{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T15:00:03Z","timestamp":1773414003875,"version":"3.50.1"},"reference-count":102,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/tnsm.2019.2948420","type":"journal-article","created":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T23:23:45Z","timestamp":1571700225000},"page":"1537-1551","source":"Crossref","is-referenced-by-count":46,"title":["A Survey of Fault Management in Network Virtualization Environments: Challenges and Solutions"],"prefix":"10.1109","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2702-9714","authenticated-orcid":false,"given":"Sihem","family":"Cherrared","sequence":"first","affiliation":[]},{"given":"Sofiane","family":"Imadali","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Fabre","sequence":"additional","affiliation":[]},{"given":"Gregor","family":"Gossler","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3004-8609","authenticated-orcid":false,"given":"Imen Grida Ben","family":"Yahia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"146","article-title":"A self-diagnosis algorithm based on causal graphs","author":"lu","year":"2011","journal-title":"Proc Int Conf Auton Auton Syst (ICAS)"},{"key":"ref38","author":"ben-gal","year":"2008","journal-title":"Bayesian Networks"},{"key":"ref33","year":"2000"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5424"},{"key":"ref31","article-title":"Simple network management protocol (SNMP)","author":"schoffstall","year":"1157"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2013.09.009"},{"key":"ref37","first-page":"364","article-title":"Empowering self-diagnosis with self-modeling","author":"hounkonnou","year":"2012","journal-title":"Proc of 8th International Conf on Network and Service Management (CNSM)"},{"key":"ref36","first-page":"57","article-title":"Model based diagnosis for network communication faults","author":"de barros","year":"1999","journal-title":"Proc Int Workshop Artif Intell Distrib Inf Netw"},{"key":"ref35","first-page":"27","article-title":"A modern approach","volume":"25","author":"russell","year":"1995","journal-title":"Artificial Intelligence"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2004.01.010"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2815638"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7514161"},{"key":"ref29","volume":"1","year":"2014","journal-title":"Network Function Virtualisation (NFV) Management and Orchestration"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref22","year":"2013"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7389832"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.01.021"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2598068"},{"key":"ref26","author":"zimmerman","year":"2014","journal-title":"OpenFlow-enabled SDN and network functions virtualization"},{"key":"ref101","first-page":"29","article-title":"Network fault diagnosis using data mining classifiers","volume":"5","author":"rozaki","year":"2015","journal-title":"International Journal of Data Mining &amp; Knowledge Management Process"},{"key":"ref25","year":"2019","journal-title":"Clearwater96"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.12.004"},{"key":"ref50","first-page":"79","article-title":"Fault ascription in concurrent systems","author":"g\u00f6ssler","year":"2015","journal-title":"Proc Int'l Symp Trustworthy Global Computing"},{"key":"ref51","first-page":"61","article-title":"Automatic generation of chronicles and its application to alarm processing in power distribution systems","author":"laborie","year":"1997","journal-title":"Proc Int Workshop Principles Diagnosis"},{"key":"ref59","first-page":"6551","article-title":"Comparative analysis of clustering techniques in network traffic faults classification","volume":"5","author":"adda","year":"2017","journal-title":"Int J Innov Res Comput Commun Eng"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC.2007.372797"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ETCS.2010.128"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48508-2_37"},{"key":"ref55","first-page":"1422","article-title":"A case-based reasoning approach to the management of faults in communications networks","author":"lewis","year":"1993","journal-title":"Proc 9th Conf Artif Intell Appl"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2006.1687650"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/65.17975"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2009.090605"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/INM.1999.770686"},{"key":"ref4","year":"2019","journal-title":"Normandy"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2016.7503760"},{"key":"ref6","year":"2019","journal-title":"BEREC Report on infrastructure sharing"},{"key":"ref5","author":"rachid","year":"2015","journal-title":"NGMN Alliance 5G White Paper Reliability Report on Models and Features for End-to-End Reliability V1 0"},{"key":"ref8","article-title":"Downtime statistics of current cloud solutions","author":"c\u00e9rin","year":"2013"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1093\/bjps\/axi147"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6553682"},{"key":"ref9","year":"2019","journal-title":"Nagios"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"820","DOI":"10.1109\/JSAC.2005.843557","article-title":"A factor graph approach to link loss monitoring in wireless sensor networks","volume":"23","author":"mao","year":"2005","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref45","author":"dechter","year":"2003","journal-title":"Constraint Processing"},{"key":"ref48","first-page":"3022","article-title":"A modification of the Halpern&#x2013;Pearl definition of causality","author":"halpern","year":"2015","journal-title":"Proc Int Conf Artif Intell (IJCAI)"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.2307\/2025310"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2007.030103"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.1997.650720"},{"key":"ref44","doi-asserted-by":"crossref","DOI":"10.1002\/9780470061572.eqr089","article-title":"Bayesian networks","author":"ben-gal","year":"2007","journal-title":"Encyclopedia of Statistics in Quality and Reliability"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/IntelliSys.2015.7361080"},{"key":"ref73","year":"2019","journal-title":"Zabbix"},{"key":"ref72","year":"2019","journal-title":"OpenStack Monasca"},{"key":"ref71","year":"2019","journal-title":"OpenStack Telemetry Tools"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN.2018.8401622"},{"key":"ref76","first-page":"492","article-title":"NEOD: Network embedded on-line disaster management framework for software defined networking","author":"song","year":"2013","journal-title":"Proc IFIP\/IEEE Int Symp Integr Netw Manage"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0158"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2017.2733042"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.32"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700066"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICIAFS.2008.4783957"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICACTE.2010.5579132"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2017.2686343"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018477"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2016.7820628"},{"key":"ref64","author":"vasseur","year":"2004","journal-title":"Network Recovery Protection and Restoration of Optical SONET-SDH IP and MPLS"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2814738"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2805842"},{"key":"ref67","author":"bernardos","year":"2017","journal-title":"Network Virtualization Research Challenges"},{"key":"ref68","year":"2019","journal-title":"Doctoral project"},{"key":"ref69","first-page":"1","article-title":"Self-modeling based diagnosis of software-defined networks","author":"s\u00e1nchez-v\u00edlchez","year":"2015","journal-title":"Proc IEEE Conf Netw Softw (NetSoft)"},{"key":"ref2","year":"2019","journal-title":"Telecom Infra Project"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7045396"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2017.7876181"},{"key":"ref94","year":"2019","journal-title":"The Elastic Stack"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2014.143"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2017.2668403"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2015.7354505"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.23919\/INM.2017.7987282"},{"key":"ref102","year":"2000","journal-title":"Principles for a telecommunications management network"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ISETC.2016.7781055"},{"key":"ref99","year":"2019","journal-title":"Pacemaker Cluster Labs"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2017.8288236"},{"key":"ref97","year":"2019","journal-title":"Vitra"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2719862"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.09.012"},{"key":"ref12","first-page":"351","author":"chen","year":"2015","journal-title":"When Software Defined Networks Meet Fault Tolerance A Survey"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2876749"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2872214"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2830648"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2016.2583509"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-018-0087-2"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2012.181"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320099"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2016.0099"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2727878"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.4108\/icst.5gu.2014.258123"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2866942"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/APNOMS.2014.6996575"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2017.8004200"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/MoNeTeC.2014.6995594"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/NOF.2014.7119795"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ICS.2016.0042"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC.2017.7980671"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/8930332\/08877749.pdf?arnumber=8877749","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T22:47:15Z","timestamp":1695336435000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8877749\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":102,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2019.2948420","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]}}}