{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:33:25Z","timestamp":1729658005103,"version":"3.28.0"},"reference-count":57,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T00:00:00Z","timestamp":1635120000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,25]]},"DOI":"10.23919\/cnsm52442.2021.9615525","type":"proceedings-article","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T20:30:34Z","timestamp":1638477034000},"page":"482-490","source":"Crossref","is-referenced-by-count":0,"title":["Network Problem Diagnostics using Typographic Error Correction"],"prefix":"10.23919","author":[{"given":"Martin","family":"Holkovic","sequence":"first","affiliation":[]},{"given":"Michal","family":"Bohus","sequence":"additional","affiliation":[]},{"given":"Ondrej","family":"Rysavy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1950.tb00463.x"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/321796.321811"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380200607"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30228-5_33"},{"key":"ref31","article-title":"Spelling correction using context","author":"elmi","year":"0","journal-title":"COLING 1998 Volume 1 The 17th International Conference on Computational Linguistics"},{"key":"ref30","first-page":"39","article-title":"Hanging on the metaphone","volume":"7","author":"philips","year":"1990","journal-title":"Computer Language"},{"key":"ref37","first-page":"707","article-title":"Binary codes capable of correcting deletions, insertions, and reversals","volume":"10","author":"levenshtein","year":"1966","journal-title":"Soviet Physics Doklady"},{"journal-title":"English Spelling and the Computer (Studies in Language Linguistics)","year":"1995","author":"mitton","key":"ref36"},{"key":"ref35","article-title":"Speech and Language Processing: An Introduction to Natural Language Processing","author":"jurafsky","year":"2009","journal-title":"Computational Linguistics and Speech Recognition"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/360825.360855"},{"journal-title":"Soundex phonetic comparison system","year":"1918","author":"odell","key":"ref28"},{"key":"ref27","first-page":"905","article-title":"A graph approach to spelling correction in domain-centric search","author":"bao","year":"0","journal-title":"Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics Human Language Technologies"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/358027.358048"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11107-011-0342-y"},{"key":"ref1","article-title":"Computer Network Failure and Solution","volume":"1","author":"han","year":"2018","journal-title":"Journal of Computer Hardware Engineering"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2019.00068"},{"key":"ref22","first-page":"2","article-title":"Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting","volume":"6","author":"wang","year":"2006","journal-title":"SRUTI"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M1233"},{"journal-title":"Classification for Selected Spell Checkers and Correctors Tech Rep","year":"0","author":"lianga","key":"ref24"},{"key":"ref23","first-page":"1","article-title":"Adaptive language independent spell checking using intelligent traverse on a tree","author":"qasemi zadeh","year":"0","journal-title":"2006 IEEE Conference on Cybernetics and Intelligent Systems"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(89)90099-X"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/359038.359041"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2007.50"},{"key":"ref51","article-title":"Spell checking","author":"hussain","year":"2013","journal-title":"Crulp Nuces Pakistan"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-5470-6_6"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_15"},{"key":"ref55","first-page":"3","article-title":"Application Error Detection in Networks by Protocol Behavior Model","author":"holkovi?","year":"2019","journal-title":"International Conference on E-Business and Telecommunications"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2321898"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.24200\/jonus.vol2iss1pp1-12"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174220"},{"key":"ref10","article-title":"Fuzzy based diagnostics system for identifying network traffic flow anomalies","author":"rudrusamy","year":"2013","journal-title":"ArXiv Preprint"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879202"},{"key":"ref40","article-title":"A. Comparison of methods Hamming Distance, Jaro, and Monge-Elkan","author":"angeles","year":"0","journal-title":"DBKDA 2015 the seventh international conference on advances in databases knowl-edge and data applications"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254759"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICETA.2018.8572067"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/NETWKS.2014.6959212"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/146370.146380"},{"journal-title":"An evaluation of the contextual spelling checker of microsoft office word 2007","year":"2008","author":"hirst","key":"ref16"},{"key":"ref17","article-title":"Ocr post-processing error correction algorithm using google online spelling suggestion","author":"youssef","year":"2012","journal-title":"ArXiv Preprint"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00079"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.53"},{"journal-title":"Network Analysis Using Wireshark Cookbook","year":"2013","author":"orzach","key":"ref4"},{"key":"ref3","article-title":"Survey on models and techniques for root-cause analysis","author":"sol\u00e9","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref6","first-page":"165","article-title":"Network troubleshooting: Survey, Taxonomy and Challenges","author":"van","year":"0","journal-title":"IEEE 2018 International Conference onSmart Communications in Network Technologies (SaCoNeT)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557562"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934910"},{"journal-title":"A survey on network troubleshooting","year":"2012","author":"zeng","key":"ref7"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-3021"},{"journal-title":"Including the Network View into Application Response Time Diagnostics using Netflow","year":"0","author":"k\u00f6gel","key":"ref9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1080\/00220973.2014.963213"},{"key":"ref45","first-page":"827","article-title":"Fast and Accurate Spelling Correction Using Trie and Damerau-levenshtein Distance Bigram","volume":"16","author":"rudy","year":"2018","journal-title":"TELKOMNIKA (Telecommunication Computing Electronics and Control)"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CIDM.2013.6597246"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1163\/9789004334441_012","article-title":"Improving a spelling checker for Afrikaans","author":"van zaanen","year":"2003","journal-title":"Computational Linguistics in the Netherlands 2002"},{"journal-title":"String Comparator Metrics and Enhanced Decision Rules in the Fellegi-Sunter Model of Record Linkage","year":"1990","author":"winkler","key":"ref42"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/363958.363994"},{"key":"ref44","article-title":"Sesotho sa leboa corpora","author":"dje hlt","year":"2006","journal-title":"private communication"},{"journal-title":"Birkbeck spelling error corpus","year":"1985","author":"mitton","key":"ref43"}],"event":{"name":"2021 17th International Conference on Network and Service Management (CNSM)","start":{"date-parts":[[2021,10,25]]},"location":"Izmir, Turkey","end":{"date-parts":[[2021,10,29]]}},"container-title":["2021 17th International Conference on Network and Service Management (CNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9615441\/9615442\/09615525.pdf?arnumber=9615525","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T14:43:59Z","timestamp":1699886639000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9615525\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,25]]},"references-count":57,"URL":"https:\/\/doi.org\/10.23919\/cnsm52442.2021.9615525","relation":{},"subject":[],"published":{"date-parts":[[2021,10,25]]}}}