{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T14:28:38Z","timestamp":1754144918098,"version":"3.41.2"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,12]],"date-time":"2025-05-12T00:00:00Z","timestamp":1747008000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,12]],"date-time":"2025-05-12T00:00:00Z","timestamp":1747008000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,12]]},"DOI":"10.1109\/noms57970.2025.11073605","type":"proceedings-article","created":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T17:40:26Z","timestamp":1752601226000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["DREAM: Dual foREcAsting Model for Network Anomaly Detection"],"prefix":"10.1109","author":[{"given":"Mehdi","family":"Boudjelli","sequence":"first","affiliation":[{"name":"Orange,France"}]},{"given":"Sihem","family":"Cherrared","sequence":"additional","affiliation":[{"name":"Orange,France"}]},{"given":"Pedro B.","family":"Velloso","sequence":"additional","affiliation":[{"name":"CNAM,Paris,France"}]},{"given":"Xiaofeng","family":"Huang","sequence":"additional","affiliation":[{"name":"Orange,France"}]},{"given":"Fabrice","family":"Guillemin","sequence":"additional","affiliation":[{"name":"Orange,France"}]},{"given":"Stefano","family":"Secci","sequence":"additional","affiliation":[{"name":"CNAM,Paris,France"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.3390\/app122312472"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1007\/s42486-021-00075-1"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.14778\/3538598.3538602"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/3292500.3330672"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/3447548.3467174"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/6GNet54646.2022.9830292"},{"year":"2020","author":"Braei","journal-title":"Anomaly detection in univariate time-series: A survey on the state-of-the-art","key":"ref7"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/3691338"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/s11235-018-0475-8"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/NOMS.2016.7502903"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/GLOBECOM54140.2023.10436884"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/TNSM.2016.2627340"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/GLOCOM.2018.8647714"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/INFOCOM.2019.8737430"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1016\/j.ins.2021.04.056"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/ICACT.2015.7224759"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TNSM.2022.3161872"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/TNSM.2019.2927886"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/3338840.3355641"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.7717\/peerj-cs.757"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1137\/100783522"},{"year":"2017","author":"Marteau","journal-title":"Hybrid isolation forest-application to intrusion detection","key":"ref22"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref24","first-page":"89","article-title":"Long short term memory networks for anomaly detection in time series","volume":"2015","author":"Malhotra","year":"2015","journal-title":"Esann"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1145\/3219819.3219845"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/IJCNN55064.2022.9891913"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1609\/aaai.v36i7.20680"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1007\/s10618-023-00988-8"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1145\/3292500.3330680"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/AERO47225.2020.9172442"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.2307\/2335182"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1609\/aaai.v37i9.26317"},{"year":"2022","author":"Wu","journal-title":"Timesnet: Temporal 2d-variation modeling for general time series analysis","key":"ref33"}],"event":{"name":"NOMS 2025-2025 IEEE Network Operations and Management Symposium","start":{"date-parts":[[2025,5,12]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2025,5,16]]}},"container-title":["NOMS 2025-2025 IEEE Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11073532\/11073571\/11073605.pdf?arnumber=11073605","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T06:10:47Z","timestamp":1752646247000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11073605\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,12]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/noms57970.2025.11073605","relation":{},"subject":[],"published":{"date-parts":[[2025,5,12]]}}}