{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T10:12:46Z","timestamp":1769163166687,"version":"3.49.0"},"reference-count":126,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100010661","name":"European Commission through the Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["H2020-MSCA-ITN-2019"],"award-info":[{"award-number":["H2020-MSCA-ITN-2019"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010665","name":"Marie Sklodowska-Curie Actions Innovative Training Networks (MSCAITN)-EID through Big dAta aNalYtics for radio Access Networks","doi-asserted-by":"publisher","award":["860239"],"award-info":[{"award-number":["860239"]}],"id":[{"id":"10.13039\/100010665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3236261","type":"journal-article","created":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T22:08:25Z","timestamp":1673474905000},"page":"6018-6044","source":"Crossref","is-referenced-by-count":70,"title":["Forecasting Network Traffic: A Survey and Tutorial With Open-Source Comparative Evaluation"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4592-8975","authenticated-orcid":false,"given":"Gabriel O.","family":"Ferreira","sequence":"first","affiliation":[{"name":"IEIIT CNR Institute, Politecnico di Turin, Torino, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3186-6195","authenticated-orcid":false,"given":"Chiara","family":"Ravazzi","sequence":"additional","affiliation":[{"name":"IEIIT CNR Institute, Politecnico di Turin, Torino, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2258-8971","authenticated-orcid":false,"given":"Fabrizio","family":"Dabbene","sequence":"additional","affiliation":[{"name":"IEIIT CNR Institute, Politecnico di Turin, Torino, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6428-5653","authenticated-orcid":false,"given":"Giuseppe C.","family":"Calafiore","sequence":"additional","affiliation":[{"name":"Department of Electronics and Telecommunications (DET), Politecnico di Torino, Turin, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0772-9967","authenticated-orcid":false,"given":"Marco","family":"Fiore","sequence":"additional","affiliation":[{"name":"IMDEA Networks Institute, Legan&#x00E9;s, Spain"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2694140"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-99191-3_2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2017.8292737"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.117921","article-title":"Graph neural network for traffic forecasting: A survey","volume":"207","author":"Jiang","year":"2022","journal-title":"Exp. Syst. Appl."},{"key":"ref5","article-title":"A review of network traffic analysis and prediction techniques","author":"Joshi","year":"2015","journal-title":"arXiv:1507.05722"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1613\/1\/012019"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.117163","article-title":"Cellular traffic prediction with machine learning: A survey","volume":"201","author":"Jiang","year":"2022","journal-title":"Exp. Syst. Appl."},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2018.8301763"},{"key":"ref9","first-page":"803","article-title":"A survey on evolution of mobile networks: 1G to 4G","volume":"3","author":"Kanani","year":"2014","journal-title":"Int. J. Eng. Sci. Res."},{"key":"ref10","first-page":"2250","article-title":"The evolution to 4G cellular systems: Architecture and key features of LTE-advanced networks","volume":"2","author":"Abed","year":"2012","journal-title":"Int. J. Comput. Netw. Wireless Commun."},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2010.5593244"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2017.9"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2022.110814"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7389830"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2461602"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737488"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1038\/sdata.2015.55"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.05.012"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICUMT51630.2020.9222418"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSESS.2018.8663884"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4415"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/PST47121.2019.8949035"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/telecom2040029"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.is.2015.04.007","article-title":"Time-series clustering\u2014A decade review","volume":"53","author":"Aghabozorgi","year":"2015","journal-title":"Inf. Syst."},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01091-0_9"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/601858.601862"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/b97391"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.5121\/ijcnc.2012.4409"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNT.2010.35"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107279667"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/11751595_26"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/sym11020240"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ISDEA.2010.335"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2599878"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2778721"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2006.1693165"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ISWCS.2004.1407212"},{"issue":"22","key":"ref38","doi-asserted-by":"crossref","first-page":"10881","DOI":"10.1093\/nar\/16.22.10881","article-title":"Multiple sequence alignment with hierarchical clustering","volume":"16","author":"Corpet","year":"1988","journal-title":"Nucl. Acids Res."},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2746285.2746292"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2014.6992053"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.14778\/1454159.1454226"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339576"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2006.392"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-012-0250-5"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2949741.2949758"},{"issue":"11","key":"ref46","doi-asserted-by":"crossref","first-page":"1857","DOI":"10.1016\/j.patcog.2005.01.025","article-title":"Clustering of time series data\u2014A survey","volume":"38","author":"Liao","year":"2005","journal-title":"Pattern Recognit."},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.15446\/ing.investig.v29n2.15163"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s12544-015-0170-8"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2003.1203886"},{"issue":"5","key":"ref50","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1016\/0893-6080(89)90020-8","article-title":"Multilayer feedforward networks are universal approximators","volume":"2","author":"Hornik","year":"1989","journal-title":"Neural Netw."},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICCP.2011.6047849"},{"key":"ref52","article-title":"A long short-term memory recurrent neural network framework for network traffic matrix prediction","author":"Azzouni","year":"2017","journal-title":"arXiv:1705.05690"},{"key":"ref53","first-page":"249","article-title":"Understanding the difficulty of training deep feedforward neural networks","volume-title":"Proc. 13th Int. Conf. Artif. Intell. Statist.","volume":"9","author":"Glorot"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2018.00035"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057090"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/4145353"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref58","first-page":"1724","article-title":"Learning phrase representations using RNN encoder\u2013decoder for statistical machine translation","volume-title":"Proc. Conf. Empirical Methods Natural Lang. Process. (EMNLP)","author":"Cho"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/1425732"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/YAC.2016.7804912"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3385414"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/BigData50022.2020.9378059"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/s42452-021-04761-8"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2008.2005605"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2022.3182768"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-06708-x"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2005.853437"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31956-6_58"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34167-6_5"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ITSIM.2008.4631947"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/IFCSTA.2009.207"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMI.2009.5274287"},{"issue":"4","key":"ref74","doi-asserted-by":"crossref","first-page":"558","DOI":"10.1016\/j.techfore.2010.01.009","article-title":"Forecasting with limited data: Combining ARIMA and diffusion models","volume":"77","author":"Christodoulos","year":"2010","journal-title":"Technol. Forecasting Social Change"},{"key":"ref75","first-page":"1199","article-title":"Impact of utilizing forecasted network traffic for data transfers","volume-title":"Proc. 13th Int. Conf. Adv. Commun. Technol.","author":"Hoong"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.7763\/JACN.2014.V2.106"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.2172\/1136782"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/AFRCON.2017.8095496"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/3139958.3140053"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.23919\/TMA.2018.8506509"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-019-00556-w"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.12928\/telkomnika.v18i2.12989"},{"key":"ref83","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2021.108102","article-title":"A network traffic forecasting method based on SA optimized ARIMA\u2013BP neural network","volume":"193","author":"Yang","year":"2021","journal-title":"Comput. Netw."},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1504\/IJBDI.2016.073903"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8126198"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2018.2795605"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2018.8690851"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2018.8581000"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1800127"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845132"},{"issue":"2","key":"ref91","first-page":"19","article-title":"A network traffic prediction method based on LSTM","volume":"17","author":"Shihao","year":"2019","journal-title":"ZTE Commun."},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2020.3000059"},{"key":"ref93","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2020.102258","article-title":"A deep learning method based on an attention mechanism for wireless network traffic prediction","volume":"107","author":"Li","year":"2020","journal-title":"Ad Hoc Netw."},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322410"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6050627"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-03662-2"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC51323.2021.9498910"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/tnet.2021.3053771"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/9223965"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2021.3078745"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC49053.2021.9417547"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM54355.2022.00028"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2001.921273"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2006.247142"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/SOFTCOM.2007.4446113"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2010.5488338"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/1993744.1993776"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1002\/ett.2583"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2016.63"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1145\/3209582.3209606"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2017.8117559"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2689772"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56904-8_14"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/ICTON51198.2020.9203477"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-019-01413-5"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2021-Spring51267.2021.9449040"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/3448613"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11040626"},{"key":"ref119","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014","journal-title":"arXiv:1412.6980"},{"issue":"1","key":"ref120","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/j.ijforecast.2019.04.014","article-title":"The M4 competition: 100,000 time series and 61 forecasting methods","volume":"36","author":"Makridakis","year":"2020","journal-title":"Int. J. Forecasting"},{"issue":"4","key":"ref121","doi-asserted-by":"crossref","first-page":"1346","DOI":"10.1016\/j.ijforecast.2021.11.013","article-title":"M5 accuracy competition: Results, findings, and conclusions","volume":"38","author":"Makridakis","year":"2022","journal-title":"Int. J. Forecasting"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423643"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1145\/3485983.3494844"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796918"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3136707"},{"key":"ref126","article-title":"Telecommunications-SMS, call, internet-MI","author":"Italia","year":"2015"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10015152.pdf?arnumber=10015152","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T06:34:09Z","timestamp":1707806049000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10015152\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":126,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3236261","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}