{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:58:42Z","timestamp":1761663522818,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/iwcmc.2016.7577083","type":"proceedings-article","created":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T18:01:42Z","timestamp":1475172102000},"page":"351-356","source":"Crossref","is-referenced-by-count":7,"title":["Detecting and diagnosing anomalies in cellular networks using Random Neural Networks"],"prefix":"10.1109","author":[{"given":"Pedro","family":"Casas","sequence":"first","affiliation":[]},{"given":"Alessandro","family":"D'Alconzo","sequence":"additional","affiliation":[]},{"given":"Pierdomenico","family":"Fiadino","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Callegari","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Neural Networks for Pattern Recognition","year":"1995","author":"bishop","key":"ref32"},{"key":"ref31","article-title":"Survey of Random Neural Network Applications","volume":"126","author":"bakircioglu","year":"2000","journal-title":"E J O R"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1993.5.1.154"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1341431.1341443"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT.2005.1577126"},{"key":"ref13","article-title":"A non-self space approach to network anomaly detection","author":"ostaszewski","year":"2006","journal-title":"IEEE IPDPS"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INDCON.2005.1590237"},{"key":"ref15","article-title":"Using random forests for network-based anomaly detection","author":"prashanth","year":"2008","journal-title":"IEEE ICSCN"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2007.381936"},{"key":"ref17","article-title":"A peaks over threshold model for change-point detection by wavelets","volume":"14","author":"raimondo","year":"2004","journal-title":"Statistica Sinica"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.153"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064220"},{"key":"ref28","article-title":"Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge","volume":"35","author":"casas","year":"2011","journal-title":"Comp Commun"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2535372.2535408"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2680821.2680831"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452539"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1989.1.4.502"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17172-2_5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/nem.747"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00975-4_24"},{"key":"ref2","article-title":"When YouTube doesn't Work - Analysis of QoE-relevant Degradation in Google CDN Traffic","volume":"11","author":"casas","year":"2014","journal-title":"IEEE TNSM"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2009-0350"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2014.6906375"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028805"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01645-5_10"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1163593.1163596"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1162678.1162679"},{"key":"ref23","article-title":"K-Dimensional Trees for Continuous Traffic Classification","author":"carela-espa\u00f1ol","year":"2010","journal-title":"TMA"},{"key":"ref26","article-title":"MINETRAC: Mining Flows for Unsupervised Analysis & Semi-Supervised Classification","author":"casas","year":"2011","journal-title":"ITC"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1254882.1254934"}],"event":{"name":"2016 International Wireless Communications and Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2016,9,5]]},"location":"Paphos, Cyprus","end":{"date-parts":[[2016,9,9]]}},"container-title":["2016 International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7571053\/7577016\/07577083.pdf?arnumber=7577083","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,10,11]],"date-time":"2016-10-11T22:55:34Z","timestamp":1476226534000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7577083\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2016.7577083","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}