{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T18:10:39Z","timestamp":1775326239952,"version":"3.50.1"},"reference-count":98,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3183989","type":"journal-article","created":{"date-parts":[[2022,6,17]],"date-time":"2022-06-17T19:28:43Z","timestamp":1655494123000},"page":"67747-67770","source":"Crossref","is-referenced-by-count":66,"title":["Toward Integrating Intelligence and Programmability in Open Radio Access Networks: A Comprehensive Survey"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4591-0529","authenticated-orcid":false,"given":"Azadeh","family":"Arnaz","sequence":"first","affiliation":[{"name":"School of Electrical and Data Engineering, University of Technology Sydney, Ultimo, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2877-1168","authenticated-orcid":false,"given":"Justin","family":"Lipman","sequence":"additional","affiliation":[{"name":"School of Electrical and Data Engineering, University of Technology Sydney, Ultimo, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4282-6666","authenticated-orcid":false,"given":"Mehran","family":"Abolhasan","sequence":"additional","affiliation":[{"name":"School of Electrical and Data Engineering, University of Technology Sydney, Ultimo, NSW, Australia"}]},{"given":"Matti","family":"Hiltunen","sequence":"additional","affiliation":[{"name":"AT&#x0026;T Labs Research, Bedminster, NJ, USA"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Radio Access Network","year":"2022"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-820046-9.00012-5"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/35.1000222"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5539\/nct.v6n1p6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107516"},{"key":"ref6","first-page":"402","article-title":"RFT: Scalable and fault-tolerant microservices for the O-RAN control plane","volume-title":"Proc. IFIP\/IEEE Int. Symp. Integr. Netw. Manage. (IM)","author":"Huff"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107809"},{"key":"ref8","article-title":"Blockchain-enabled network sharing for O-RAN","author":"Giupponi","year":"2021","journal-title":"arXiv:2107.02005"},{"key":"ref9","article-title":"Streaming from the air: Enabling high data-rate 5G cellular links for drone streaming applications","author":"Bertizzolot","year":"2021","journal-title":"arXiv:2101.08681"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2022.3146618"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WCNCW48565.2020.9124820"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2021.9423816"},{"key":"ref13","article-title":"Multi-agent team learning in virtualized open radio access networks (O-RAN)","author":"Rivera","year":"2021","journal-title":"arXiv:2012.04861"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2021.3062487"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3477086.3480842"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108281"},{"key":"ref17","volume-title":"O-RAN Alliance"},{"key":"ref18","volume-title":"O-RAN Software Community","year":"2022"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3485983.3494870"},{"key":"ref20","volume-title":"Tip Project for Open RAN","year":"2022"},{"key":"ref21","volume-title":"O-Ran Architecture Description V03.00","year":"2020"},{"key":"ref22","volume-title":"O-RAN Use Cases and Deployment Scenarios","year":"2020"},{"key":"ref23","volume-title":"AI\/ML Workflow Description and Requirements, O-RAN.WG2.AIML-V01.03","year":"2021"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI49370.2019.00203"},{"key":"ref25","first-page":"155","article-title":"Computer network security based on support vector machine approach","volume-title":"Proc. 11th Int. Conf. Control, Autom. Syst.","author":"Somwang"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2939371"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3360468.3368183"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC48522.2020.9200958"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/C3IT.2015.7060117"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICRITO.2015.7359289"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/fi9040081"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/967900.967989"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.07.009"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.17762\/ijcnis.v12i2.4574"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CCDC49329.2020.9164348"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2999566"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/APCIP.2009.218"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486321"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2519607"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2904897"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2846401"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICODSE.2017.8285847"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/DESEC.2017.8073804"},{"key":"ref44","volume-title":"K-Means","year":"2022"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422151"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2014.6962207"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511441"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCAS.2008.4657944"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICSESS.2016.7883205"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2020.3001121"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2020.2974958"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC49053.2021.9417394"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3020400"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3043736"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9052936"},{"key":"ref56","volume-title":"Intelligent 5G L2 MAC Scheduler, Powered by Capgemini Netanticipate 5G on Intel Architecture","year":"2022"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD.2019.8858448"},{"key":"ref58","volume-title":"Vehicle to Evrything","year":"2022"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/NGMAST.2015.13"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2016.7504436"},{"issue":"3","key":"ref61","first-page":"101","article-title":"Data analytics for 5G networks: A complete framework for network access selection and traffic steering","volume":"11","author":"Barmpounakis","year":"2018","journal-title":"Int. J. Adv. Telecommun."},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.23919\/ECC51009.2020.9143837"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600119"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2999685"},{"key":"ref65","article-title":"Configuring storm control","volume-title":"Catalyst 4500 Series Switch Software Configuration Guide, 12.2(53)SG","year":"2018"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.14738\/tmlai.65.5411"},{"key":"ref67","first-page":"639","article-title":"Self-healing solutions for Wi-Fi networks to provide seamless handover","volume-title":"Proc. IFIP\/IEEE Symp. Integr. Netw. Service Manage. (IM)","author":"Hao"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3297280.3297300"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2018.8357700"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-019-02130-3"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.3390\/s18051473"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2017.8288175"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2941237"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2014.2317671"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6736761"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683394"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3205"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7514161"},{"key":"ref79","volume-title":"Management and Orchestration; Concepts, Use Cases and Requirements","year":"2017"},{"key":"ref80","volume-title":"Technical Specification Group Services and System Aspects; System Architecture for the 5G 30SystemStage 2","year":"2019"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.23919\/WMNC.2019.8881402"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.23919\/ICN.2020.0019"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3140595"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000493"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1800541"},{"key":"ref86","volume-title":"5G Open Ran Ecosystem Whitepaper","year":"2021"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP.2015.7322610"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/EECSI.2018.8752836"},{"key":"ref89","volume-title":"5G Mobile Communication Systems: Fundamentals, Challenges, and Key Technologies","author":"Yasin","year":"2019"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-6946-8_300682"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.1996.574321"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT.2000.890906"},{"key":"ref93","volume-title":"Autonomous Networks, Supporting Tomorrow\u2019s ICT Business","year":"2020"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1201\/9781003308447-9"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3014356"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2710056"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2013.111"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1600304WC"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09798822.pdf?arnumber=9798822","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T04:43:49Z","timestamp":1706762629000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9798822\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":98,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3183989","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}