메뉴 건너뛰기




Volumn 2015, Issue , 2015, Pages

Anomaly detection algorithms for the sleeping cell detection in LTE networks

Author keywords

[No Author keywords available]

Indexed keywords

CELLS; CYTOLOGY; DATA MINING; DIGITAL STORAGE; LONG TERM EVOLUTION (LTE); MOBILE TELECOMMUNICATION SYSTEMS; SIGNAL DETECTION; SLEEP RESEARCH; SPRINGS (COMPONENTS);

EID: 84940421686     PISSN: 15502252     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/VTCSpring.2015.7145707     Document Type: Conference Paper
Times cited : (28)

References (15)
  • 3
    • 58349110977 scopus 로고    scopus 로고
    • A cell outage detection algorithm using neighbor cell list reports
    • Springer-Verlag
    • C. M. Mueller, M. Kaschub, C. Blankenhorn, and S. Wanke, "A cell outage detection algorithm using neighbor cell list reports," in IWSOS. Springer-Verlag, 2008, pp. 218-229.
    • (2008) IWSOS , pp. 218-229
    • Mueller, C.M.1    Kaschub, M.2    Blankenhorn, C.3    Wanke, S.4
  • 4
    • 84881117715 scopus 로고    scopus 로고
    • An improved anomaly detection and diagnosis framework for mobile network operators
    • S. Nov'aczki, "An improved anomaly detection and diagnosis framework for mobile network operators," in DRCN'13, 2013, pp. 234-241.
    • (2013) DRCN'13 , pp. 234-241
    • Nov'aczki, S.1
  • 5
    • 84890481061 scopus 로고    scopus 로고
    • N-gram analysis for sleeping cell detection in LTE networks
    • F. Chernogorov, T. Ristaniemi, K. Brigatti, and S. Chernov, "N-gram analysis for sleeping cell detection in LTE networks." in ICASSP. IEEE, 2013, pp. 4439-4443.
    • (2013) ICASSP. IEEE , pp. 4439-4443
    • Chernogorov, F.1    Ristaniemi, T.2    Brigatti, K.3    Chernov, S.4
  • 6
    • 85025713009 scopus 로고    scopus 로고
    • Data mining framework for random access failure detection in LTE networks
    • S. Chernov, F. Chernogorov, D. Petrov, and T. Ristaniemi, "Data mining framework for random access failure detection in. LTE networks." in PIMRC. IEEE, 2015.
    • (2015) PIMRC. IEEE
    • Chernov, S.1    Chernogorov, F.2    Petrov, D.3    Ristaniemi, T.4
  • 8
    • 84940401466 scopus 로고    scopus 로고
    • Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA); Radio Resource Control (RRC); Protocol specification (Release 10), 3GPP Std. TS 36. 331, 2011
    • Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA); Radio Resource Control (RRC); Protocol specification (Release 10), 3GPP Std. TS 36.331, 2011.
  • 9
    • 79957798213 scopus 로고    scopus 로고
    • Fast outlier detection in high dimensional spaces
    • Springer-Verlag
    • F. Angiulli and C. Pizzuti, "Fast outlier detection in high dimensional spaces," ser. PKDD. Springer-Verlag, 2002, pp. 15-26.
    • (2002) Ser. PKDD , pp. 15-26
    • Angiulli, F.1    Pizzuti, C.2
  • 11
    • 84940401467 scopus 로고    scopus 로고
    • Probabilistic anomaly detection based on system calls analysis
    • P. Macioek, P. Krl, and J. Kolak, "Probabilistic anomaly detection based on system calls analysis," Computer Science, vol. 8, 2007.
    • (2007) Computer Science , vol.8
    • Macioek, P.1    Krl, P.2    Kolak, J.3
  • 13
    • 84940401468 scopus 로고    scopus 로고
    • Nearest neighbors
    • Nearest neighbors. [Online]. Available: http://scikit-learn. org/stable/modules/neighbors.html
  • 14
    • 34548611806 scopus 로고    scopus 로고
    • Self-organizing map algorithm without learning of neighborhood vectors
    • H. Kusumoto and Y. Takefuji, "Self-organizing map algorithm without learning of neighborhood vectors." IEEE Transactions on Neural Networks, vol. 17, no. 6, pp. 1656-1661, 2006.
    • (2006) IEEE Transactions on Neural Networks , vol.17 , Issue.6 , pp. 1656-1661
    • Kusumoto, H.1    Takefuji, Y.2
  • 15
    • 27144475340 scopus 로고    scopus 로고
    • A comparative evaluation of two algorithms for windows registry anomaly detection
    • Jul
    • S. J. Stolfo, F. Apap, E. Eskin, K. Heller, S. Hershkop, A. Honig, and K. Svore, "A comparative evaluation of two algorithms for windows registry anomaly detection," J. Comput. Secur., vol. 13, no. 4, pp. 659-693, Jul. 2005.
    • (2005) J. Comput. Secur , vol.13 , Issue.4 , pp. 659-693
    • Stolfo, S.J.1    Apap, F.2    Eskin, E.3    Heller, K.4    Hershkop, S.5    Honig, A.6    Svore, K.7


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.