{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:46:52Z","timestamp":1775069212162,"version":"3.50.1"},"reference-count":189,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"European Union under the Italian National Recovery and Resilience Plan (NRRP) of NextGenerationEU, partnership on \u201cTelecommunications of the Future\u201d"},{"name":"\u201cxInternet\u201d Project supported by the MUR PRIN 2022 program"},{"DOI":"10.13039\/100031478","name":"NextGenerationEU","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100031478","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1109\/tnsm.2025.3543022","type":"journal-article","created":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T18:34:09Z","timestamp":1739817249000},"page":"2441-2472","source":"Crossref","is-referenced-by-count":13,"title":["Mapping the Landscape of Generative AI in Network Monitoring and Management"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0997-9724","authenticated-orcid":false,"given":"Giampaolo","family":"Bovenzi","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering and Information Technologies, University of Naples Federico II, Naples, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6476-8092","authenticated-orcid":false,"given":"Francesco","family":"Cerasuolo","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Information Technologies, University of Naples Federico II, Naples, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6230-2958","authenticated-orcid":false,"given":"Domenico","family":"Ciuonzo","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Information Technologies, University of Naples Federico II, Naples, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-3370-2226","authenticated-orcid":false,"given":"Davide","family":"Di Monda","sequence":"additional","affiliation":[{"name":"DIETI, University of Naples Federico II, Naples, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-6141-0188","authenticated-orcid":false,"given":"Idio","family":"Guarino","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Verona, Verona, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4340-442X","authenticated-orcid":false,"given":"Antonio","family":"Montieri","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Information Technologies, University of Naples Federico II, Naples, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7477-1452","authenticated-orcid":false,"given":"Valerio","family":"Persico","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Information Technologies, University of Naples Federico II, Naples, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0221-7444","authenticated-orcid":false,"given":"Antonio","family":"Pescap\u00e9","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Information Technologies, University of Naples Federico II, Naples, Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3649506"},{"key":"ref2","volume-title":"Generative Artificial Intelligence (AI) Market Size Worldwide from 2020 to 2030","year":"2025"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3524474"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3422241"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-022-33128-9"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3169988"},{"key":"ref7","volume-title":"The networking channel","year":"2025"},{"key":"ref8","volume-title":"AT&T\u2019s new generative AI tool will help employees be more effective, creative, and innovative","year":"2025"},{"key":"ref9","volume-title":"Cisco artificial intelligence","year":"2025"},{"key":"ref10","volume-title":"How to make better use of network insights with generative AI","year":"2025"},{"key":"ref11","volume-title":"European innovation council","year":"2025"},{"key":"ref12","volume-title":"Huawei introduces AI technologies to accelerate network transformation towards all intelligence in the Net5.5G era","year":"2025"},{"key":"ref13","volume-title":"Welcome to the large generative Al models inTelecom (GenAlNet) emerging technology initiative Website","year":"2025"},{"key":"ref14","volume-title":"IETF side meetings","year":"2025"},{"key":"ref15","volume-title":"Specializing large language models for telecom networks","year":"2025"},{"key":"ref16","volume-title":"Generative AI implications for Telco operations","year":"2025"},{"key":"ref17","volume-title":"Telef\u00f3nica partners with Microsoft to incorporate generative AI into kernel","year":"2025"},{"key":"ref18","volume-title":"Generative AI: The challenge of TIM for the future of IT","year":"2025"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.001.2300246"},{"key":"ref20","article-title":"A comprehensive overview of large language models (LLMs) for cyber defences: Opportunities and directions","author":"Hassanin","year":"2024","journal-title":"arXiv:2405.14487"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.iotcps.2023.12.003"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3659575"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3465447"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2024.3362271"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-023-00980-9"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3510936"},{"key":"ref27","article-title":"Large language models for networking: Applications, enabling techniques, and challenges","author":"Huang","year":"2023","journal-title":"arXiv:2311.17474"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3425594"},{"key":"ref29","article-title":"Generative AI and large language models for cyber security: All insights you need","author":"Ferrag","year":"2024","journal-title":"arXiv:2405.12750"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3353265"},{"key":"ref31","article-title":"Toward scalable generative AI via mixture of experts in mobile edge networks","author":"Wang","year":"2024","journal-title":"arXiv:2402.06942"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3051381"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2024.103926"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3511976"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00188"},{"key":"ref36","first-page":"1","article-title":"Auto-encoding variational Bayes","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Kingma"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref38","first-page":"1","article-title":"NICE: Non-linear independent components estimation","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Dinh"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3488375"},{"key":"ref40","first-page":"1","article-title":"Generative adversarial nets","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NeurIPS)","volume":"27","author":"Goodfellow"},{"key":"ref41","article-title":"Conditional generative adversarial nets","author":"Mirza","year":"2014","journal-title":"arXiv:1411.1784"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1511.06434"},{"key":"ref43","first-page":"1558","article-title":"Autoencoding beyond pixels using a learned similarity metric","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","author":"Larsen"},{"key":"ref44","first-page":"1","article-title":"Density estimation using Real NVP","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Dinh"},{"key":"ref45","article-title":"On the opportunities and risks of foundation models","author":"Bommasani","year":"2021","journal-title":"arXiv:2108.07258"},{"key":"ref46","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","author":"Devlin","year":"2018","journal-title":"arXiv:1810.04805"},{"key":"ref47","volume-title":"Improving Language Understanding by Generative Pre-Training","author":"Radford","year":"2018"},{"key":"ref48","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NeurIPS)","volume":"33","author":"Ho"},{"key":"ref49","first-page":"1","article-title":"Understanding diffusion objectives as the ELBO with simple data augmentation","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NeurIPS)","volume":"36","author":"Kingma"},{"key":"ref50","article-title":"Mamba: Linear-time sequence modeling with selective state spaces","author":"Gu","year":"2023","journal-title":"arXiv:2312.00752"},{"key":"ref51","first-page":"1","article-title":"Memory-efficient fine-tuning of compressed large language models via sub-4-bit integer quantization","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NeurIPS)","volume":"36","author":"Kim"},{"key":"ref52","first-page":"1","article-title":"LoRa: Low-rank adaptation of large language models","volume-title":"Proc. Int. Conf. Learning Represent. (ICLR)","author":"Hu"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3639037"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-023-00626-4"},{"key":"ref55","volume-title":"GGUF","year":"2025"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLCN59089.2024.10624786"},{"key":"ref57","article-title":"NetGPT: Generative pretrained transformer for network traffic","author":"Meng","year":"2023","journal-title":"arXiv:2304.09513"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2883147"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.09.009"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2300361"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512217"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP61940.2024.10858569"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3472753"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122564"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3363469"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3460345"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/BigData59044.2023.10386543"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103805"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2327754"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.indmarman.2017.08.010"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2021.03.006"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.23919\/JCIN.2023.10272352"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484758"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3071441"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110616"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/IEEECONF51389.2021.9416067"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3325727"},{"key":"ref78","article-title":"LENS: A foundation model for network traffic","author":"Wang","year":"2024","journal-title":"arXiv:2402.03646"},{"key":"ref79","article-title":"TrafficGPT: Breaking the token barrier for efficient long traffic analysis and generation","author":"Qu","year":"2024","journal-title":"arXiv:2403.05822"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/3672198.3673792"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/3676870"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/NAECON61878.2024.10670640"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103993"},{"key":"ref84","first-page":"3939","article-title":"Imaging time-series to improve classification and imputation","volume-title":"Proc. 24th Int. Conf. Artif. Intell. (IJCAI)","author":"Wang"},{"key":"ref85","article-title":"netFound: Foundation model for network security","author":"Guthula","year":"2023","journal-title":"arXiv:2310.17025"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/3618257.3624845"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.3390\/math12111624"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/IGARSS53475.2024.10641799"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3110524"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.101.2001126"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557549"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3185748"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3200034"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3182333"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3172432"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/EASCT59475.2023.10393509"},{"key":"ref97","article-title":"HuntGPT: Integrating machine learning-based anomaly detection and explainable AI with large language models (LLMs)","author":"Ali","year":"2023","journal-title":"arXiv:2309.16021"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.110072"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103131"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122045"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3360879"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/3487351.3492723"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/CloudIntelligence52565.2021.00013"},{"key":"ref104","article-title":"RAGLog: Log anomaly detection using retrieval augmented generation","author":"Pan","year":"2023","journal-title":"arXiv:2311.05261"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-DSS-SmartCity-DependSys60770.2023.00045"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1145\/3643733"},{"issue":"3","key":"ref107","first-page":"70","article-title":"Log anomaly detection through GPT-2 for large scale systems","volume":"21","author":"Ji","year":"2023","journal-title":"ZTE Commun."},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-7587-7_13"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/ICSAI61474.2023.10423328"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT59888.2023.00058"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/AIIoT58432.2024.10574658"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-024-01028-2"},{"key":"ref113","article-title":"IoT device labeling using large language models","author":"Meyuhas","year":"2024","journal-title":"arXiv:2403.01586"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-56249-5_6"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3358730"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/3639856.3639892"},{"key":"ref117","article-title":"Making network configuration human friendly","author":"Wang","year":"2023","journal-title":"arXiv:2309.06342"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/3626111.3628183"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1145\/3626111.3628194"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS59351.2024.10427044"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2300550"},{"key":"ref122","article-title":"Utilizing large language models to translate RFC protocol specifications to CPSA definitions","author":"Duclos","year":"2024","journal-title":"arXiv:2402.00890"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops59551.2024.10615609"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC59610.2024.10817162"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1145\/3642970.3655836"},{"key":"ref126","article-title":"Leveraging fine-tuned retrieval-augmented generation with long-context support: For 3GPP standards","author":"Erak","year":"2024","journal-title":"arXiv:2408.11775"},{"key":"ref127","article-title":"Hermes: A large language model framework on the journey to autonomous networks","author":"Ayed","year":"2024","journal-title":"arXiv:2411.06490"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2021.102621"},{"key":"ref129","article-title":"LLM maybe LongLM: Self-extend LLM context window without tuning","author":"Jin","year":"2024","journal-title":"arXiv:2401.01325"},{"key":"ref130","first-page":"5753","article-title":"XLNet: Generalized autoregressive pretraining for language understanding","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NeurIPS)","volume":"32","author":"Yang"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2024.100211"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref133","first-page":"47","article-title":"Web analyzing traffic challenge: Description and results","volume-title":"Proc. Eur. Conf. Mach. Learn. Princ. Pract. Knowl. Discov. Databases (ECML\/PKDD)","author":"Ra\u0131ssi"},{"key":"ref134","volume-title":"CSIC 2010 Web application attacks","year":"2025"},{"key":"ref135","volume-title":"HttpParamsDataset","year":"2025"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.283"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.5220\/0005740704070414"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.5220\/0006105602530262"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2866249"},{"key":"ref141","volume-title":"USTC-TFC2016","year":"2025"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243768"},{"key":"ref144","volume-title":"LabeledFlows2017 dataset"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24412"},{"key":"ref146","first-page":"1","article-title":"NL2Bash: A corpus and semantic parser for natural language interface to the linux operating system","volume-title":"Proc. Lang. Resour. Eval. Conf. (LREC)","author":"Lin"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2019.8888419"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00037"},{"key":"ref149","volume-title":"Online shopping store\u2014Web server logs","author":"Zaker","year":"2019"},{"key":"ref150","volume-title":"LabeledFlows2019 dataset","year":"2025"},{"key":"ref151","volume-title":"Apache web server\u2014Access log pre-processing for Web intrusion detection","author":"Hilmi","year":"2020"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00026"},{"key":"ref153","volume-title":"CyberLab honeynet dataset","author":"Sedlar","year":"2020"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE59848.2023.00071"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS54207.2022.9789828"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64758-2_6"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2021.102994"},{"key":"ref158","volume-title":"fwaf-dataset","year":"2025"},{"key":"ref159","volume-title":"Dataset of EU SPIRIT project","year":"2021"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/PST55820.2022.9851966"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3165809"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.3390\/s23135941"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-ijcnlp.3"},{"key":"ref164","article-title":"TeleQnA: A benchmark dataset to assess large language models telecommunications knowledge","author":"Maatouk","year":"2023","journal-title":"arXiv:2310.15051"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813703"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1145\/3555050.3569116"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1145\/3314212.3314215"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2933358"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/FMSys62467.2024.00008"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560609"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00009"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106775"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2020.106854"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3353377"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1145\/3381831"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2021.11.019"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100461"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.2017.0551"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1088\/1361-6633\/aab406"},{"key":"ref180","article-title":"Beyond deep reinforcement learning: A tutorial on generative diffusion models in network optimization","author":"Du","year":"2023","journal-title":"arXiv:2308.05384"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3400011"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32236-6_51"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1145\/3561048"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2024.3504955"},{"key":"ref185","article-title":"Causal machine learning: A survey and open problems","author":"Kaddour","year":"2022","journal-title":"arXiv:2206.15475"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.3233\/AIC-210084"},{"key":"ref187","volume-title":"Neuro-Symbolic Artificial Intelligence: The State of the Art","author":"Hitzler","year":"2022"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2018.095647"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.4337\/9781784717766.00019"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4275028\/11027486\/10891637.pdf?arnumber=10891637","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T17:34:56Z","timestamp":1749490496000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10891637\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":189,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2025.3543022","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6]]}}}