{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T08:51:35Z","timestamp":1759827095792,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030708658"},{"type":"electronic","value":"9783030708665"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-70866-5_3","type":"book-chapter","created":{"date-parts":[[2021,3,2]],"date-time":"2021-03-02T16:03:57Z","timestamp":1614701037000},"page":"40-56","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Configuration Faults Detection in IP Virtual Private Networks Based on Machine Learning"],"prefix":"10.1007","author":[{"given":"El-Heithem","family":"Mohammedi","sequence":"first","affiliation":[]},{"given":"Emmanuel","family":"Lavinal","sequence":"additional","affiliation":[]},{"given":"Guillaume","family":"Fleury","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,3]]},"reference":[{"key":"3_CR1","unstructured":"Abadi, M., et al.: Tensorflow: a system for large-scale machine learning. In: 12th USENIX Conference on Operating Systems Design and Implementation. OSDI 2016 (2016)"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Bahnasy, M., Li, F., Xiao, S., Cheng, X.: DeepBGP: a machine learning approach for BGP configuration synthesis. In: Proceedings of the Workshop on Network Meets AI & ML. NetAI 2020, Association for Computing Machinery (2020)","DOI":"10.1145\/3405671.3405816"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Beckett, R., Gupta, A., Mahajan, R., Walker, D.: A general approach to network configuration verification. In: ACM Special Interest Group on Data Communication. SIGCOMM 2017 (2017)","DOI":"10.1145\/3098822.3098834"},{"issue":"1","key":"3_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13174-018-0087-2","volume":"9","author":"R Boutaba","year":"2018","unstructured":"Boutaba, R., et al.: A comprehensive survey on machine learning for networking: evolution, applications and research opportunities. J. Internet Serv. Appl. 9(1), 1\u201399 (2018). https:\/\/doi.org\/10.1186\/s13174-018-0087-2","journal-title":"J. Internet Serv. Appl."},{"key":"3_CR5","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-1-4419-9326-7_5","volume-title":"Ensemble Machine Learning: Methods and Applications","author":"A Cutler","year":"2012","unstructured":"Cutler, A., Cutler, D., Stevens, J.: Random forests. In: Zhang, C., Ma, Y. (eds.) Ensemble Machine Learning: Methods and Applications, pp. 157\u2013175. Springer, Boston (2012)"},{"issue":"4","key":"3_CR6","doi-asserted-by":"publisher","first-page":"3030","DOI":"10.1109\/COMST.2016.2570599","volume":"18","author":"A Dusia","year":"2016","unstructured":"Dusia, A., Sethi, A.S.: Recent advances in fault localization in computer networks. IEEE Commun. Surv. Tutorials 18(4), 3030\u20133051 (2016)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"3_CR7","volume-title":"Deep Learning with Keras","author":"A Gulli","year":"2017","unstructured":"Gulli, A., Pal, S.: Deep Learning with Keras. Packt Publishing Ltd., Birmingham (2017)"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Isa, M.: Albarda: designing supervised learning-based incident management model. Case study: broadband network service provider. In: International Conference on ICT for Smart Society (ICISS) (2019)","DOI":"10.1109\/ICISS48059.2019.8969821"},{"key":"3_CR9","unstructured":"Kazemian, P., Varghese, G., McKeown, N.: Header space analysis: static checking for networks. In: 9th USENIX Conference on Networked Systems Design and Implementation. NSDI 2012 (2012)"},{"issue":"4","key":"3_CR10","doi-asserted-by":"publisher","first-page":"2451","DOI":"10.1109\/TVT.2007.912610","volume":"57","author":"RM Khanafer","year":"2008","unstructured":"Khanafer, R.M., et al.: Automated diagnosis for UMTS networks using bayesian network approach. IEEE Trans. Veh. Technol. 57(4), 2451\u20132461 (2008)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Khurshid, A., Zhou, W., Caesar, M., Godfrey, P.B.: Veriflow: verifying network-wide invariants in real time. In: First Workshop on Hot Topics in Software Defined Networks. HotSDN 2012 (2012)","DOI":"10.1145\/2342441.2342452"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Moustapha, A.I., Selmic, R.R.: Wireless sensor network modeling using modified recurrent neural networks: application to fault detection. In: IEEE International Conference on Networking, Sensing and Control, pp. 313\u2013318 (2007)","DOI":"10.1109\/ICNSC.2007.372797"},{"key":"3_CR13","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in python. J. Mach. Learn. res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. res."},{"issue":"1","key":"3_CR14","doi-asserted-by":"publisher","first-page":"26","DOI":"10.9781\/ijimai.2016.415","volume":"4","author":"H Ramchoun","year":"2016","unstructured":"Ramchoun, H., Amine, M., Idrissi, J., Ghanou, Y., Ettaouil, M.: Multilayer perceptron: architecture optimization and training. IJIMAI 4(1), 26\u201330 (2016)","journal-title":"IJIMAI"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Rosen, E., Rekhter, Y.: BGP\/MPLS IP Virtual Private Networks (VPNs). RFC 4364, IETF, February 2006","DOI":"10.17487\/rfc4364"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Rosen, E., Viswanathan, A., Callon, R.: Multiprotocol Label Switching Architecture. RFC 3031, IETF, January 2001","DOI":"10.17487\/rfc3031"},{"key":"3_CR17","volume-title":"Artificial Intelligence: A Modern Approach","author":"S Russell","year":"2010","unstructured":"Russell, S., Norvig, P., Davis, E.: Artificial Intelligence: A Modern Approach. Prentice Hall, New Jersey (2010)"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Sharma, S., Mehrotra, D.: Comparative analysis of multi-label classification algorithms. In: First International Conference on Secure Cyber Computing and Communication (ICSCCC) (2018)","DOI":"10.1109\/ICSCCC.2018.8703285"},{"issue":"4","key":"3_CR19","doi-asserted-by":"publisher","first-page":"6556","DOI":"10.1109\/JIOT.2019.2908019","volume":"6","author":"SM Srinivasan","year":"2019","unstructured":"Srinivasan, S.M., Truong-Huu, T., Gurusamy, M.: Machine learning-based link fault identification and localization in complex networks. IEEE Internet of Things J. 6(4), 6556\u20136566 (2019)","journal-title":"IEEE Internet of Things J."},{"issue":"2","key":"3_CR20","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/MNET.2017.1700200","volume":"32","author":"M Wang","year":"2018","unstructured":"Wang, M., Cui, Y., Wang, X., Xiao, S., Jiang, J.: Machine learning for networking: workflow, advances and opportunities. IEEE Netw. 32(2), 92\u201399 (2018)","journal-title":"IEEE Netw."}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-70866-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,2]],"date-time":"2021-03-02T16:06:32Z","timestamp":1614701192000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-70866-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030708658","9783030708665"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-70866-5_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 March 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MLN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Networking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mln2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.adda-association.org\/mln-2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the Corona pandemic this event was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}