{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T08:40:33Z","timestamp":1774255233369,"version":"3.50.1"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1109\/tnsm.2020.3048131","type":"journal-article","created":{"date-parts":[[2020,12,30]],"date-time":"2020-12-30T20:55:23Z","timestamp":1609361723000},"page":"894-906","source":"Crossref","is-referenced-by-count":25,"title":["STAD: Spatio-Temporal Anomaly Detection Mechanism for Mobile Network Management"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4490-9027","authenticated-orcid":false,"given":"Aicha","family":"Dridi","sequence":"first","affiliation":[]},{"given":"Cherifa","family":"Boucetta","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3261-4501","authenticated-orcid":false,"given":"Seif Eddine","family":"Hammami","sequence":"additional","affiliation":[]},{"given":"Hossam","family":"Afifi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0325-6680","authenticated-orcid":false,"given":"Hassine","family":"Moungla","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3182\/20130902-3-CN-3020.00044"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCN.2008.4447167"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2012.031912.110155"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422516"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2014.6912503"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2015.7344856"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2016.0046"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502845"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2927886"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.912610"},{"key":"ref10","author":"chalapathy","year":"2019","journal-title":"Deep learning for anomaly detection A survey"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM47813.2019.9020748"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5121\/ijwmn.2019.11201"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.01.001"},{"key":"ref13","first-page":"20","article-title":"Digital libraries: Advanced methods and technologies, digital collections","volume":"1297","author":"kalinichenko","year":"2014","journal-title":"Proc 4th Russian Sci Conf"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2017.26"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2627340"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2015.7145707"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014077"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775128"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.151"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2002.1004386"},{"key":"ref4","year":"0","journal-title":"Orange Telecom Data for Development Challenge (D4D Challenge)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/604264.604269"},{"key":"ref3","year":"2015","journal-title":"Telecom Italia Big Data Challenge"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2015.2396577"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2004.10090"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972757.55"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1080\/01431161.2010.486413"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2019.8766446"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.235"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2016.7565166"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148931"},{"key":"ref20","first-page":"1","article-title":"Identifying abnormal patterns in cellular communication flows","author":"goergen","year":"2013","journal-title":"Proc Principles Syst Appl IP Telecommun"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-004-0174-5"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.122"},{"key":"ref42","first-page":"582","article-title":"Support vector method for novelty detection","volume":"12","author":"sch\u00f6lkopf","year":"1999","journal-title":"Advances in Neural Information Processing Systems (NIPS)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2000.898854"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2016.63"},{"key":"ref23","first-page":"237","article-title":"Assumption-free anomaly detection in time series","volume":"5","author":"wei","year":"2005","journal-title":"Proc 17th Int Conf Sci Stat Database Manag (SSDBM)"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1023\/B:STCO.0000035301.49549.88"},{"key":"ref26","first-page":"389","article-title":"The application of Markov model based equivalence class generalization in network anomaly detection","author":"peng","year":"2017","journal-title":"Proc 2nd Int Conf Cloud Comput Big Data Anal (ICCCBDA)"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1201\/b11433-68"},{"key":"ref25","first-page":"101","article-title":"Characterizing the behavior of a program using multiple-length N-grams","author":"marceau","year":"2001","journal-title":"Proc Workshop New Security Paradigms"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/9374858\/09311155.pdf?arnumber=9311155","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:39Z","timestamp":1652194359000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9311155\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3]]},"references-count":46,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2020.3048131","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3]]}}}