{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:51Z","timestamp":1750220091423,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,14]],"date-time":"2022-08-14T00:00:00Z","timestamp":1660435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,14]]},"DOI":"10.1145\/3534678.3539097","type":"proceedings-article","created":{"date-parts":[[2022,8,12]],"date-time":"2022-08-12T19:06:41Z","timestamp":1660331201000},"page":"2682-2691","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["RCAD: Real-time Collaborative Anomaly Detection System for Mobile Broadband Networks"],"prefix":"10.1145","author":[{"given":"Azza H.","family":"Ahmed","sequence":"first","affiliation":[{"name":"Simula Metropolitan Center for Digital Engineering &amp; Oslo Metropolitan University, Oslo, Norway"}]},{"given":"Michael A.","family":"Riegler","sequence":"additional","affiliation":[{"name":"Simula Metropolitan Center for Digital Engineering &amp; University of Troms\u00f8, Oslo, Norway"}]},{"given":"Steven A.","family":"Hicks","sequence":"additional","affiliation":[{"name":"Simula Metropolitan Center for Digital Engineering &amp; Oslo Metropolitan University, Oslo, Norway"}]},{"given":"Ahmed","family":"Elmokashfi","sequence":"additional","affiliation":[{"name":"Simula Metropolitan Center for Digital Engineering, Oslo, Norway"}]}],"member":"320","published-online":{"date-parts":[[2022,8,14]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.3390\/s22020450"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1016\/j.neucom.2017.04.070"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/ACCESS.2021.3138695"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/3394486.3403392"},{"key":"e_1_3_2_1_5_1","volume-title":"Aaron Bostrom, James Large, and Eamonn Keogh.","author":"Bagnall Anthony","year":"2017","unstructured":"Anthony Bagnall, Jason Lines, Aaron Bostrom, James Large, and Eamonn Keogh. 2017. The great time series classification bake off: a review and experimental evaluation of recent algorithmic advances. Data mining and knowledge discovery 31, 3 (2017), 606--660."},{"key":"e_1_3_2_1_6_1","volume-title":"Deep learning for anomaly detection: A survey. arXiv preprint arXiv:1901.03407","author":"Chalapathy Raghavendra","year":"2019","unstructured":"Raghavendra Chalapathy and Sanjay Chawla. 2019. Deep learning for anomaly detection: A survey. arXiv preprint arXiv:1901.03407 (2019)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_2_1_8_1","first-page":"308","article-title":"Use of Hierarchical Temporal Memory Algorithm in Heart Attack Detection","volume":"13","author":"Charrad Tesnim","year":"2019","unstructured":"Tesnim Charrad, Kaouther Nouira, and Ahmed Ferchichi. 2019. Use of Hierarchical Temporal Memory Algorithm in Heart Attack Detection. International Journal of Computer and Systems Engineering 13, 5 (2019), 308--311.","journal-title":"International Journal of Computer and Systems Engineering"},{"key":"e_1_3_2_1_9_1","volume-title":"Continuous online sequence learning with an unsupervised neural network model. Neural computation 28, 11","author":"Cui Yuwei","year":"2016","unstructured":"Yuwei Cui, Subutai Ahmad, and Jeff Hawkins. 2016. Continuous online sequence learning with an unsupervised neural network model. Neural computation 28, 11 (2016), 2474--2504."},{"key":"e_1_3_2_1_10_1","volume-title":"The HTM spatial pooler-A neocortical algorithm for online sparse distributed coding. Frontiers in computational neuroscience 11","author":"Cui Yuwei","year":"2017","unstructured":"Yuwei Cui, Subutai Ahmad, and Jeff Hawkins. 2017. The HTM spatial pooler-A neocortical algorithm for online sparse distributed coding. Frontiers in computational neuroscience 11 (2017), 111."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1109\/SmartIoT.2018.00-13"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/ACCESS.2020.3030031"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1007\/s10618-020-00710-y"},{"key":"e_1_3_2_1_14_1","volume-title":"arXiv preprint arXiv:1710.11583","author":"Feamster Nick","year":"2017","unstructured":"Nick Feamster and Jennifer Rexford. 2017. Why (and how) networks should run themselves. arXiv preprint arXiv:1710.11583 (2017)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/3447548.3467137"},{"key":"e_1_3_2_1_16_1","volume-title":"Generative adversarial nets. Advances in neural information processing systems 27","author":"Goodfellow Ian","year":"2014","unstructured":"Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. Advances in neural information processing systems 27 (2014)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1109\/ACCESS.2021.3057675"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1016\/j.jnca.2018.05.003"},{"key":"e_1_3_2_1_19_1","volume-title":"Why neurons have thousands of synapses, a theory of sequence memory in neocortex. Frontiers in neural circuits 10","author":"Hawkins Jeff","year":"2016","unstructured":"Jeff Hawkins and Subutai Ahmad. 2016. Why neurons have thousands of synapses, a theory of sequence memory in neocortex. Frontiers in neural circuits 10 (2016), 23."},{"unstructured":"J. Hawkins S. Ahmad S. Purdy and A. Lavin. 2016. Biological and Machine Intelligence (BAMI). (2016). https:\/\/numenta.com\/resources\/biological-andmachine-intelligence\/ Initial online release 0.4.","key":"e_1_3_2_1_20_1"},{"volume-title":"The organization of behavior: A neuropsychological theory","author":"Hebb Donald Olding","unstructured":"Donald Olding Hebb. 2005. The organization of behavior: A neuropsychological theory. Psychology Press.","key":"e_1_3_2_1_21_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1145\/3117811.3117813"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1016\/j.bjp.2013.12.036"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1109\/MCOM.2017.1600778CM"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1007\/978-3-030-30490-4_56"},{"key":"e_1_3_2_1_26_1","volume-title":"Kai Ming Ting, and Zhi-Hua Zhou","author":"Liu Fei Tony","year":"2008","unstructured":"Fei Tony Liu, Kai Ming Ting, and Zhi-Hua Zhou. 2008. Isolation forest. In 2008 eighth ieee international conference on data mining. IEEE, 413--422."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1007\/s10618-019-00617-3"},{"unstructured":"Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Artificial intelligence and statistics. PMLR 1273--1282.","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","volume-title":"Playing Atari with deep reinforcement learning. arXiv preprint arXiv:1312.5602","author":"Mnih Volodymyr","year":"2013","unstructured":"Volodymyr Mnih, Koray Kavukcuoglu, David Silver, Alex Graves, Ioannis Antonoglou, Daan Wierstra, and Martin Riedmiller. 2013. Playing Atari with deep reinforcement learning. arXiv preprint arXiv:1312.5602 (2013)."},{"doi-asserted-by":"crossref","unstructured":"Volodymyr Mnih Koray Kavukcuoglu David Silver Andrei A Rusu Joel Veness Marc G Bellemare Alex Graves Martin Riedmiller Andreas K Fidjeland Georg Ostrovski et al. 2015. Human-level control through deep reinforcement learning. nature 518 7540 (2015) 529--533.","key":"e_1_3_2_1_30_1","DOI":"10.1038\/nature14236"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1145\/3439950"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1109\/LRA.2018.2801475"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1109\/TNSM.2020.3018538"},{"key":"e_1_3_2_1_34_1","volume-title":"Cisco Visual Networking Index: Forecast and Trends","author":"Cisco","year":"2017","unstructured":"Cisco public. 2019. Cisco Visual Networking Index: Forecast and Trends, 2017--2022. Retrieved Feb 8, 2022 from https:\/\/twiki.cern.ch\/twiki\/pub\/HEPIX\/TechwatchNetwork\/HtwNetworkDocuments\/white-paper-c11--741490.pdf"},{"key":"e_1_3_2_1_35_1","volume-title":"Encoding data for HTM systems. arXiv preprint arXiv:1602.05925","author":"Purdy Scott","year":"2016","unstructured":"Scott Purdy. 2016. Encoding data for HTM systems. arXiv preprint arXiv:1602.05925 (2016)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1145\/2689746.2689747"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1109\/MNET.001.1900228"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.1145\/3292500.3330672"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.1109\/ACCESS.2018.2799210"},{"key":"e_1_3_2_1_40_1","volume-title":"International conference on learning representations.","author":"Zong Bo","year":"2018","unstructured":"Bo Zong, Qi Song, Martin Renqiang Min, Wei Cheng, Cristian Lumezanu, Daeki Cho, and Haifeng Chen. 2018. Deep autoencoding gaussian mixture model for unsupervised anomaly detection. In International conference on learning representations."}],"event":{"sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"acronym":"KDD '22","name":"KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Washington DC USA"},"container-title":["Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3534678.3539097","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3534678.3539097","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:51Z","timestamp":1750183791000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3534678.3539097"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,14]]},"references-count":40,"alternative-id":["10.1145\/3534678.3539097","10.1145\/3534678"],"URL":"https:\/\/doi.org\/10.1145\/3534678.3539097","relation":{},"subject":[],"published":{"date-parts":[[2022,8,14]]},"assertion":[{"value":"2022-08-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}