{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:21:29Z","timestamp":1767183689869,"version":"3.37.3"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004489","name":"Mitacs","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004489","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,25]]},"DOI":"10.1109\/noms54207.2022.9789938","type":"proceedings-article","created":{"date-parts":[[2022,6,9]],"date-time":"2022-06-09T21:21:22Z","timestamp":1654809682000},"page":"1-9","source":"Crossref","is-referenced-by-count":14,"title":["Anomaly Detection and Localization in NFV Systems: an Unsupervised Learning Approach"],"prefix":"10.1109","author":[{"given":"Seyed Soheil","family":"Johari","sequence":"first","affiliation":[{"name":"University of Waterloo,David R. Cheriton School of Computer Science"}]},{"given":"Nashid","family":"Shahriar","sequence":"additional","affiliation":[{"name":"University of Regina,Department of Computer Science"}]},{"given":"Massimo","family":"Tornatore","sequence":"additional","affiliation":[{"name":"Politecnico di Milano"}]},{"given":"Raouf","family":"Boutaba","sequence":"additional","affiliation":[{"name":"University of Waterloo,David R. Cheriton School of Computer Science"}]},{"given":"Aladdin","family":"Saleh","sequence":"additional","affiliation":[{"name":"Rogers Communications Canada Inc"}]}],"member":"263","reference":[{"year":"2009","author":"settles","article-title":"Active learning literature survey","key":"ref38"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/IWCMC.2014.6906427"},{"year":"0","article-title":"suricata - open source ids\/ips\/nsm engine","key":"ref32"},{"year":"0","article-title":"iptables","key":"ref31"},{"year":"0","key":"ref30"},{"year":"0","key":"ref37"},{"year":"0","key":"ref36"},{"key":"ref35","first-page":"664","article-title":"Savi testbed: Control and management of converged virtual ict resources","author":"kang","year":"2013","journal-title":"2013 IFIP\/IEEE International Symposium on Integrated Network Management (IM 2013)"},{"year":"0","article-title":"ntopng - high-speed web-based traffic analysis and flow collection","key":"ref34"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1016\/j.neucom.2019.09.078"},{"key":"ref11","article-title":"Deep autoencoding gaussian mixture model for unsupervised anomaly detection","author":"zong","year":"2018","journal-title":"International Conference on Learning Representations"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/CVPR42600.2020.01070"},{"key":"ref13","first-page":"896","article-title":"Pseudo-label: The simple and efficient semi-supervised learning method for deep neural networks","volume":"3","author":"lee","year":"2013","journal-title":"Workshop on Challenges in Representation Learning"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/3292500.3330871"},{"year":"2017","author":"devries","article-title":"Dataset augmentation in feature space","key":"ref15"},{"key":"ref16","first-page":"4768","article-title":"A unified approach to interpreting model predictions","author":"lundberg","year":"2017","journal-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.23919\/CNSM50824.2020.9269100"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/ISSRE.2016.32"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/ITC3249928.2020.00012"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/GLOBECOM42002.2020.9322496"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/MCOM.2017.1601201"},{"year":"2014","author":"bahdanau","article-title":"Neural machine translation by jointly learning to align and translate","key":"ref27"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/MCOM.2015.7045396","article-title":"Network function virtualization: Challenges and opportunities for innovations","volume":"53","author":"han","year":"2015","journal-title":"IEEE Communications Magazine"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/ICWS.2018.00031"},{"year":"0","article-title":"itu-ai-ml-in-5g-challenge","key":"ref29"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/3185467.3185495"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/3394486.3403392"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/NetSoft48620.2020.9165361"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1016\/j.comnet.2018.01.021"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.23919\/CNSM50824.2020.9269108"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/COMST.2015.2477041"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"7700","DOI":"10.1109\/ACCESS.2018.2803446","article-title":"A self-adaptive deep learning-based system for anomaly detection in 5G networks","volume":"6","author":"maim\u00f3","year":"2018","journal-title":"IEEE Access"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/CloudCom.2013.68"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/NETSOFT.2016.7502423"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.3390\/electronics9010064"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1145\/1282427.1282383"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1609\/aaai.v33i01.33011409"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/TPDS.2016.2575829"}],"event":{"name":"NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium","start":{"date-parts":[[2022,4,25]]},"location":"Budapest, Hungary","end":{"date-parts":[[2022,4,29]]}},"container-title":["NOMS 2022-2022 IEEE\/IFIP Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9789703\/9789704\/09789938.pdf?arnumber=9789938","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T20:10:28Z","timestamp":1656965428000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9789938\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,25]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/noms54207.2022.9789938","relation":{},"subject":[],"published":{"date-parts":[[2022,4,25]]}}}