1. Amer M, Goldstein M (2012) Nearest-neighbor and clustering based anomaly detection algorithms for rapidminer. In: Proceedings of the 3rd rapidminer community meeting and conference (RCOMM 2012), pp 1–12
2. Anton D D S, Sinha S, Schotten H D (2019) Anomaly-based intrusion detection in industrial data with svm and random forests. In: 2019 International conference on software, telecommunications and computer networks (softCOM). https://doi.org/10.23919/softcom.2019.8903672https://doi.org/10.23919/softcom.2019.8903672
3. Bandaragoda R T, Ting M K, Albrecht D, et al. (2018) Isolation-based anomaly detection using nearest-neighbor ensembles. Comput Intell 34(4):968–998. https://doi.org/10.1111/coin.12156
4. Berthelsen E (2018) Market trends: predictive maintenance drives iot in manufacturing operations. https://www.gartner.com/doc/3856379/market-trends-predictive-maintenance-drives. Accessed 20 Aug 2020
5. Bruke R (2012) Hazmat studies: Nmr and mri medical scanners: surviving the “invisible force”. https://www.firehouse.com/rescue/article/10684588/firefighter-hazmat-situations. Accessed 15 Feb 2019