Big Data Analysis for Anomaly Detection in Telecommunication Using Clustering Techniques
暂无分享,去创建一个
[1] Engin Zeydan,et al. Anomaly Detection In Cellular Network Data Using Big Data Analytics , 2014 .
[2] Houbing Song,et al. Range of Influence and Impact of Physical Impairments in Long-Haul DWDM Systems , 2013, Journal of Lightwave Technology.
[3] Joel J. P. C. Rodrigues,et al. Anomaly detection using baseline and K-means clustering , 2010, SoftCOM 2010, 18th International Conference on Software, Telecommunications and Computer Networks.
[4] Danda B. Rawat,et al. Software Defined Networking Architecture, Security and Energy Efficiency: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[5] Jemal H. Abawajy,et al. Adaptive Computing-Plus-Communication Optimization Framework for Multimedia Processing in Cloud Systems , 2020, IEEE Transactions on Cloud Computing.
[6] Marco Fiore,et al. Classifying call profiles in large-scale mobile traffic datasets , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[7] Wenjia Li,et al. ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.
[8] Minas Gjoka,et al. On the Decomposition of Cell Phone Activity Patterns and their Connection with Urban Ecology , 2015, MobiHoc.
[9] Enzo Baccarelli,et al. Energy-Efficient Adaptive Resource Management for Real-Time Vehicular Cloud Services , 2019, IEEE Transactions on Cloud Computing.
[10] Enzo Baccarelli,et al. Distributed and adaptive resource management in Cloud-assisted Cognitive Radio Vehicular Networks with hard reliability guarantees , 2015, Veh. Commun..
[11] Faiez Zalila,et al. Model-Driven Elasticity Management with OCCI , 2019, IEEE Transactions on Cloud Computing.
[12] Víctor Soto,et al. Automated land use identification using cell-phone records , 2011, HotPlanet '11.
[13] Peter Steenkiste,et al. Network Anomaly Detection Using Co-clustering , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.
[14] Anil K. Jain,et al. Data clustering: a review , 1999, CSUR.
[15] Houbing Song,et al. Internet of Things and Big Data Analytics for Smart and Connected Communities , 2016, IEEE Access.
[16] Muhammad Ali Imran,et al. A SON solution for sleeping cell detection using low-dimensional embedding of MDT measurements , 2014, 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC).
[17] Danda B. Rawat,et al. Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[18] Zhihan Lv,et al. Empirical Analysis and Modeling of the Activity Dilemmas in Big Social Networks , 2017, IEEE Access.
[19] Mohiuddin Ahmed,et al. Clustering based semantic data summarization technique: A new approach , 2014, 2014 9th IEEE Conference on Industrial Electronics and Applications.
[20] Michael J. Maher,et al. An Investigation of Performance Analysis of Anomaly Detection Techniques for Big Data in SCADA Systems , 2015, EAI Endorsed Trans. Ind. Networks Intell. Syst..