Unsupervised Machine Learning for Networking: Techniques, Applications and Research Challenges

While machine learning and artificial intelligence have long been applied in networking research, the bulk of such works has focused on supervised learning. Recently, there has been a rising trend of employing unsupervised machine learning using unstructured raw network data to improve network performance and provide services, such as traffic engineering, anomaly detection, Internet traffic classification, and quality of service optimization. The growing interest in applying unsupervised learning techniques in networking stems from their great success in other fields, such as computer vision, natural language processing, speech recognition, and optimal control (e.g., for developing autonomous self-driving cars). In addition, unsupervised learning can unconstrain us from the need for labeled data and manual handcrafted feature engineering, thereby facilitating flexible, general, and automated methods of machine learning. The focus of this survey paper is to provide an overview of applications of unsupervised learning in the domain of networking. We provide a comprehensive survey highlighting recent advancements in unsupervised learning techniques, and describe their applications in various learning tasks, in the context of networking. We also provide a discussion on future directions and open research issues, while identifying potential pitfalls. While a few survey papers focusing on applications of machine learning in networking have previously been published, a survey of similar scope and breadth is missing in the literature. Through this timely review, we aim to advance the current state of knowledge, by carefully synthesizing insights from previous survey papers, while providing contemporary coverage of the recent advances and innovations.

[1]  Mahmood Yousefi-Azar,et al.  Autoencoder-based feature learning for cyber security applications , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).

[2]  Tao Li,et al.  Network Traffic Analysis Using Refined Bayesian Reasoning to Detect Flooding and Port Scan Attacks , 2008, 2008 International Conference on Advanced Computer Theory and Engineering.

[3]  Pierre Geurts,et al.  A machine learning approach to improve congestion control over wireless computer networks , 2004, Fourth IEEE International Conference on Data Mining (ICDM'04).

[4]  Dongwoon Lee Estimations of Principal Curves , 2002 .

[5]  F ROSENBLATT,et al.  The perceptron: a probabilistic model for information storage and organization in the brain. , 1958, Psychological review.

[6]  Wolfgang M. Hartmann,et al.  Dimension Reduction vs. Variable Selection , 2004, PARA.

[7]  Nicola Greggio,et al.  Anomaly Detection in IDSs by means of unsupervised greedy learning of finite mixture models , 2018, Soft Comput..

[8]  Yu-Lin He,et al.  Fuzziness based semi-supervised learning approach for intrusion detection system , 2017, Inf. Sci..

[9]  Sushanta Karmakar,et al.  Enhancing performance of anomaly based intrusion detection systems through dimensionality reduction using principal component analysis , 2016, 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS).

[10]  KimJong-Min,et al.  A load balancing scheme based on deep-learning in IoT , 2017 .

[11]  Akira Kato,et al.  Traffic Data Repository at the WIDE Project , 2000, USENIX Annual Technical Conference, FREENIX Track.

[12]  Nikita Shrivastava,et al.  Internet traffic data categorization using particle of swarm optimization algorithm , 2016, 2016 Symposium on Colossal Data Analysis and Networking (CDAN).

[13]  Nizar Grira,et al.  Unsupervised and Semi-supervised Clustering : a Brief Survey ∗ , 2004 .

[14]  Ketan Rajawat,et al.  Outlier-aware cooperative spectrum sensing in cognitive radio networks , 2015, Phys. Commun..

[15]  Slawomir Przylucki Assessment of the QoE in Voice Services Based on the Self-Organizing Neural Network Structure , 2011, CN.

[16]  Panagiotis Demestichas,et al.  Neural network-based learning schemes for cognitive radio systems , 2008, Comput. Commun..

[17]  Jun Zhang,et al.  Network Traffic Classification Using Correlation Information , 2013, IEEE Transactions on Parallel and Distributed Systems.

[18]  Rahim Tafazolli,et al.  Adaptive Clustering for Dynamic IoT Data Streams , 2017, IEEE Internet of Things Journal.

[19]  H. Sebastian Seung,et al.  Algorithms for Non-negative Matrix Factorization , 2000, NIPS.

[20]  Lalu Banoth,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .

[21]  Declan O'Sullivan,et al.  Machine learning as a service for enabling Internet of Things and People , 2016, Personal and Ubiquitous Computing.

[22]  Erkki Oja,et al.  Independent component analysis: algorithms and applications , 2000, Neural Networks.

[23]  Stephen Grossberg,et al.  Adaptive Resonance Theory , 2010, Encyclopedia of Machine Learning.

[24]  Xiaofei Wang,et al.  Artificial Intelligence-Based Techniques for Emerging Heterogeneous Network: State of the Arts, Opportunities, and Challenges , 2015, IEEE Access.

[25]  Ran Liu,et al.  Principal Component Analysis Based Network Traffic Classification , 2014, J. Comput..

[26]  Sridhar Ramaswamy,et al.  Efficient algorithms for mining outliers from large data sets , 2000, SIGMOD '00.

[27]  Anthony K. H. Tung,et al.  Ranking Outliers Using Symmetric Neighborhood Relationship , 2006, PAKDD.

[28]  Andrea Zanella,et al.  Data-driven QoE optimization techniques for multi-user wireless networks , 2015, 2015 International Conference on Computing, Networking and Communications (ICNC).

[29]  Tom Minka,et al.  A family of algorithms for approximate Bayesian inference , 2001 .

[30]  Junaid Qadir,et al.  Neural networks in wireless networks: Techniques, applications and guidelines , 2016, J. Netw. Comput. Appl..

[31]  Thierry Turletti,et al.  A Survey of Software-Defined Networking: Past, Present, and Future of Programmable Networks , 2014, IEEE Communications Surveys & Tutorials.

[32]  M. Köppen,et al.  The Curse of Dimensionality , 2010 .

[33]  Shikha Agrawal,et al.  A Survey on Feature Selection Techniques for Internet Traffic Classification , 2015, 2015 International Conference on Computational Intelligence and Communication Networks (CICN).

[34]  Geoffrey E. Hinton,et al.  Deep Boltzmann Machines , 2009, AISTATS.

[35]  Chih-Fong Tsai,et al.  CANN: An intrusion detection system based on combining cluster centers and nearest neighbors , 2015, Knowl. Based Syst..

[36]  Saverio Niccolini,et al.  Net2Vec: Deep Learning for the Network , 2017, Big-DAMA@SIGCOMM.

[37]  H. Vincent Poor,et al.  Reinforcement learning based distributed multiagent sensing policy for cognitive radio networks , 2011, 2011 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN).

[38]  R. Power CSI/FBI computer crime and security survey , 2001 .

[39]  Jung-Min Park,et al.  An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.

[40]  Anirban Mahanti,et al.  Traffic classification using clustering algorithms , 2006, MineNet '06.

[41]  Juha Karhunen,et al.  Chapter 7 – Unsupervised deep learning: A short review , 2015 .

[42]  Mohamed Eltoweissy,et al.  Big data and semantics management system for computer networks , 2017, Ad Hoc Networks.

[43]  Pedro M. Domingos A few useful things to know about machine learning , 2012, Commun. ACM.

[44]  Seiichi Uchida,et al.  A Comparative Evaluation of Unsupervised Anomaly Detection Algorithms for Multivariate Data , 2016, PloS one.

[45]  Thomas Hofmann,et al.  Greedy Layer-Wise Training of Deep Networks , 2007 .

[46]  Yee Whye Teh,et al.  Bayesian Nonparametric Models , 2010, Encyclopedia of Machine Learning.

[47]  Subhrakanti Dey,et al.  Power-Constrained Sparse Gaussian Linear Dimensionality Reduction Over Noisy Channels , 2014, IEEE Transactions on Signal Processing.

[48]  James A. Mahaffey,et al.  Multiple Self-Organizing Maps for Intrusion Detection , 2000 .

[49]  Nick Feamster,et al.  Why (and How) Networks Should Run Themselves , 2017, ANRW.

[50]  I K Fodor,et al.  A Survey of Dimension Reduction Techniques , 2002 .

[51]  Brett J. Borghetti,et al.  A Survey of Distance and Similarity Measures Used Within Network Intrusion Anomaly Detection , 2015, IEEE Communications Surveys & Tutorials.

[52]  Jie Cao,et al.  An accurate traffic classification model based on support vector machines , 2017, Int. J. Netw. Manag..

[53]  Hans-Peter Kriegel,et al.  LoOP: local outlier probabilities , 2009, CIKM.

[54]  Athanasios V. Vasilakos,et al.  IEEE Access Special Section Editorial: Artificial Intelligence Enabled Networking , 2015, IEEE Access.

[55]  Robert C. Atkinson,et al.  Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey , 2017, ArXiv.

[56]  Xiaohui Gu,et al.  UBL: unsupervised behavior learning for predicting performance anomalies in virtualized cloud systems , 2012, ICAC '12.

[57]  Ryan W. Thomas,et al.  Cognitive networks , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[58]  Hari Balakrishnan,et al.  TCP ex machina: computer-generated congestion control , 2013, SIGCOMM.

[59]  Nick Feamster,et al.  Improving network management with software defined networking , 2013, IEEE Commun. Mag..

[60]  Vyas Sekar,et al.  Unleashing the Potential of Data-Driven Networking , 2017, COMSNETS.

[61]  Richard Demo Souza,et al.  A Survey of Machine Learning Techniques Applied to Self-Organizing Cellular Networks , 2017, IEEE Communications Surveys & Tutorials.

[62]  Sofie Pollin,et al.  Distributed Deep Learning Models for Wireless Signal Classification with Low-Cost Spectrum Sensors , 2017, ArXiv.

[63]  BASIL AsSADHAN,et al.  Anomaly Detection Based on LRD Behavior Analysis of Decomposed Control and Data Planes Network Traffic Using SOSS and FARIMA Models , 2017, IEEE Access.

[64]  Morteza Amini,et al.  RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks , 2006, Comput. Secur..

[65]  Zhenyu Wen,et al.  Fog Orchestration for Internet of Things Services , 2017, IEEE Internet Computing.

[66]  Erol Gelenbe,et al.  Cognitive packet networks: QoS and performance , 2002, Proceedings. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems.

[67]  Guigang Zhang,et al.  Deep Learning , 2016, Int. J. Semantic Comput..

[68]  Decebal Constantin DEEP LEARNING FOR OBJECTIVE QUALITY ASSESSMENT OF 3D IMAGES , 2014 .

[69]  Heekuck Oh,et al.  Neural Networks for Pattern Recognition , 1993, Adv. Comput..

[70]  Vladimir A. Golovko,et al.  Joint Conference on Neural Networks , Orlando , Florida , USA , August 12-17 , 2007 Dimensionality Reduction and Attack Recognition using Neural Network Approaches , 2007 .

[71]  Simon Haykin,et al.  Neural Networks and Learning Machines , 2010 .

[72]  Muhammad Ali Imran,et al.  How 5G Wireless (and Concomitant Technologies) Will Revolutionize Healthcare? , 2017, Future Internet.

[73]  Li Wei,et al.  Network Traffic Classification Using K-means Clustering , 2007 .

[74]  M. Ishiguro Internet Threat Detection System Using Bayesian Estimation , 2004 .

[75]  Tapani Ristaniemi,et al.  Location accuracy impact on cell outage detection in LTE-A networks , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).

[76]  Max Mühlhäuser,et al.  Analyzing flow-based anomaly intrusion detection using Replicator Neural Networks , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).

[77]  Yoshua Bengio,et al.  Generative Adversarial Nets , 2014, NIPS.

[78]  Ahmad Y. Javaid,et al.  A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN) , 2016, EAI Endorsed Trans. Security Safety.

[79]  Leo Breiman,et al.  Statistical Modeling: The Two Cultures (with comments and a rejoinder by the author) , 2001 .

[80]  Junaid Qadir,et al.  Artificial intelligence based cognitive routing for cognitive radio networks , 2013, Artificial Intelligence Review.

[81]  Jean-Marie Bonnin,et al.  QoE-Aware Admission Control for Multimedia Applications in IEEE 802.11 Wireless Networks , 2008, 2008 IEEE 68th Vehicular Technology Conference.

[82]  Anthony McGregor,et al.  Flow Clustering Using Machine Learning Techniques , 2004, PAM.

[83]  Patrick D. McDaniel,et al.  Adversarial Perturbations Against Deep Neural Networks for Malware Classification , 2016, ArXiv.

[84]  S. Srinoy,et al.  Anomaly-Based Intrusion Detection using Fuzzy Rough Clustering , 2006, 2006 International Conference on Hybrid Information Technology.

[85]  Seiichi Uchida,et al.  Behavior Analysis Using Unsupervised Anomaly Detection , 2014 .

[86]  Lea Skorin-Kapov,et al.  Survey and Challenges of QoE Management Issues in Wireless Networks , 2013, J. Comput. Networks Commun..

[87]  Peter L ichodzijewski Dynamic Intrusion Detection Using Self-Organizing Maps , 2002 .

[88]  R.R. Selmic,et al.  Wireless Sensor Network Modeling Using Modified Recurrent Neural Networks: Application to Fault Detection , 2008, 2007 IEEE International Conference on Networking, Sensing and Control.

[89]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[90]  Ciprian Dobre,et al.  Internet traffic classification based on flows' statistical properties with machine learning , 2017, Int. J. Netw. Manag..

[91]  Philippe Owezarski,et al.  Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge , 2012, Comput. Commun..

[92]  D. Janakiram,et al.  Outlier Detection in Wireless Sensor Networks using Bayesian Belief Networks , 2006, 2006 1st International Conference on Communication Systems Software & Middleware.

[93]  Julie Josse,et al.  Selecting the number of components in principal component analysis using cross-validation approximations , 2012, Comput. Stat. Data Anal..

[94]  Jürgen Schmidhuber,et al.  Unsupervised Learning in LSTM Recurrent Neural Networks , 2001, ICANN.

[95]  Yun Li,et al.  Internet traffic classification based on Min-Max Ensemble Feature Selection , 2016, 2016 International Joint Conference on Neural Networks (IJCNN).

[96]  Joshua M. Lewis,et al.  Divvy: fast and intuitive exploratory data analysis , 2013, J. Mach. Learn. Res..

[97]  Xiangxu Meng,et al.  SDNForensics: A Comprehensive Forensics Framework for Software Defined Network , 2016 .

[98]  Timothy J. O'Shea,et al.  Deep Learning Based MIMO Communications , 2017, ArXiv.

[99]  I. Sumaiya Thaseen,et al.  Intrusion detection model using fusion of PCA and optimized SVM , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).

[100]  Amutha Prabakar Muniyandi,et al.  Network Anomaly Detection by Cascading K-Means Clustering and C4.5 Decision Tree algorithm , 2012 .

[101]  Tohari Ahmad,et al.  Increasing performance of IDS by selecting and transforming features , 2016, 2016 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT).

[102]  Nabin Kumar Karn,et al.  Network Traffic Classification techniques and comparative analysis using Machine Learning algorithms , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).

[103]  Howard M. Schwartz,et al.  Multi-Agent Machine Learning: A Reinforcement Approach , 2014 .

[104]  Yaniv Ben-Itzhak,et al.  Cluster-Based Load Balancing for Better Network Security , 2017, Big-DAMA@SIGCOMM.

[105]  Andreas Spanias,et al.  Integrating machine learning in embedded sensor systems for Internet-of-Things applications , 2016, 2016 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT).

[106]  Kok-Lim Alvin Yau,et al.  QoS in IEEE 802.11-based wireless networks: A contemporary review , 2014, J. Netw. Comput. Appl..

[107]  S. Rabe-Hesketh,et al.  Latent Variable Modelling: A Survey * , 2007 .

[108]  Quoc V. Le,et al.  On optimization methods for deep learning , 2011, ICML.

[109]  Shengnan Hao,et al.  Improved EM method for internet traffic classification , 2016, 2016 8th International Conference on Knowledge and Smart Technology (KST).

[110]  Luís Bernardo,et al.  Machine Learning in Software Defined Networks: Data collection and traffic classification , 2016, 2016 IEEE 24th International Conference on Network Protocols (ICNP).

[111]  Qiang Ni,et al.  Application of reinforcement learning for security enhancement in cognitive radio networks , 2015, Appl. Soft Comput..

[112]  C.J. Debono,et al.  Increasing wireless sensor network lifetime through the application of SOM neural networks , 2008, 2008 3rd International Symposium on Communications, Control and Signal Processing.

[113]  Francine Krief,et al.  Power Control and Clustering in Wireless Sensor Networks , 2005, Med-Hoc-Net.

[114]  Moses Garuba,et al.  Big Data Analytics for User-Activity Analysis and User-Anomaly Detection in Mobile Wireless Network , 2017, IEEE Transactions on Industrial Informatics.

[115]  A. Mellouk,et al.  Empirical study based on machine learning approach to assess the QoS/QoE correlation , 2012, 2012 17th European Conference on Networks and Optical Communications.

[116]  Muhammad Ali Imran,et al.  Fuzzy Q-learning-based user-centric backhaul-aware user cell association scheme , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[117]  Josh Petersen,et al.  Modulation recognition using hierarchical deep neural networks , 2017, 2017 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN).

[118]  Rajendra Patrikar,et al.  Improving Life Time of Wireless Sensor Networks Using Neural N etwork Based Classification Techniques With Cooperative Routing , 2008 .

[119]  James R. Foulds,et al.  A Dynamic Relational Infinite Feature Model for Longitudinal Social Networks , 2011, AISTATS.

[120]  Honglak Lee,et al.  An Analysis of Single-Layer Networks in Unsupervised Feature Learning , 2011, AISTATS.

[121]  Huang Chuanhe,et al.  Anomaly detection using Support Vector Machine classification with k-Medoids clustering , 2012, 2012 Third Asian Himalayas International Conference on Internet.

[122]  A. Vinaya Babu,et al.  A Fuzzy Approach for Feature Evaluation and Dimensionality Reduction to Improve the Quality of Web Usage Mining Results , 2015, ArXiv.

[123]  Cem Ersoy,et al.  Multiple sink network design problem in large scale wireless sensor networks , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[124]  Simon Haykin,et al.  Bayesian sequential state estimation for MIMO wireless communications , 2004, Proceedings of the IEEE.

[125]  Christopher M. Bishop,et al.  GTM: The Generative Topographic Mapping , 1998, Neural Computation.

[126]  Kandarpa Kumar Sarma,et al.  Self-Organization and Optimization in Heterogenous Networks , 2017 .

[127]  Bogdan V. Ghita,et al.  On Internet Traffic Classification: A Two-Phased Machine Learning Approach , 2016, J. Comput. Networks Commun..

[128]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.

[129]  Martin P. Loeb,et al.  CSI/FBI Computer Crime and Security Survey , 2004 .

[130]  Nei Kato,et al.  The Deep Learning Vision for Heterogeneous Network Traffic Control: Proposal, Challenges, and Future Perspective , 2017, IEEE Wireless Communications.

[131]  T. Hastie,et al.  Principal Curves , 2007 .

[132]  Ali Imran,et al.  Fault prediction and reliability analysis in a real cellular network , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[133]  Symeon Papavassiliou,et al.  Hierarchical Anomaly Detection in Distributed Large-Scale Sensor Networks , 2006, 11th IEEE Symposium on Computers and Communications (ISCC'06).

[134]  Li Deng,et al.  A tutorial survey of architectures, algorithms, and applications for deep learning , 2014, APSIPA Transactions on Signal and Information Processing.

[135]  Sudharman K. Jayaweera,et al.  Distributed Reinforcement Learning based MAC protocols for autonomous cognitive secondary users , 2011, 2011 20th Annual Wireless and Optical Communications Conference (WOCC).

[136]  Shane Legg,et al.  Human-level control through deep reinforcement learning , 2015, Nature.

[137]  Timothy J. O'Shea,et al.  Unsupervised representation learning of structured radio communication signals , 2016, 2016 First International Workshop on Sensing, Processing and Learning for Intelligent Machines (SPLINE).

[138]  Alexander Gammerman,et al.  Conformal Clustering and Its Application to Botnet Traffic , 2015, SLDS.

[139]  Chunlin Zhang,et al.  Intrusion detection using hierarchical neural networks , 2005, Pattern Recognit. Lett..

[140]  Ming Zhang,et al.  Convolutional Neural Networks for Automatic Cognitive Radio Waveform Recognition , 2017, IEEE Access.

[141]  Andrew G. Barto,et al.  Optimal learning: computational procedures for bayes-adaptive markov decision processes , 2002 .

[142]  Marco Fiore,et al.  Joint spatial and temporal classification of mobile traffic demands , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[143]  Hamed Haddadi,et al.  A Hybrid Deep Learning Architecture for Privacy-Preserving Mobile Analytics , 2017, IEEE Internet of Things Journal.

[144]  Roberto Battiti,et al.  Identifying intrusions in computer networks with principal component analysis , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[145]  Mohammad Hossein Sarshar Analyzing Large Scale Wi-Fi Data Using Supervised and Unsupervised Learning Techniques , 2017 .

[146]  Mehdi Bennis,et al.  A transfer learning approach for cache-enabled wireless networks , 2015, 2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).

[147]  Marco Fiore,et al.  Not All Apps Are Created Equal: Analysis of Spatiotemporal Heterogeneity in Nationwide Mobile Service Usage , 2017, CoNEXT.

[148]  Mohiuddin Ahmed,et al.  A survey of network anomaly detection techniques , 2016, J. Netw. Comput. Appl..

[149]  Jian Tang,et al.  Enhancing Effectiveness of Outlier Detections for Low Density Patterns , 2002, PAKDD.

[150]  taylan. cemgil,et al.  Bayesian Nonparametric Clustering of Network Traffic Data , 2011 .

[151]  Shan Suthaharan,et al.  Big data classification: problems and challenges in network intrusion prediction with machine learning , 2014, PERV.

[152]  Parvez Ahammad,et al.  QoE-driven Unsupervised Image Categorization for Optimized Web Delivery: Short Paper , 2014, ACM Multimedia.

[153]  Renata Teixeira,et al.  Traffic classification on the fly , 2006, CCRV.

[154]  Lisandro Zambenedetti Granville,et al.  ATLANTIC: A framework for anomaly traffic detection, classification, and mitigation in SDN , 2016, NOMS.

[155]  Carl Doersch,et al.  Tutorial on Variational Autoencoders , 2016, ArXiv.

[156]  Hui Xiong,et al.  Effective and Real-time In-App Activity Analysis in Encrypted Internet Traffic Streams , 2017, KDD.

[157]  Jürgen Schmidhuber,et al.  Deep learning in neural networks: An overview , 2014, Neural Networks.

[158]  Jugal K. Kalita,et al.  Network Anomaly Detection: Methods, Systems and Tools , 2014, IEEE Communications Surveys & Tutorials.

[159]  Dirk Grunwald,et al.  Using Bipartite Anomaly Features for Cyber Security Applications , 2015, 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA).

[160]  Zhe Chen,et al.  SVM and Dimensionality Reduction in Cognitive Radio with Experimental Validation , 2011, ArXiv.

[161]  Zahir Tari,et al.  Dimensionality Reduction for Intrusion Detection Systems in Multi-data Streams—A Review and Proposal of Unsupervised Feature Selection Scheme , 2017 .

[162]  Miguel Nicolau,et al.  A Hybrid Autoencoder and Density Estimation Model for Anomaly Detection , 2016, PPSN.

[163]  Li Pan,et al.  Real-Time Traffic Status Classification Based on Gaussian Mixture Model , 2016, 2016 IEEE First International Conference on Data Science in Cyberspace (DSC).

[164]  Muhammad Ali Imran,et al.  Challenges in 5G: how to empower SON with big data for enabling 5G , 2014, IEEE Network.

[165]  Sofie Pollin,et al.  Deep Learning Models for Wireless Signal Classification With Distributed Low-Cost Spectrum Sensors , 2017, IEEE Transactions on Cognitive Communications and Networking.

[166]  Timothy J. O'Shea,et al.  An Introduction to Machine Learning Communications Systems , 2017, ArXiv.

[167]  Victor C. M. Leung,et al.  A novel cooperative communication protocol for QoS provisioning in wireless sensor networks , 2009, 2009 5th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities and Workshops.

[168]  G. Narsimha,et al.  A FEATURE CLUSTERING BASED DIMENSIONALITY REDUCTION FOR INTRUSION DETECTION ( FCBDR ) , 2017 .

[169]  Di Wu,et al.  IoT Data Analytics Using Deep Learning , 2017, ArXiv.

[170]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[171]  Carl K. Chang,et al.  Bayesian Model Averaging of Bayesian Network Classifiers for Intrusion Detection , 2014, 2014 IEEE 38th International Computer Software and Applications Conference Workshops.

[172]  Meng Jianliang,et al.  The Application on Intrusion Detection Based on K-means Cluster Algorithm , 2009, 2009 International Forum on Information Technology and Applications.

[173]  Judith Kelner,et al.  Multi-objective optimization of a hybrid model for network traffic classification by combining machine learning techniques , 2014, 2014 International Joint Conference on Neural Networks (IJCNN).

[174]  Carey L. Williamson,et al.  Offline/realtime traffic classification using semi-supervised learning , 2007, Perform. Evaluation.

[175]  Nobuo Kawaguchi,et al.  Bayesian based location estimation system using wireless LAN , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[176]  Wei-Yang Lin,et al.  Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..

[177]  Marc'Aurelio Ranzato,et al.  Efficient Learning of Sparse Representations with an Energy-Based Model , 2006, NIPS.

[178]  Peter Steenkiste,et al.  Network Anomaly Detection Using Co-clustering , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.

[179]  Victor C. M. Leung,et al.  MRL-CC: a novel cooperative communication protocol for QoS provisioning in wireless sensor networks , 2010, Int. J. Sens. Networks.

[180]  Jaideep Chandrashekar,et al.  Mixture models of endhost network traffic , 2012, 2013 Proceedings IEEE INFOCOM.

[181]  Bernhard Rinner,et al.  Resource coordination in wireless sensor networks by cooperative reinforcement learning , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.

[182]  Peter Dayan,et al.  Q-learning , 1992, Machine Learning.

[183]  Shu Yang,et al.  A survey on application of machine learning for Internet of Things , 2018, International Journal of Machine Learning and Cybernetics.

[184]  Shui Yu,et al.  Network Traffic Prediction Based on Deep Belief Network in Wireless Mesh Backbone Networks , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).

[185]  Mahdi Jafari Siavoshani,et al.  Deep packet: a novel approach for encrypted traffic classification using deep learning , 2017, Soft Computing.

[186]  Nei Kato,et al.  Routing or Computing? The Paradigm Shift Towards Intelligent Computer Network Packet Transmission Based on Deep Learning , 2017, IEEE Transactions on Computers.

[187]  J. Tenenbaum,et al.  A global geometric framework for nonlinear dimensionality reduction. , 2000, Science.

[188]  Z. Albataineh,et al.  New Blind Multiuser Detection in DS-CDMA Based on Extension of Efficient Fast Independent Component Analysis (EF-ICA) , 2013, 2013 4th International Conference on Intelligent Systems, Modelling and Simulation.

[189]  Andreas Dengel,et al.  Histogram-based Outlier Score (HBOS): A fast Unsupervised Anomaly Detection Algorithm , 2012 .

[190]  Lee Luan Ling,et al.  A Neural Architecture Based on the Adaptive Resonant Theory and Recurrent Neural Networks , 2007, Int. J. Comput. Sci. Appl..

[191]  Liu Zhen,et al.  A New Feature Selection Method for Internet Traffic Classification Using ML , 2012 .

[192]  Rui Xu,et al.  Survey of clustering algorithms , 2005, IEEE Transactions on Neural Networks.

[193]  E A Leicht,et al.  Mixture models and exploratory analysis in networks , 2006, Proceedings of the National Academy of Sciences.

[194]  Lorenza Giupponi,et al.  From 4G to 5G: Self-organized Network Management meets Machine Learning , 2017, Comput. Commun..

[195]  J. Erman,et al.  QRP05-4: Internet Traffic Identification using Machine Learning , 2006, IEEE Globecom 2006.

[196]  Vern Paxson,et al.  Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.

[197]  Manoj Kumar Putchala Deep Learning Approach for Intrusion Detection System (IDS) in the Internet of Things (IoT) Network using Gated Recurrent Neural Networks (GRU) , 2017 .

[198]  Yoshua. Bengio,et al.  Learning Deep Architectures for AI , 2007, Found. Trends Mach. Learn..

[199]  Yuefeng Ji,et al.  Early traffic identification using Bayesian networks , 2010, 2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content.

[200]  Christian Haas,et al.  Anomaly Detection in Industrial Networks using Machine Learning: A Roadmap , 2016, ML4CPS.

[201]  Xiaojiang Du,et al.  A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security , 2018, IEEE Communications Surveys & Tutorials.

[202]  Geoffrey E. Hinton,et al.  Deep Learning , 2015, Nature.

[203]  Siti Zaiton Mohd Hashim,et al.  Cluster Analysis on High-Dimensional Data: A Comparison of Density-based Clustering Algorithms , 2013 .

[204]  Slawomir Stanczak,et al.  Network State Awareness and Proactive Anomaly Detection in Self-Organizing Networks , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).

[205]  Adi Suryaputra Paramita,et al.  Clustering and Feature Selection Technique for Improving Internet Traffic Classification Using K-NN , 2016 .

[206]  Cherukuri Aswani Kumar,et al.  Improving Accuracy of Intrusion Detection Model Using PCA and optimized SVM , 2016, J. Comput. Inf. Technol..

[207]  A.N. Zincir-Heywood,et al.  On the capability of an SOM based intrusion detection system , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..

[208]  Satinder Singh,et al.  Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters , 2005, ACSC.

[209]  Grenville J. Armitage,et al.  Clustering to Assist Supervised Machine Learning for Real-Time IP Traffic Classification , 2008, 2008 IEEE International Conference on Communications.

[210]  Huang Chuanhe,et al.  Anomaly Based Intrusion Detection Using Hybrid Learning Approach of Combining k-Medoids Clustering and Naïve Bayes Classification , 2012, 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing.

[211]  Philippe Massonet,et al.  End-To-End Security Architecture for Federated Cloud and IoT Networks , 2017, 2017 IEEE International Conference on Smart Computing (SMARTCOMP).

[212]  Yee Whye Teh,et al.  A Fast Learning Algorithm for Deep Belief Nets , 2006, Neural Computation.

[213]  Emin Anarim,et al.  An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks , 2005, Expert Syst. Appl..

[214]  Jun Yang,et al.  Improved traffic detection with support vector machine based on restricted Boltzmann machine , 2017, Soft Comput..

[215]  Keping Long,et al.  On Swarm Intelligence Inspired Self-Organized Networking: Its Bionic Mechanisms, Designing Principles and Optimization Approaches , 2014, IEEE Communications Surveys & Tutorials.

[216]  Ali Gökhan Yavuz,et al.  Network Anomaly Detection with Stochastically Improved Autoencoder Based Models , 2017, 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud).

[217]  Mo Adda,et al.  Comparative Analysis of Clustering Techniques in Network Traffic Faults Classification , 2017 .

[218]  Jamil Salem Barbar,et al.  Computer network traffic prediction: a comparison between traditional and deep learning neural networks , 2015, Int. J. Big Data Intell..

[219]  James R. Foulds,et al.  Latent Set Models for Two-Mode Network Data , 2011, ICWSM.

[220]  Hwee Pink Tan,et al.  Toward a robust sparse data representation for wireless sensor networks , 2015, 2015 IEEE 40th Conference on Local Computer Networks (LCN).

[221]  Leonardo Badia,et al.  Cognition-based networks: Applying cognitive science to multimedia wireless networking , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.

[222]  V. Rao Vemuri,et al.  An application of principal component analysis to the detection and visualization of computer network attacks , 2006, Ann. des Télécommunications.

[223]  João Cesar M. Mota,et al.  Condition monitoring of 3G cellular networks through competitive neural models , 2005, IEEE Transactions on Neural Networks.

[224]  Taghi M. Khoshgoftaar,et al.  CLUSTERING-BASED NETWORK INTRUSION DETECTION , 2007 .

[225]  Muttukrishnan Rajarajan,et al.  A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..

[226]  Johan Tordsson,et al.  An unsupervised approach to online noisy-neighbor detection in cloud data centers , 2017, Expert Syst. Appl..

[227]  Christopher Leckie,et al.  High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning , 2016, Pattern Recognit..

[228]  Huan Liu,et al.  Feature Selection for High-Dimensional Data: A Fast Correlation-Based Filter Solution , 2003, ICML.

[229]  Dau-Cheng Lyu,et al.  Multi-style learning with denoising autoencoders for acoustic modeling in the internet of things (IoT) , 2017, Comput. Speech Lang..

[230]  Ian Marsh A lightweight measurement platform for home internet monitoring , 2017, 2017 IFIP Networking Conference (IFIP Networking) and Workshops.

[231]  Xiangliang Zhang,et al.  Fast intrusion detection based on a non-negative matrix factorization model , 2009, J. Netw. Comput. Appl..

[232]  Jakob Hoydis,et al.  An Introduction to Deep Learning for the Physical Layer , 2017, IEEE Transactions on Cognitive Communications and Networking.

[233]  Komal Ramteke,et al.  Intrusion Detection System for Cloud Network Using FC-ANN Algorithm , 2013 .

[234]  Tapani Ristaniemi,et al.  An Approach for Network Outage Detection from Drive-Testing Databases , 2012, J. Comput. Networks Commun..

[235]  Sergio M. Savaresi,et al.  Unsupervised learning techniques for an intrusion detection system , 2004, SAC '04.

[236]  S T Roweis,et al.  Nonlinear dimensionality reduction by locally linear embedding. , 2000, Science.

[237]  Emile H. L. Aarts,et al.  Boltzmann machines , 1998 .

[238]  Danco Davcev,et al.  Application of wavelet neural-networks in wireless sensor networks , 2005, Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Network.

[239]  Rastko R. Selmic,et al.  Wireless Sensor Network Modeling Using Modified Recurrent Neural Networks: Application to Fault Detection , 2008, IEEE Transactions on Instrumentation and Measurement.

[240]  Andrea Zanella,et al.  A machine learning approach to QoE-based video admission control and resource allocation in wireless systems , 2014, 2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET).

[241]  Charless C. Fowlkes,et al.  Do We Need More Training Data? , 2015, International Journal of Computer Vision.

[242]  Grenville J. Armitage,et al.  A survey of techniques for internet traffic classification using machine learning , 2008, IEEE Communications Surveys & Tutorials.

[243]  Seemab Latif,et al.  Handling intrusion and DDoS attacks in Software Defined Networks using machine learning techniques , 2014, 2014 National Software Engineering Conference.

[244]  Subscribers Only A SOM and PNN Model for Network Traffic Classification , 2017 .

[245]  Tatsuya Morita,et al.  Traffic Anomaly Detection Based on Robust Principal Component Analysis Using Periodic Traffic Behavior , 2017, IEICE Trans. Commun..

[246]  Matthew J. Beal Variational algorithms for approximate Bayesian inference , 2003 .

[247]  Zengyou He,et al.  Discovering cluster-based local outliers , 2003, Pattern Recognit. Lett..

[248]  Timo D. Hämäläinen,et al.  Artificial Immune System Based Intrusion Detection: Innate Immunity using an Unsupervised Learning Approach , 2014 .

[249]  Jing Xu,et al.  Continuous Time Bayesian Networks for Host Level Network Intrusion Detection , 2008, ECML/PKDD.

[250]  Ying Tan,et al.  Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN , 2017, DMBD.

[251]  Junaid Qadir,et al.  SDNs, Clouds, and Big Data: New Opportunities , 2014, 2014 12th International Conference on Frontiers of Information Technology.

[252]  Jakub Lokoc,et al.  k-NN Classification of Malware in HTTPS Traffic Using the Metric Space Approach , 2016, PAISI.

[253]  Amir Hussain,et al.  Comparing Oversampling Techniques to Handle the Class Imbalance Problem: A Customer Churn Prediction Case Study , 2016, IEEE Access.

[254]  Xin Xu,et al.  An Adaptive Network Intrusion Detection Method Based on PCA and Support Vector Machines , 2005, ADMA.

[255]  Oriol Sallent,et al.  Distributed spectrum management based on reinforcement learning , 2009, 2009 4th International Conference on Cognitive Radio Oriented Wireless Networks and Communications.

[256]  Guido Maier,et al.  Identification of tidal-traffic patterns in metro-area mobile networks via Matrix Factorization based model , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[257]  Peter Richtárik,et al.  Federated Learning: Strategies for Improving Communication Efficiency , 2016, ArXiv.

[258]  Mohsen Guizani,et al.  Software-Defined-Networking-Enabled Traffic Anomaly Detection and Mitigation , 2017, IEEE Internet of Things Journal.

[259]  Dit-Yan Yeung,et al.  Towards Bayesian Deep Learning: A Survey , 2016, ArXiv.

[260]  Ing-Ray Chen,et al.  A survey of intrusion detection in wireless network applications , 2014, Comput. Commun..

[261]  Shaoning Pang,et al.  Towards Early Detection of Novel Attack Patterns through the Lens of a Large-Scale Darknet , 2016, 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld).

[262]  Qiang Yang,et al.  A Survey on Transfer Learning , 2010, IEEE Transactions on Knowledge and Data Engineering.

[263]  Amit P. Sheth,et al.  Machine learning for Internet of Things data analysis: A survey , 2017, Digit. Commun. Networks.

[264]  Muhammad Ali Imran,et al.  A Survey of Self Organisation in Future Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.

[265]  M. Hefeeda,et al.  Probabilistic Coverage in Wireless Sensor Networks , 2007 .

[266]  Alfred O. Hero,et al.  Manifold learning visualization of network traffic data , 2005, MineNet '05.

[267]  William H. Robinson,et al.  Using semi-supervised machine learning to address the Big Data problem in DNS networks , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).

[268]  Ljiljana Trajkovic,et al.  Feature selection for classification of BGP anomalies using Bayesian models , 2012, 2012 International Conference on Machine Learning and Cybernetics.

[269]  José Alberto Hernández,et al.  Weibull mixture model to characterise end-to-end Internet delay at coarse time-scales , 2006 .

[270]  Josep Mangues-Bafalluy,et al.  A Mobile Network Planning Tool Based on Data Analytics , 2017, Mob. Inf. Syst..

[271]  Zhu Han,et al.  Self-Organization in Small Cell Networks: A Reinforcement Learning Approach , 2013, IEEE Transactions on Wireless Communications.

[272]  Wei Wu,et al.  Efficient and robust feature extraction and selection for traffic classification , 2017, Comput. Networks.

[273]  Raouf Boutaba,et al.  A comprehensive survey on machine learning for networking: evolution, applications and research opportunities , 2018, Journal of Internet Services and Applications.

[274]  Masoud Nikravesh,et al.  Feature Extraction - Foundations and Applications , 2006, Feature Extraction.

[275]  Tapani Ristaniemi,et al.  Advanced ICA-based receivers for block fading DS-CDMA channels , 2002, Signal Process..

[276]  Vir V. Phoha,et al.  K-Means+ID3: A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 Decision Tree Learning Methods , 2007, IEEE Transactions on Knowledge and Data Engineering.

[277]  Brian Hutchinson,et al.  Deep Learning for Unsupervised Insider Threat Detection in Structured Cybersecurity Data Streams , 2017, AAAI Workshops.

[278]  Mohamad Malli,et al.  A New Model for Rating Users' Profiles in Online Social Networks , 2017, Comput. Inf. Sci..

[279]  Wei Zhang,et al.  A Trust Based Framework for Secure Data Aggregation in Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[280]  Yunsi Fei,et al.  QELAR: A Machine-Learning-Based Adaptive Routing Protocol for Energy-Efficient and Lifetime-Extended Underwater Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[281]  Honglak Lee,et al.  Convolutional deep belief networks for scalable unsupervised learning of hierarchical representations , 2009, ICML '09.

[282]  J. Kruskal Nonmetric multidimensional scaling: A numerical method , 1964 .

[283]  Pavel Berkhin,et al.  A Survey of Clustering Data Mining Techniques , 2006, Grouping Multidimensional Data.

[284]  Muhammad Ali Imran,et al.  A learning‐based approach for autonomous outage detection and coverage optimization , 2016, Trans. Emerg. Telecommun. Technol..

[285]  Stefano Zanero,et al.  Analyzing TCP Traffic Patterns Using Self Organizing Maps , 2005, ICIAP.

[286]  Yu-Jin Zhang,et al.  Nonnegative Matrix Factorization: A Comprehensive Review , 2013, IEEE Transactions on Knowledge and Data Engineering.

[287]  Ian H. Witten,et al.  WEKA: a machine learning workbench , 1994, Proceedings of ANZIIS '94 - Australian New Zealnd Intelligent Information Systems Conference.

[288]  Kao-Shing Hwang,et al.  Cooperative multiagent congestion control for high-speed networks , 2005, IEEE Trans. Syst. Man Cybern. Part B.

[289]  Sudharman K. Jayaweera,et al.  A Survey on Machine-Learning Techniques in Cognitive Radios , 2013, IEEE Communications Surveys & Tutorials.

[290]  Pavel Pudil,et al.  Novel Methods for Feature Subset Selection with Respect to Problem Knowledge , 1998 .

[291]  Luis Gravano,et al.  k-Shape: Efficient and Accurate Clustering of Time Series , 2016, SGMD.

[292]  Zhihan Lv,et al.  Modeling network traffic for traffic matrix estimation and anomaly detection based on Bayesian network in cloud computing networks , 2017, Ann. des Télécommunications.

[293]  Jemal H. Abawajy,et al.  Federated Internet of Things and Cloud Computing Pervasive Patient Health Monitoring System , 2017, IEEE Communications Magazine.

[294]  Grenville Armitage,et al.  BGP Anomaly Detection Techniques: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[295]  Xin Jin,et al.  Partitional Clustering , 2021, Encyclopedia of Machine Learning.

[296]  M. Bahrololum,et al.  Anomaly Intrusion Detection System Using Gaussian Mixture Model , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.

[297]  Guoqiang Peter Zhang,et al.  Avoiding Pitfalls in Neural Network Research , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[298]  Khalid Chougdali,et al.  Network intrusion detection system using L1-norm PCA , 2015, IAS.

[299]  Klaus-Robert Müller,et al.  Interpretable deep neural networks for single-trial EEG classification , 2016, Journal of Neuroscience Methods.

[300]  Juan M. Corchado,et al.  Deep neural networks and transfer learning applied to multimedia web mining , 2017, DCAI.

[301]  Muhammad Ali Imran,et al.  Data-driven analytics for automated cell outage detection in Self-Organizing Networks , 2015, 2015 11th International Conference on the Design of Reliable Communication Networks (DRCN).

[302]  Geoffrey E. Hinton,et al.  Visualizing Data using t-SNE , 2008 .

[303]  Teuvo Kohonen,et al.  The self-organizing map , 1990, Neurocomputing.

[304]  Sebastian Zander,et al.  Automated traffic classification and application identification using machine learning , 2005, The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l.

[305]  David West,et al.  A comparison of SOM neural network and hierarchical clustering methods , 1996 .

[306]  John Woods,et al.  Survey on QoE\QoS Correlation Models For Multimedia Services , 2013, ArXiv.

[307]  Dewan Md. Farid,et al.  Application of Machine Learning Approaches in Intrusion Detection System: A Survey , 2015 .

[308]  Ming Zhu,et al.  Malware traffic classification using convolutional neural network for representation learning , 2017, 2017 International Conference on Information Networking (ICOIN).

[309]  Petri Mähönen,et al.  Neural Wireless Sensor Networks , 2006, 2006 International Conference on Systems and Networks Communications (ICSNC'06).

[310]  Tafsir Thiam,et al.  The Boltzmann machine , 1999, IJCNN'99. International Joint Conference on Neural Networks. Proceedings (Cat. No.99CH36339).

[311]  Li Tu,et al.  Density-based clustering for real-time stream data , 2007, KDD '07.

[312]  Anil K. Jain,et al.  Unsupervised Learning of Finite Mixture Models , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[313]  Junaid Qadir,et al.  Artificial Intelligence as an Enabler for Cognitive Self-Organizing Future Networks , 2017, ArXiv.

[314]  Andrew W. Moore,et al.  Distributed Value Functions , 1999, ICML.

[315]  Haikady N. Nagaraja,et al.  Inference in Hidden Markov Models , 2006, Technometrics.

[316]  Philippe Owezarski,et al.  Hunting attacks in the dark: clustering and correlation analysis for unsupervised anomaly detection , 2015, Int. J. Netw. Manag..

[317]  Nagarajan Kandasamy,et al.  A New Approach to Dimensionality Reduction for Anomaly Detection in Data Traffic , 2016, IEEE Transactions on Network and Service Management.

[318]  Bu-Sung Lee,et al.  A novel anomaly detection system using feature-based MSPCA with sketch , 2017, 2017 26th Wireless and Optical Communication Conference (WOCC).

[319]  Xi Chen,et al.  Scalable Bayesian Modeling, Monitoring, and Analysis of Dynamic Network Flow Data , 2016, 1607.02655.

[320]  M. Veloso,et al.  Latent Variable Models , 2019, Statistical and Econometric Methods for Transportation Data Analysis.

[321]  Ahmet Kondoz,et al.  Radio Frequency Traffic Classification Over WLAN , 2017, IEEE/ACM Transactions on Networking.

[322]  Sherali Zeadally,et al.  Real-time QoE prediction for multimedia applications in Wireless Mesh Networks , 2012, 2012 IEEE Consumer Communications and Networking Conference (CCNC).

[323]  Hwee Pink Tan,et al.  Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications , 2014, IEEE Communications Surveys & Tutorials.

[324]  S.K. Panda,et al.  Fuzzy C-Means clustering protocol for Wireless Sensor Networks , 2010, 2010 IEEE International Symposium on Industrial Electronics.

[325]  Razvan Pascanu,et al.  How to Construct Deep Recurrent Neural Networks , 2013, ICLR.

[326]  Nei Kato,et al.  State-of-the-Art Deep Learning: Evolving Machine Intelligence Toward Tomorrow’s Intelligent Network Traffic Control Systems , 2017, IEEE Communications Surveys & Tutorials.

[327]  Hong Wang,et al.  Distributed Data Mining Based on Deep Neural Network for Wireless Sensor Network , 2015, Int. J. Distributed Sens. Networks.