajectory-and trajectory-neighbor-based outlier detection over trajectory streams." in Pacific-Asia Conference on Knowledge Discovery and Data Mining, pp. 551-563, Jun 2018. DOI: 10.1007/978-3-319-93034-3_44
- Y. Wang, K. Qin, Y. Chen, and P. Zhao, "Detecting anomalous trajectories and behavior patterns using hierarchical clustering from taxi GPS data." ISPRS International Journal of Geo-Information, 7(1), p.25, Jan 2018. DOI: 10.3390/ijgi7010025
- Z. Fu, W. Hu, and T. Tan, "Similarity based vehicle trajectory clustering and anomaly detection." in IEEE International Conference on Image Processing, vol. 2, pp. II-602, Sep 2005. DOI: 10.1109/ICIP.2005.1530127
- N. B. Ghrab, E. Fendri, and M. Hammami, "Abnormal events detection based on trajectory clustering." In 2016 13th International Conference on Computer Graphics, Imaging and Visualization, pp. 301-306, Mar 2016. DOI: 10.1109/CGiV.2016.65
- L. M. Chen, T. Ozsu, and V. Oria. "Robust and Fast Similarity Search for Moving Object Trajectories." In Proc. ACM SIGMOD International Conference on Management of Data, pp. 491-502, Jun 2005. DOI: 10.1145/1066157.1066213
- Q. Zhao, and P. Franti, "WB-index: A sum-of-squares based index for cluster validity." Data & Knowledge Engineering, 92, pp.77-89, Jul 2014. DOI: 10.1016/j.datak.2014.07.008
- D. O. Olguin, B. N. Waber, T. Kim, A. Mohan, K. Ara, and A. Pentland, "Sensible organizations: Technology and methodology for automatically measuring organizational behavior." IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 39 (1), pp. 43-55, Dec 2008. DOI: 10.1109/TSMCB.2008.2006638