, Telecommunication management; Charging management; Charging Data Record (CDR) parameter description, 3GPP; Technical Specification Group Services and System Aspects, 2018.
, 5G vision, white paper, Samsung Electronics Co., Tech. Rep, 2015.
, 5G; Service requirements for next generation new services and markets, 2018.
, 5G: A technology vision, white paper, Huawei Technologies Co., Tech. Rep, 2013.
The illustrated wavelet transform handbook: introductory theory and applications in science, engineering, medicine and finance, 2017. ,
Hybrid approach for detection of anomaly network traffic using data mining techniques, Procedia Technology, 2012. ,
An introduction to categorical data analysis, 2018. ,
A survey of network anomaly detection techniques, Journal of Network and Computer Applications, 2016. ,
A survey on 5G networks for the internet of things: Communication technologies and challenges, IEEE Access, 2018. ,
Intrusion detection systems: A survey and taxonomy, 2000. ,
A signal analysis of network traffic anomalies, Proc. of ACM SIGCOMM Workshop IMW, 2002. ,
An entropy-based network anomaly detection method, Entropy, 2015. ,
A guided tour of the fast fourier transform, IEEE spectrum, 1969. ,
On the complexity of neural network classifiers: A comparison between shallow and deep architectures, IEEE Transactions on Neural Networks and Learning Systems, 2014. ,
Model selection and Akaike's information criterion (AIC): The general theory and its analytical extensions, Psychometrika, 1987. ,
The use of the area under the ROC curve in the evaluation of machine learning algorithms, Pattern recognition, 1997. ,
Analysis of machine learning techniques for anomaly detection in the internet of things, Latin American Conference on Computational Intelligence (LA-CCI), 2018. ,
Anomaly extraction in backbone networks using association rules, Proceedings of the ACM SIGCOMM conference on Internet measurement, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-00527139
Introduction to time series and forecasting, 2002. ,
Decoding hidden markov models faster than viterbi via online matrix-vector (max, +)-multiplication, AAAI Conference on Artificial Intelligence, 2016. ,
Workload prediction using ARIMA model and its impact on cloud applications' QoS, IEEE Transactions on Cloud Computing, 2015. ,
, Statistical inference, 2002.
Anomaly detection in temperature data using dbscan algorithm, International Symposium on Innovations in Intelligent Systems and Applications (INISTA), 2011. ,
Outlier detection: A survey, ACM Computing Surveys, 2007. ,
Anomaly detection: A survey, ACM computing surveys (CSUR), 2009. ,
LIBSVM: a library for support vector machines, 2011. ,
Sampling techniques, 2007. ,
Full regularization path for sparse principal component analysis, International Conference on Machine Learning, 2007. ,
The relationship between Precision-Recall and ROC curves, International conference on Machine learning, 2006. ,
Efficient algorithms for agglomerative hierarchical clustering methods, Journal of Classification, 1984. ,
, Digital cellular telecommunications system
Identifying the root cause of video streaming issues on mobile devices, 2015. ,
Guest editors introduction to the top 10 algorithms, Computing in Science and Engineering, 2000. ,
Network traffic anomaly detection based on wavelet analysis, International Conference on Software Engineering Research, Management and Applications, 2018. ,
From 1G to 5G, what next?, IAENG International Journal of Computer Science, 2018. ,
Anomaly detection methods in wired networks: A survey and taxonomy, Computer Communications, 2004. ,
, Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN); Overall description, 2010.
Self-organizing networks (son) in 3gpp long term evolution, Nomor Research GmbH, 2008. ,
A Hough-transform-based anomaly detector with an adaptive time interval, Proc. of ACM SAC, 2011. ,
Context-aware self-healing: User equipment as the main source of information for small-cell indoor networks, IEEE Vehicular Technology Magazine, 2016. ,
Knowledge base radio and core network prescriptive root cause analysis, US Patent Application 14/621, vol.101, 2016. ,
Towards a faster symbolic aggregate approximation method, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00690016
K-means+id3: A novel method for supervised anomaly detection by cascading k-means clustering and ID3 decision tree learning methods, IEEE Trans. Knowl. Data Eng, 2007. ,
Anomalybased network intrusion detection: Techniques, systems and challenges, 2009. ,
Digital society from 1G to 5G: A comparative study, International Journal of Application or Innovation in Engineering & Management, 2014. ,
Fusion of multiple classifiers for intrusion detection in computer networks, Pattern recognition letters, 2003. ,
Efficient rule set generation using rough set theory for classification of high dimensional data, 2011. ,
Automatic root cause analysis for LTE networks based on unsupervised techniques, IEEE Trans. Vehicular Technology, 2016. ,
, GSM/EDGE radio access network (GERAN); overall description, 2009.
Anomaly detection and motif discovery in symbolic representations of time series, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01507517
The artificial immune ecosystem: A bioinspired meta-algorithm for boosting time series anomaly detection with expert input, Applications of Evolutionary Computation, 2017. ,
Wavelet transform based fast approximate Fourier transform, IEEE International Conference on Acoustics, Speech, and Signal Processing, 1997. ,
Outlier detection for temporal data: A survey, IEEE Transactions on Knowledge and Data Engineering, 2014. ,
Network failure detection and prediction using signal measurements, Patent US9100339B1, 2014. ,
Event detection with vector similarity based on fourier transformation, Proc. of IEEE ICCSSE, 2014. ,
A hybrid rule-based/case-based reasoning approach for service fault diagnosis, International Conference on Advanced Information Networking and Applications AINA, 2006. ,
Handbook of Knowledge Representation, 2008. ,
Improved principal component analysis for anomaly detection: Application to an emergency department, Computers & Industrial Engineering, 2015. ,
Bayesian anomaly detection methods for social networks, The Annals of Applied Statistics, 2010. ,
System and method for allocating resources based on events in a network environment, Patent US8788654B2, 2010. ,
Data mining in time series databases, 2004. ,
Robust support vector machines for anomaly detection in computer security, Proc. of IEEE ICMLA, 2003. ,
Service problem diagnosis for mobile wireless networks, 2016. ,
Challenges in 5g: How to empower SON with big data for enabling 5g, IEEE Network, 2014. ,
Flow-based anomaly detection using neural network optimized with GSA algorithm, Proc. of IEEE ICDCS, 2013. ,
A deep learning approach for network intrusion detection system, ICST Trans. Security Safety, 2016. ,
Nevermind, the problem is already fixed: Proactively detecting and troubleshooting customer DSL problems, 2010. ,
System and method for identifying problems on a network, 2015. ,
How to measure network flexibility? a proposal for evaluating softwarized networks, IEEE Communications Magazine, 2018. ,
HOT SAX: efficiently finding the most unusual time series subsequence, Proc. of IEEE ICDM, 2005. ,
Segmenting time series: A survey and novel approach, Data mining in time series databases, 2004. ,
A survey of feature selection and feature extraction techniques in machine learning, Science and Information Conference, 2014. ,
A new intrusion detection system using support vector machines and hierarchical clustering, The VLDB journal, 2007. ,
Data mining for fuzzy diagnosis systems in LTE networks, Expert Syst. Appl, 2015. ,
Self-healing in mobile networks with Big Data, IEEE Communications Magazine, 2016. ,
Data analytics and knowledge discovery for root cause analysis in lte self-organizing networks, 2017. ,
System and method of visualizing most unhealthy network elements within a network or data center, 2016. ,
A novel hybrid intrusion detection method integrating anomaly detection with misuse detection, Expert Systems with Applications, 2014. ,
A survey of machine learning techniques applied to self-organizing cellular networks, IEEE Communications Surveys and Tutorials, 2017. ,
A study of cross-validation and bootstrap for accuracy estimation and model selection, International Joint Conference on Artificial Intelligence, 1995. ,
Diagnosing network-wide traffic anomalies, Proc. of ACM SIGCOMM, 2004. ,
Comparison of lem2 and a dynamic reduct classification algorithm, 2002. ,
End-to-end service quality measurement using sourcerouted probes, IEEE International Conference on Computer Communications (IN-FOCOM), 2006. ,
Multivariate time series anomaly detection: A framework of hidden markov models, Appl. Soft Comput, 2017. ,
Monitoring and analyzing big traffic data of a large-scale cellular network with Hadoop, IEEE Network, 2014. ,
GA-AdaBoostSVM classifier empowered wireless network diagnosis, EURASIP Journal on Wireless Comm. and Networking, 2018. ,
, Looking ahead to 5G, white paper, 2014.
, ); Selfconfiguring and self-optimizing network (SON) use cases and solutions, 2010.
Network anomaly detection based on wavelet analysis, EURASIP J. Adv. Sig. Proc, 2009. ,
A method for identifying faulty cells using a classification tree-based UE diagnosis in LTE, EURASIP J. Wireless Comm. and Networking, 2017. ,
Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection, International Journal of Intelligent Systems, 2000. ,
Time-series novelty detection using one-class support vector machines, Proc. of IEEE-INNS IJCNN, 2003. ,
Fault diagnosis in wireless sensor networks: A survey, IEEE Communications Surveys and Tutorials, 2013. ,
Towards automated performance diagnosis in a large IPTV network, SIGCOMM, 2009. ,
Rapid detection of maintenance induced changes in service performance, 2011. ,
Long short term memory networks for anomaly detection in time series, European Symposium on Artificial Neural Networks, 2015. ,
Anomaly detection in vessel tracks using Bayesian networks, Int. J. Approx. Reasoning, 2014. ,
Monitoring the network monitoring system: Anomaly detection using pattern recognition, IM, 2017. ,
ARCD: A solution for root cause diagnosis in mobile networks, CNSM, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01962869
Toward fine-grained, unsupervised, scalable performance diagnosis for production cloud computing systems, IEEE Trans. Parallel Distrib. Syst, 2013. ,
ARIMA model for network traffic prediction and anomaly detection, Proc. of IEEE ISCIT, 2008. ,
Reasoning and knowledge acquisition framework for 5g network analytics, 2017. ,
A reinforcement learning based solution for selfhealing in LTE networks, Vehicular Technology Conference, 2014. ,
Intrusion detection using neural networks and support vector machines, Proc. of IEEE-INNS IJCNN, 2002. ,
Network Anomaly Detection by Cascading k-Means Clustering and c4.5 Decision Tree algorithm, Procedia Engineering, 2012. ,
Traffic Anomaly Detection Using KMeans Clustering, Proc. of In GI/ITG Workshop MMBnet, 2007. ,
Structured comparative analysis of systems logs to diagnose performance problems, NSDI, 2012. ,
Identification of storage system elements causing performance degradation, 2016. ,
An empirical evaluation of entropy-based traffic anomaly detection, Proceedings of the ACM SIGCOMM conference on Internet measurement, 2008. ,
A manufacturing failure root cause analysis in imbalance data set using pca weighted association rule mining, Jurnal Teknologi, 2015. ,
A linear time-complexity k-means algorithm using cluster shifting, International Conference on Computational Intelligence and Communication Networks, 2014. ,
Automatic feature selection technique for next generation self-organizing networks, IEEE Communications Letters, 2018. ,
Combination of multiple diagnosis systems in self-healing networks, Expert Syst. Appl, 2016. ,
An overview of anomaly detection techniques: Existing solutions and latest technological trends, 2007. ,
Anomaly detection using forecasting methods ARIMA and HWDS, Proc. of IEEE SCCC, 2013. ,
Mcpad: A multiple classifier system for accurate payload-based anomaly detection, 2009. ,
A comparative study of categorical variable encoding techniques for neural network classifiers, International Journal of Computer Applications, 2017. ,
Anomaly detection based on a dynamic markov model, Inf. Sci, 2017. ,
Sensitivity of PCA for traffic anomaly detection, Proc. of ACM SIGMETRICS, 2007. ,
Location-based distributed sleeping cell detection and root cause analysis for 5g ultra-dense networks, EURASIP J. Wireless Comm. and Networking, 2016. ,
Contextualized indicators for online failure diagnosis in cellular networks, Computer Networks, 2015. ,
Specification-based anomaly detection: A new approach for detecting network intrusions, ACM conference on Computer and communications security, 2002. ,
,
, Fault Diagnosis in Networks, Patent Application WO2016169616A1, 2016.
, Telecommunication management; Self-Organizing Networks (SON); Self-healing concepts and requirements, 2012.
A neural network based approach for predicting customer churn in cellular network services, 2013. ,
A hybrid machine learning approach to network anomaly detection, Information Sciences, 2007. ,
Key concepts and network architecture for 5G mobile technology, International Journal of Scientific Research Engineering & Technology (IJSRET), 2012. ,
Beyond accuracy, F-score and ROC: A family of discriminant measures for performance evaluation, Australasian joint conference on artificial intelligence, 2006. ,
Conditional anomaly detection, IEEE Transactions on Knowledge and Data Engineering, 2007. ,
Anomaly detection through a bayesian support vector machine, IEEE Trans. Reliability, 2010. ,
Decision tree classifier for network intrusion detection with ga-based feature selection, Annual Southeast Regional Conference, 2005. ,
A survey of fault localization techniques in computer networks, Sci. Comput. Program, 2004. ,
A fast decision tree learning algorithm, National Conference on Artificial Intelligence and Innovative Applications of Artificial Intelligence Conference, 2006. ,
Deep learning approach for network intrusion detection in software defined networking, International Conference on Wireless Networks and Mobile Communications, WINCOM, 2016. ,
The anomaly detection by using dbscan clustering with multiple parameters, International Conference on Information Science and Applications (ICISA), 2011. ,
On QoE-awareness through virtualized probes in 5G networks, IEEE International Workshop on Computer Aided Modelling and Design of Communication Links and Networks (CAMAD), 2016. ,
, Universal Mobile Telecommunications System (UMTS
, Telecommunication management; Subscriber and equipment trace; Trace control and configuration management, 2005.
, Universal mobile telecommunications system (UMTS)
, UTRAN overall description, 2009.
Efficient greedy learning of Gaussian mixture models, Neural Computation, 2003. ,
URL : https://hal.archives-ouvertes.fr/inria-00321487
l-DBSCAN : A fast hybrid density based clustering method, International Conference on Pattern Recognition ICPR, 2006. ,
Entropy based worm and anomaly detection in fast IP networks, International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise, 2005. ,
Data Mining: Practical machine learning tools and techniques, 2016. ,
A survey of multiple classifier systems as hybrid systems, 2014. ,
Industrial Big Data for fault diagnosis: Taxonomy, review, and applications, 2017. ,
Generating non-redundant association rules, ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2000. ,
Advancements of outlier detection: A survey, ICST Transactions on Scalable Information Systems, 2013. ,
On assuring end-to-end QoE in next generation networks: Challenges and a possible solution, IEEE Communications Magazine, 2011. ,
Random-forests-based network intrusion detection systems, IEEE Trans. Systems, Man, and Cybernetics, 2008. ,
3-dimensional root cause diagnosis via co-analysis, ICAC, 2012. ,
Revisit dynamic ARIMA based anomaly detection, Proc. of IEEE PASSAT/SocialCom, 2011. ,
-Anomaly Detection and Root Cause Analysis, Journal of Computational and Graphical Statistics, 2006. ,