Big Data Analytics for User-Activity Analysis and User-Anomaly Detection in Mobile Wireless Network
暂无分享,去创建一个
[1] Josep Mangues-Bafalluy,et al. Big Data Empowered Self Organized Networks , 2014 .
[2] Michael J. Maher,et al. An Investigation of Performance Analysis of Anomaly Detection Techniques for Big Data in SCADA Systems , 2015, EAI Endorsed Trans. Ind. Networks Intell. Syst..
[3] Enzo Baccarelli,et al. Distributed and adaptive resource management in Cloud-assisted Cognitive Radio Vehicular Networks with hard reliability guarantees , 2015, Veh. Commun..
[4] Enzo Baccarelli,et al. Energy-Efficient Adaptive Resource Management for Real-Time Vehicular Cloud Services , 2019, IEEE Transactions on Cloud Computing.
[5] Danda B. Rawat,et al. Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[6] Mennatallah Amer,et al. Comparison of Unsupervised Anomaly Detection Techniques Bachelor Thesis , 2011 .
[7] Muhammad Ali Imran,et al. A SON solution for sleeping cell detection using low-dimensional embedding of MDT measurements , 2014, 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC).
[8] Jaime Lloret Mauri,et al. A smart communication architecture for ambient assisted living , 2015, IEEE Communications Magazine.
[9] Zhihan Lv,et al. Empirical Analysis and Modeling of the Activity Dilemmas in Big Social Networks , 2017, IEEE Access.
[10] Danda B. Rawat,et al. Vehicular Cyber Physical Systems: Adaptive Connectivity and Security , 2016 .
[11] Houbing Song,et al. Range of Influence and Impact of Physical Impairments in Long-Haul DWDM Systems , 2013, Journal of Lightwave Technology.
[12] Mingjin Yan,et al. Methods of Determining the Number of Clusters in a Data Set and a New Clustering Criterion , 2005 .
[13] Georg Carle,et al. Traffic Anomaly Detection Using K-Means Clustering , 2007 .
[14] Engin Zeydan,et al. Anomaly Detection In Cellular Network Data Using Big Data Analytics , 2014 .
[15] Joel J. P. C. Rodrigues,et al. Anomaly detection using baseline and K-means clustering , 2010, SoftCOM 2010, 18th International Conference on Software, Telecommunications and Computer Networks.
[16] Houbing Song,et al. Internet of Things and Big Data Analytics for Smart and Connected Communities , 2016, IEEE Access.
[17] Marco Fiore,et al. Classifying call profiles in large-scale mobile traffic datasets , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[18] Minas Gjoka,et al. On the Decomposition of Cell Phone Activity Patterns and their Connection with Urban Ecology , 2015, MobiHoc.
[19] Víctor Soto,et al. Automated land use identification using cell-phone records , 2011, HotPlanet '11.
[20] Danda B. Rawat,et al. Software Defined Networking Architecture, Security and Energy Efficiency: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[21] Jaime Lloret,et al. User's Macro and Micro-mobility Study using WLANs in a University Campus , 2011 .
[22] Wenjia Li,et al. ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.
[23] Tapani Ristaniemi,et al. Anomaly Detection Algorithms for the Sleeping Cell Detection in LTE Networks , 2015, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).