{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:22:27Z","timestamp":1740140547300,"version":"3.37.3"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,4,19]],"date-time":"2018-04-19T00:00:00Z","timestamp":1524096000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1186\/s13638-018-1098-1","type":"journal-article","created":{"date-parts":[[2018,4,19]],"date-time":"2018-04-19T09:22:38Z","timestamp":1524129758000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Estimating the effect of network element events in a wireless network"],"prefix":"10.1186","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2681-9511","authenticated-orcid":false,"given":"Mario","family":"Vela","sequence":"first","affiliation":[]},{"given":"Jeff","family":"Kraus","sequence":"additional","affiliation":[]},{"given":"Steve","family":"Friedman","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Irizarry","sequence":"additional","affiliation":[]},{"given":"Prakash","family":"Suman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,19]]},"reference":[{"key":"1098_CR1","unstructured":"R Core Team. The R project for statistical computing. https:\/\/www.r-project.org\/ . Accessed 16 Apr 2018."},{"key":"1098_CR2","unstructured":"3rd Generation Partnership Project (3GPP). Key Performance Indicators (KPI) for Evolved Universal Terrestrial Radio Access Network (E-UTRAN): definitions (Release 13). https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=2026 . Accessed 16 Apr 2018."},{"key":"1098_CR3","unstructured":"3rd Generation Partnership Project (3GPP). Technical specification group services and system aspects. Telecommunication management. Self-Organizing Networks (SON). Concepts and requirements (Release 14). https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=2031 . Accessed 16 Apr 2018."},{"key":"1098_CR4","unstructured":"3rd Generation Partnership Project (3GPP). Technical specification group services and system aspects. Telecommunication management. Self-Organizing Networks (SON) policy network resource. Model (NRM) Integration Reference Point (IRP). Requirements (Release 11). https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=2041 . Accessed 16 Apr 2018."},{"key":"1098_CR5","unstructured":"3rd Generation Partnership Project (3GPP). Technical specification group services and system sspects. Telecommunication management. Self-Organizing Networks (SON). Self-healing concepts and requirements (Release 14). https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=2052 . Accessed 16 Apr 2018."},{"key":"1098_CR6","doi-asserted-by":"publisher","unstructured":"H Sivaraks, CA Ratanamahatana, Robust and accurate anomaly detection in ECG artifacts using time series motif discovery. Comput. Math. Methods Med., 1\u201320 (2015). https:\/\/doi.org\/10.1155\/2015\/453214","DOI":"10.1155\/2015\/453214"},{"key":"1098_CR7","doi-asserted-by":"crossref","unstructured":"K Golmohammadi, OR Zaiane, Time series contextual anomaly detection for detecting market manipulation in stock market. Paper presented at the IEEE International Conference on Data Science and Advanced Analytics (DSAA), Paris, France, 19 2015.","DOI":"10.1109\/DSAA.2015.7344856"},{"key":"1098_CR8","doi-asserted-by":"crossref","unstructured":"Z Jadidi, V Muthukkumarasamy, E Sithirasenan, K Singh, Performance of flow-based anomaly detection in sampled traffic. J. Networks. 10(9) (2015). https:\/\/www.researchgate.net\/publication\/289556497_Performance_of_Flow-based_Anomaly_Detection_in_Sampled_Traffic","DOI":"10.4304\/jnw.10.9.512-520"},{"key":"1098_CR9","unstructured":"H Huang, H Al-Azzawi, H Brani, Network traffic anomaly detection. CoRR, abs\/1402.0856. (2014). http:\/\/arxiv.org\/abs\/1402.0856"},{"key":"1098_CR10","doi-asserted-by":"crossref","unstructured":"Y Yuan, K Jia, A distributed anomaly detection method of operation energy consumption using smart meter data. Paper presented at the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), Adelaide, Australia, 23\u201325 Sept. 2015.","DOI":"10.1109\/IIH-MSP.2015.38"},{"key":"1098_CR11","doi-asserted-by":"crossref","unstructured":"DL Goodman, J Hofmeister, R Wagoner, Advanced diagnostics and anomaly detection for railroad safety applications: using a wireless, IoT-enabled measurement system. Paper presented at the IEEE AUTOTESTCON, National Harbor, Maryland, 2\u20135 November 2015.","DOI":"10.1109\/AUTEST.2015.7356502"},{"key":"1098_CR12","doi-asserted-by":"crossref","unstructured":"DH Summerville, KM Zach, Y Chen, Ultra-lightweight deep packet anomaly detection for Internet of Things devices. Paper presented at the 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC), Nanjing, China, 14\u201316 December 2015.","DOI":"10.1109\/PCCC.2015.7410342"},{"issue":"3","key":"1098_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"V Chandola, A Banerjee, V Kumar, Anomaly detection: a survey. ACM Comput. Surv. 41(3), 1\u201358 (2009). https:\/\/doi.org\/10.1145\/1541880.1541882","journal-title":"ACM Comput. Surv."},{"issue":"1","key":"1098_CR14","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/2791120","volume":"48","author":"O Ibidunmoye","year":"2015","unstructured":"O Ibidunmoye, F Hernandez-Rodriguez, E Elmroth, Performance anomaly detection and bottleneck identification. ACM Comput. Surv. 48(1), 4\u201335 (2015). https:\/\/doi.org\/10.1145\/2791120","journal-title":"ACM Comput. Surv."},{"key":"1098_CR15","unstructured":"GEP Box, GM Jenkins, Time series analysis: forecasting and control, Revised Edition, (Holden-Day, San Francisco, 1976)."},{"key":"1098_CR16","unstructured":"R Hyndman, M O\u2019Hara-Wild, C Bergmeir, S Razbash, E Wang, forecast: Forecasting functions for time series and linear models. https:\/\/cran.rstudio.com\/web\/packages\/forecast\/ . Accessed 16 Apr 2018."},{"key":"1098_CR17","first-page":"1","volume-title":"IEEE Network Operations and Management Symposium (NOMS)","author":"G Ciocarlie","year":"2014","unstructured":"G Ciocarlie, U Lindqvist, K Nitz, S Novaczki, H Sanneck, in IEEE Network Operations and Management Symposium (NOMS). On the feasibility of deploying cell anomaly detection in operational cellular networks (2014), pp. 1\u20136"},{"key":"1098_CR18","doi-asserted-by":"publisher","unstructured":"M Szmit, A Szmit, Usage of modified Holt-Winters method in the anomaly detection of network traffic: case studies. J. Computer Networks Commun 2012 (2012). https:\/\/doi.org\/10.1155\/2012\/192913 .","DOI":"10.1155\/2012\/192913"},{"key":"1098_CR19","doi-asserted-by":"crossref","unstructured":"Steven K. Thompson, Sampling, Third Edition, (Wiley,Wiley Series in Probability and Statistics, 2012)","DOI":"10.1002\/9781118162934"},{"key":"1098_CR20","unstructured":"R Studio Core Team. R studio server download. https:\/\/www.rstudio.com\/products\/rstudio\/download-server-2\/ . Accessed 16 Apr 2018."},{"key":"1098_CR21","unstructured":"A Zeileis, G Grothendieck, JA Ryan, JM Ulrich, F Andrews, zoo: S3 infrastructure for regular and irregular time series (Z\u2019s ordered observations). https:\/\/cran.rstudio.com\/web\/packages\/zoo\/ . Accessed 16 Apr 2018."},{"key":"1098_CR22","unstructured":"H Wickham, W Chang, ggplot2: an implementation of the grammar of graphics. https:\/\/cran.rstudio.com\/web\/packages\/ggplot2\/ . Accessed 16 Apr 2018."},{"key":"1098_CR23","unstructured":"H Wickham, reshape: flexibly reshape data. https:\/\/cran.rstudio.com\/web\/packages\/reshape\/ . Accessed 16 Apr 2018."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-018-1098-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-018-1098-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-018-1098-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,16]],"date-time":"2019-10-16T01:38:44Z","timestamp":1571189924000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-018-1098-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,19]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["1098"],"URL":"https:\/\/doi.org\/10.1186\/s13638-018-1098-1","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2018,4,19]]},"assertion":[{"value":"5 September 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 April 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 April 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"82"}}