{"id":"https://openalex.org/W4360585244","doi":"https://doi.org/10.1109/ic3i56241.2022.10072941","title":"Anomaly Detection in Disaster Recovery: A Review, Current Trends and New Perspectives","display_name":"Anomaly Detection in Disaster Recovery: A Review, Current Trends and New Perspectives","publication_year":2022,"publication_date":"2022-12-14","ids":{"openalex":"https://openalex.org/W4360585244","doi":"https://doi.org/10.1109/ic3i56241.2022.10072941"},"language":"en","primary_location":{"id":"doi:10.1109/ic3i56241.2022.10072941","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ic3i56241.2022.10072941","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064338114","display_name":"Pooja Anand","orcid":null},"institutions":[{"id":"https://openalex.org/I191972202","display_name":"Amity University","ror":"https://ror.org/02n9z0v62","country_code":"IN","type":"education","lineage":["https://openalex.org/I191972202"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Pooja Anand","raw_affiliation_strings":["Amity Institute of Information Technology Amity University,Noida,Uttar Pradesh,India","Amity Institute of Information Technology Amity University, Noida, Uttar Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Amity Institute of Information Technology Amity University,Noida,Uttar Pradesh,India","institution_ids":["https://openalex.org/I191972202"]},{"raw_affiliation_string":"Amity Institute of Information Technology Amity University, Noida, Uttar Pradesh, India","institution_ids":["https://openalex.org/I191972202"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100734233","display_name":"Mayank Sharma","orcid":"https://orcid.org/0000-0003-3137-9845"},"institutions":[{"id":"https://openalex.org/I191972202","display_name":"Amity University","ror":"https://ror.org/02n9z0v62","country_code":"IN","type":"education","lineage":["https://openalex.org/I191972202"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mayank Sharma","raw_affiliation_strings":["Amity Institute of Information Technology Amity University,Noida,Uttar Pradesh,India","Amity Institute of Information Technology Amity University, Noida, Uttar Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Amity Institute of Information Technology Amity University,Noida,Uttar Pradesh,India","institution_ids":["https://openalex.org/I191972202"]},{"raw_affiliation_string":"Amity Institute of Information Technology Amity University, Noida, Uttar Pradesh, India","institution_ids":["https://openalex.org/I191972202"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055081757","display_name":"Anil Saroliya","orcid":"https://orcid.org/0000-0003-2462-9631"},"institutions":[{"id":"https://openalex.org/I21256249","display_name":"Tashkent University of Information Technology","ror":"https://ror.org/05987a729","country_code":"UZ","type":"education","lineage":["https://openalex.org/I21256249"]}],"countries":["UZ"],"is_corresponding":false,"raw_author_name":"Anil Saroliya","raw_affiliation_strings":["Amity University,Department of IT and Engineering,Tashkent,Uzbekistan","Department of IT and Engineering, Amity University, Tashkent, Uzbekistan"],"affiliations":[{"raw_affiliation_string":"Amity University,Department of IT and Engineering,Tashkent,Uzbekistan","institution_ids":["https://openalex.org/I21256249"]},{"raw_affiliation_string":"Department of IT and Engineering, Amity University, Tashkent, Uzbekistan","institution_ids":["https://openalex.org/I21256249"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5064338114"],"corresponding_institution_ids":["https://openalex.org/I191972202"],"apc_list":null,"apc_paid":null,"fwci":0.1403,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.50955183,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"14","issue":null,"first_page":"1718","last_page":"1726"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.8024149537086487},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7125451564788818},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.5541832447052002},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.5212615132331848},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5186523795127869},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5133115649223328},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.511342465877533},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.49439239501953125},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.45734238624572754},{"id":"https://openalex.org/keywords/data-collection","display_name":"Data collection","score":0.45379412174224854},{"id":"https://openalex.org/keywords/meaning","display_name":"Meaning (existential)","score":0.42236316204071045},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.323547899723053},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2574748992919922}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.8024149537086487},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7125451564788818},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.5541832447052002},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.5212615132331848},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5186523795127869},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5133115649223328},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.511342465877533},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.49439239501953125},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.45734238624572754},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.45379412174224854},{"id":"https://openalex.org/C2780876879","wikidata":"https://www.wikidata.org/wiki/Q3054749","display_name":"Meaning (existential)","level":2,"score":0.42236316204071045},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.323547899723053},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2574748992919922},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ic3i56241.2022.10072941","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ic3i56241.2022.10072941","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7799999713897705,"id":"https://metadata.un.org/sdg/13","display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W204230938","https://openalex.org/W1537430301","https://openalex.org/W1946550961","https://openalex.org/W1980392140","https://openalex.org/W2007087405","https://openalex.org/W2052164429","https://openalex.org/W2089554624","https://openalex.org/W2090197195","https://openalex.org/W2122646361","https://openalex.org/W2137130182","https://openalex.org/W2286850974","https://openalex.org/W2340896621","https://openalex.org/W2404324162","https://openalex.org/W2588949631","https://openalex.org/W2613480438","https://openalex.org/W2620661538","https://openalex.org/W2888560279","https://openalex.org/W3003150488","https://openalex.org/W3039222472","https://openalex.org/W3090066280","https://openalex.org/W3107249503","https://openalex.org/W3160697385","https://openalex.org/W3188376160","https://openalex.org/W4234384890","https://openalex.org/W4299996900","https://openalex.org/W4302064347","https://openalex.org/W6712935769"],"related_works":["https://openalex.org/W2042251007","https://openalex.org/W4206445660","https://openalex.org/W2984111956","https://openalex.org/W2110365568","https://openalex.org/W2391943197","https://openalex.org/W4366152651","https://openalex.org/W3120333185","https://openalex.org/W4229021642","https://openalex.org/W2130317780","https://openalex.org/W2063729131"],"abstract_inverted_index":{"Anomaly":[0,118,262,275],"detection":[1,46,65,119,188,263,276,320,337,380],"is":[2,36,72,98,195,221,248,264,372],"the":[3,85,96,131,151,170,208,219,265,288,308,315,386],"process":[4,266],"of":[5,22,28,33,44,172,181,267,318,321,369,388],"identifying":[6,268],"and":[7,41,78,93,100,108,135,167,201,216,223,231,292,346,376,393],"monitoring":[8],"anomalies":[9,163,322,355],"in":[10,150,175,307,323,356,382],"data":[11,125,132,152,245,282,289,309,324],"for":[12,161,178,353],"potential":[13,116,239],"abnormal":[14],"behavior.":[15],"These":[16],"can":[17,82,110,120,139,205,233,277,296,327,340,360],"be":[18,257],"identifiable":[19],"patterns,":[20],"indications":[21],"a":[23,39,68,158,165,179,191],"problem,":[24],"or":[25,270,363],"even":[26],"evidence":[27],"an":[29,148,305],"attack.":[30],"The":[31],"motive":[32],"this":[34,370],"survey":[35],"to":[37,62,66,76,185,189,199,244,256,259,273],"offer":[38],"based":[40,55],"comprehensive":[42],"assessment":[43],"anomaly":[45,64,187,319,336,379],"studies.":[47],"We":[48,155],"labeled":[49],"current":[50],"techniques":[51,174,381],"into":[52],"diverse":[53],"classes":[54],"on":[56,374],"their":[57,390],"underlying":[58],"perspective.":[59],"One":[60,183],"way":[61,184],"use":[63,186],"survive":[67,190,330],"natural":[69,192,331,357],"IT":[70,193,332],"disaster":[71,194,383],"by":[73,196,350],"knowing":[74,197],"how":[75,198],"interpret":[77,79,200,202],"data.":[80,203,274],"This":[81,204,312],"include":[83,206],"understanding":[84,207,389],"meaning":[86,209],"behind":[87,210],"anomalies,":[88,211],"determining":[89,212],"what":[90,213],"caused":[91,214],"them,":[92,215],"verifying":[94,217],"that":[95,145,176,218,302],"information":[97,220],"real":[99,222],"not":[101,224],"fake.":[102,225],"Additionally,":[103,226],"using":[104,227,335],"regular":[105,228],"software":[106,229],"updates":[107,230],"patches":[109,232],"help":[111,121,234,278,328,361],"protect":[112,235],"your":[113,236],"systems":[114,237],"from":[115,238],"attacks.":[117,240],"you":[122,138,254,279,295,339,359],"identify":[123,280],"incorrect":[124,281,342],"when":[126,283],"collecting":[127,284],"information.":[128,285],"By":[129,286,334],"checking":[130,287],"against":[133,290],"schedule":[134,291],"expected":[136,293],"values,":[137,294],"determine":[140,297],"if":[141,298],"any":[142,299],"patterns":[143,300],"exist":[144,301],"may":[146,303],"suggest":[147,304],"error":[149,306],"collection":[153,310,325],"process.":[154,311],"will":[156],"describe":[157],"general":[159],"method":[160],"detecting":[162,354],"within":[164],"category,":[166],"then":[168],"evaluate":[169],"usefulness":[171],"existing":[173,378],"category":[177],"variety":[180],"applications.":[182,394],"When":[241],"it":[242],"comes":[243],"collection,":[246],"accuracy":[247],"key.":[249],"To":[250],"ensure":[251],"accurate":[252],"data,":[253,343,345],"need":[255],"able":[258],"detect":[260,341],"anomalies.":[261],"unusual":[269],"unauthorized":[271],"changes":[272],"paper":[313,371],"discusses":[314],"demanding":[316],"situations":[317],"events":[326],"organizations":[329],"disasters.":[333],"techniques,":[338],"out-of-date":[344],"breaches.":[347],"In":[348],"addition,":[349],"following":[351],"tips":[352],"disasters,":[358],"prevent":[362],"mitigate":[364],"damage.":[365],"A":[366],"significant":[367],"portion":[368],"focused":[373],"categorizing":[375],"evaluating":[377],"recovery,":[384],"with":[385],"goal":[387],"individual":[391],"characteristics":[392]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
