{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T22:45:39Z","timestamp":1776725139942,"version":"3.51.2"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,4,21]],"date-time":"2023-04-21T00:00:00Z","timestamp":1682035200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,4,21]],"date-time":"2023-04-21T00:00:00Z","timestamp":1682035200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Ministry of Economy, Science and Digital Agenda of the Junta de Extremadura and by the European Regional Development Fund of the European Union","award":["IB20040"],"award-info":[{"award-number":["IB20040"]}]},{"name":"Ministry of Economy, Science and Digital Agenda of the Junta de Extremadura and by the European Regional Development Fund of the European Union","award":["IB18003"],"award-info":[{"award-number":["IB18003"]}]},{"name":"Ministry of Economy, Science and Digital Agenda of the Junta de Extremadura and by the European Regional Development Fund of the European Union","award":["GR21097"],"award-info":[{"award-number":["GR21097"]}]},{"name":"Ministry of Economy, Science and Digital Agenda of the Junta de Extremadura and by the European Regional Development Fund of the European Union","award":["GR21040"],"award-info":[{"award-number":["GR21040"]}]},{"DOI":"10.13039\/501100004837","name":"Spanish Ministry of Science and Innovation","doi-asserted-by":"crossref","award":["PID2019-110315RB-I00 APRISA"],"award-info":[{"award-number":["PID2019-110315RB-I00 APRISA"]}],"id":[{"id":"10.13039\/501100004837","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100007511","name":"Universidad Rey Juan Carlos","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100007511","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2023,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In recent years, the impressive growth of new wireless technologies, together with the appearance of new requirements in applications and services, is progressively changing the use of networks. Due to the high mobility required, the network must adapt to the infrastructure to meet the demands of the users. As a result, service providers currently have to over-provision network capacity, which is costly. In addition, considering efficient resource planning in advance involves a lot of labor-intensive efforts. Consequently, network usage analysis is a very useful tool that allows network administrators to find patterns and anomalies. Whilst pattern detection provides administrators the ability to define the infrastructure, anomaly detection provides rich and valuable information for certain applications, for example, to avoid network saturation in urban areas during peak hours. This article proposes a new methodology based on orthogonal projections over Call Detail Records (CDR) for anomaly detection to help in the dynamic management of the network in an urban area. The method is evaluated in a real scenario provided by an Italian telecommunications operator, considering different locations in the Milan metropolitan area, differentiated by the geographic resolution of the data, reaching F1 scores above 0.8. In addition, a new ground truth is presented, hoping it will become a reference data set for the community, in the form of a set of locations that have been corroborated for use in evaluating anomaly detection techniques.<\/jats:p>","DOI":"10.1007\/s12652-023-04605-w","type":"journal-article","created":{"date-parts":[[2023,4,21]],"date-time":"2023-04-21T04:02:54Z","timestamp":1682049774000},"page":"7957-7966","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Orthogonal projection for anomaly detection in networking datasets"],"prefix":"10.1007","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6624-7618","authenticated-orcid":false,"given":"David","family":"Cortes-Polo","sequence":"first","affiliation":[]},{"given":"Luis I.","family":"Jimenez","sequence":"additional","affiliation":[]},{"given":"Mercedes E.","family":"Paoletti","sequence":"additional","affiliation":[]},{"given":"Jesus","family":"Calle-Cancho","sequence":"additional","affiliation":[]},{"given":"Juan A.","family":"Rico-Gallego","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,21]]},"reference":[{"issue":"4","key":"4605_CR1","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/j.dcan.2019.10.005","volume":"5","author":"E Abba","year":"2019","unstructured":"Abba E, Aibinu AM, Alhassan JK (2019) Development of multiple mobile networks call detailed records and its forensic analysis. Digit Commun Netw 5(4):256\u2013265. https:\/\/doi.org\/10.1016\/j.dcan.2019.10.005","journal-title":"Digit Commun Netw"},{"key":"4605_CR2","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0191-6","author":"AK Ahmad","year":"2019","unstructured":"Ahmad AK, Jafar A, Aljoumaa K (2019) Customer churn prediction in telecom using machine learning in big data platform. J Big Data. https:\/\/doi.org\/10.1186\/s40537-019-0191-6","journal-title":"J Big Data"},{"key":"4605_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106984","author":"AA Barakabitze","year":"2020","unstructured":"Barakabitze AA, Ahmad A, Mijumbi R, Hines A (2020) 5g network slicing using sdn and nfv: a survey of taxonomy, architectures and future challenges. Comput Netw. https:\/\/doi.org\/10.1016\/j.comnet.2019.106984","journal-title":"Comput Netw"},{"key":"4605_CR4","doi-asserted-by":"publisher","DOI":"10.1038\/sdata.2015.55","author":"G Barlacchi","year":"2015","unstructured":"Barlacchi G, Nadai MD, Larcher R, Casella A, Chitic C, Torrisi G, Antonelli F, Vespignani A, Pentland A, Lepri B (2015) A multi-source dataset of urban life in the city of Milan and the province of Trentino. Sci Data. https:\/\/doi.org\/10.1038\/sdata.2015.55","journal-title":"Sci Data"},{"key":"4605_CR5","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1109\/MNET.001.1900252","volume":"34","author":"C Benzaid","year":"2020","unstructured":"Benzaid C, Taleb T (2020) Ai-driven zero touch network and service management in 5g and beyond: Challenges and research directions. IEEE Network 34:186\u2013194. https:\/\/doi.org\/10.1109\/MNET.001.1900252","journal-title":"IEEE Network"},{"key":"4605_CR6","doi-asserted-by":"publisher","first-page":"158007","DOI":"10.1109\/ACCESS.2019.2949804","volume":"7","author":"D Cort\u00e9s-Polo","year":"2019","unstructured":"Cort\u00e9s-Polo D, Gil LIJ, Calle-Cancho J, Gonz\u00e1lez-S\u00e1nchez J-L (2019) A novel methodology based on orthogonal projections for a mobile network data set analysis. IEEE Access 7:158007\u2013158015. https:\/\/doi.org\/10.1109\/ACCESS.2019.2949804","journal-title":"IEEE Access"},{"key":"4605_CR7","doi-asserted-by":"publisher","first-page":"92030","DOI":"10.1109\/ACCESS.2021.3092596","volume":"9","author":"D Cort\u00e9s-Polo","year":"2021","unstructured":"Cort\u00e9s-Polo D, Gil LIJ, Gonz\u00e1lez-S\u00e1nchez J-L, Carmona-Murillo J (2021) A quantitative and comparative evaluation of key points selection algorithms for mobile network data sets analysis. IEEE Access 9:92030\u201392042. https:\/\/doi.org\/10.1109\/ACCESS.2021.3092596","journal-title":"IEEE Access"},{"issue":"10","key":"4605_CR8","doi-asserted-by":"publisher","first-page":"9241","DOI":"10.1007\/s12652-020-02628-1","volume":"12","author":"DB Dasari","year":"2021","unstructured":"Dasari DB, Edamadaka G, Chowdary C, Sobhana M et al (2021) Anomaly-based network intrusion detection with ensemble classifiers and meta-heuristic scale (ECMHS) in traffic flow streams. J Ambient Intell Humaniz Comput 12(10):9241\u20139268","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"4605_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-03413-4","author":"B Garimella","year":"2021","unstructured":"Garimella B, Prasad G, Prasad M (2021) Churn prediction using optimized deep learning classifier on huge telecom data. J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-021-03413-4","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"4605_CR10","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1016\/j.comcom.2017.12.009","volume":"116","author":"RG Garroppo","year":"2018","unstructured":"Garroppo RG, Niccolini S (2018) Anomaly detection mechanisms to find social events using cellular traffic data. Comput Commun 116:240\u2013252. https:\/\/doi.org\/10.1016\/j.comcom.2017.12.009","journal-title":"Comput Commun"},{"key":"4605_CR11","doi-asserted-by":"publisher","DOI":"10.1057\/s41599-020-0500-x","author":"L Gauvin","year":"2020","unstructured":"Gauvin L, Tizzoni M, Piaggesi S, Young A, Adler N, Verhulst S, Ferres L, Cattuto C (2020) Gender gaps in urban mobility. Humanit Soc Sci Commun. https:\/\/doi.org\/10.1057\/s41599-020-0500-x","journal-title":"Humanit Soc Sci Commun"},{"issue":"4","key":"4605_CR12","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1109\/36.298007","volume":"32","author":"JC Harsanyi","year":"1994","unstructured":"Harsanyi JC, Chang C-I (1994) Hyperspectral image classification and dimensionality reduction: an orthogonal subspace projection approach. IEEE Trans Geosci Remote Sens 32(4):779\u2013785","journal-title":"IEEE Trans Geosci Remote Sens"},{"key":"4605_CR13","unstructured":"ITU (2021) Measuring digital development facts and figures. Accessed: 2022-01-30. https:\/\/www.itu.int\/en\/ITU-D\/Statistics\/Documents\/facts\/FactsFigures2021.pdf.  Accessed 30 Jan 2022"},{"key":"4605_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-021-03109-4","author":"Y Jiang","year":"2022","unstructured":"Jiang Y, Liu G (2022) Two-stage anomaly detection algorithm via dynamic community evolution in temporal graph. Appl Intell. https:\/\/doi.org\/10.1007\/s10489-021-03109-4","journal-title":"Appl Intell"},{"issue":"1","key":"4605_CR15","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/TNSE.2018.2861388","volume":"7","author":"D Jiang","year":"2020","unstructured":"Jiang D, Huo L, Song H (2020) Rethinking behaviors and activities of base stations in mobile cellular networks based on big data analysis. IEEE Trans Netw Sci Eng 7(1):80\u201390. https:\/\/doi.org\/10.1109\/TNSE.2018.2861388","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"4605_CR16","doi-asserted-by":"publisher","first-page":"e9974","DOI":"10.2196\/mhealth.9974","volume":"6","author":"KH Jones","year":"2018","unstructured":"Jones KH, Daniels H, Heys S, Ford DV (2018) Challenges and potential opportunities of mobile phone call detail records in health research: Review. JMIR mHealth uHealth 6:e9974","journal-title":"JMIR mHealth uHealth"},{"issue":"4","key":"4605_CR17","doi-asserted-by":"publisher","first-page":"764","DOI":"10.1016\/j.jesp.2013.03.013","volume":"49","author":"C Leys","year":"2013","unstructured":"Leys C, Ley C, Klein O, Bernard P, Licata L (2013) Detecting outliers: do not use standard deviation around the mean, use absolute deviation around the median. J Exp Soc Psychol 49(4):764\u2013766. https:\/\/doi.org\/10.1016\/j.jesp.2013.03.013","journal-title":"J Exp Soc Psychol"},{"key":"4605_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2018.07.015","author":"J Moysen","year":"2018","unstructured":"Moysen J, Giupponi L (2018) From 4G to 5G: self-organized network management meets machine learning. Comput Commun. https:\/\/doi.org\/10.1016\/j.comcom.2018.07.015","journal-title":"Comput Commun"},{"key":"4605_CR19","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2491361","author":"D Naboulsi","year":"2015","unstructured":"Naboulsi D, Fiore M, Ribot S (2015) Stanica R large-scale mobile traffic analysis: a survey. IEEE Commun Surv Tutor. https:\/\/doi.org\/10.1109\/COMST.2015.2491361","journal-title":"IEEE Commun Surv Tutor"},{"key":"4605_CR20","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/MNET.021.1900599","volume":"35","author":"F Paolucci","year":"2021","unstructured":"Paolucci F, Cugini F, Castoldi P, Osinski T (2021) Enhancing 5g sdn\/nfv edge with p4 data plane programmability. IEEE Netw 35:154\u2013160. https:\/\/doi.org\/10.1109\/MNET.021.1900599","journal-title":"IEEE Netw"},{"key":"4605_CR21","doi-asserted-by":"publisher","first-page":"2058","DOI":"10.1109\/TII.2017.2650206","volume":"13","author":"MS Parwez","year":"2017","unstructured":"Parwez MS, Rawat DB, Garuba M (2017) Big data analytics for user-activity analysis and user-anomaly detection in mobile wireless network. IEEE Trans Ind Inform 13:2058\u20132065. https:\/\/doi.org\/10.1109\/TII.2017.2650206","journal-title":"IEEE Trans Ind Inform"},{"key":"4605_CR22","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0045745","author":"S Phithakkitnukoon","year":"2012","unstructured":"Phithakkitnukoon S, Leong TW, Smoreda Z, Olivier P (2012) Weather effects on mobile social interactions: a case study of mobile phone users in Lisbon Portugal. PLoS One. https:\/\/doi.org\/10.1371\/journal.pone.0045745","journal-title":"PLoS One"},{"key":"4605_CR23","doi-asserted-by":"publisher","DOI":"10.3390\/app11114878","author":"I Racetin","year":"2021","unstructured":"Racetin I, Krtali\u0107 A (2021) systematic review of anomaly detection in hyperspectral remote sensing applications. Appl Sci. https:\/\/doi.org\/10.3390\/app11114878","journal-title":"Appl Sci"},{"issue":"424","key":"4605_CR24","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1080\/01621459.1993.10476408","volume":"88","author":"PJ Rousseeuw","year":"1993","unstructured":"Rousseeuw PJ, Croux C (1993) Alternatives to the median absolute deviation. J Am Stat Assoc 88(424):1273\u20131283. https:\/\/doi.org\/10.1080\/01621459.1993.10476408","journal-title":"J Am Stat Assoc"},{"key":"4605_CR25","doi-asserted-by":"publisher","first-page":"85792","DOI":"10.1109\/ACCESS.2022.3197651","volume":"10","author":"M Shajari","year":"2022","unstructured":"Shajari M, Geng H, Hu K, Leon-Garcia A (2022) Tensor-based online network anomaly detection and diagnosis. IEEE Access 10:85792\u201385817","journal-title":"IEEE Access"},{"key":"4605_CR26","doi-asserted-by":"publisher","first-page":"41728","DOI":"10.1109\/ACCESS.2018.2859756","volume":"6","author":"K Sultan","year":"2018","unstructured":"Sultan K, Ali H, Zhang Z (2018) Call detail records driven anomaly detection and traffic prediction in mobile cellular networks. IEEE Access 6:41728\u201341737. https:\/\/doi.org\/10.1109\/ACCESS.2018.2859756","journal-title":"IEEE Access"},{"key":"4605_CR27","doi-asserted-by":"publisher","DOI":"10.3390\/info10060192","author":"K Sultan","year":"2019","unstructured":"Sultan K, Ali H, Ahmad A, Zhang Z (2019) Call details record analysis: a spatiotemporal exploration toward mobile traffic classification and optimization. Information. https:\/\/doi.org\/10.3390\/info10060192","journal-title":"Information"},{"key":"4605_CR28","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.trc.2017.12.003","volume":"87","author":"F Wang","year":"2018","unstructured":"Wang F, Chen C (2018) On data processing required to derive mobility patterns from passively-generated mobile phone data. Trans Res Part C 87:58\u201374. https:\/\/doi.org\/10.1016\/j.trc.2017.12.003","journal-title":"Trans Res Part C"},{"key":"4605_CR29","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MVT.2019.2921208","volume":"14","author":"Z Zhang","year":"2019","unstructured":"Zhang Z, Xiao Y, Ma Z, Xiao M, Ding Z, Lei X, Karagiannidis GK, Fan P (2019) 6g wireless networks: vision, requirements, architecture, and key technologies. IEEE Veh Technol Mag 14:28\u201341. https:\/\/doi.org\/10.1109\/MVT.2019.2921208","journal-title":"IEEE Veh Technol Mag"},{"issue":"9","key":"4605_CR30","doi-asserted-by":"publisher","first-page":"1738","DOI":"10.1080\/13658816.2015.1137298","volume":"30","author":"Z Zhao","year":"2016","unstructured":"Zhao Z, Shaw S-L, Xu Y, Lu F, Chen J, Yin L (2016) Understanding the bias of call detail records in human mobility research. Int J Geogr Inf Sci 30(9):1738\u20131762. https:\/\/doi.org\/10.1080\/13658816.2015.1137298","journal-title":"Int J Geogr Inf Sci"},{"key":"4605_CR31","doi-asserted-by":"publisher","first-page":"31398","DOI":"10.1109\/ACCESS.2020.2973214","volume":"8","author":"Q Zhu","year":"2020","unstructured":"Zhu Q, Sun L (2020) Big data driven anomaly detection for cellular networks. IEEE Access 8:31398\u201331408. https:\/\/doi.org\/10.1109\/ACCESS.2020.2973214","journal-title":"IEEE Access"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-023-04605-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-023-04605-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-023-04605-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T18:23:13Z","timestamp":1684866193000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-023-04605-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,21]]},"references-count":31,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["4605"],"URL":"https:\/\/doi.org\/10.1007\/s12652-023-04605-w","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,21]]},"assertion":[{"value":"25 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 March 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 April 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}