{"id":"https://openalex.org/W1665109674","doi":"https://doi.org/10.1109/apnoms.2015.7275446","title":"Universal fault detection for NFV using SOM-based clustering","display_name":"Universal fault detection for NFV using SOM-based clustering","publication_year":2015,"publication_date":"2015-08-01","ids":{"openalex":"https://openalex.org/W1665109674","doi":"https://doi.org/10.1109/apnoms.2015.7275446","mag":"1665109674"},"language":"en","primary_location":{"id":"doi:10.1109/apnoms.2015.7275446","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apnoms.2015.7275446","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109887569","display_name":"T. Niwa","orcid":null},"institutions":[{"id":"https://openalex.org/I4210164495","display_name":"KDDI Research (Japan)","ror":"https://ror.org/05qsqt662","country_code":"JP","type":"company","lineage":["https://openalex.org/I4210164495"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Tomonobu Niwa","raw_affiliation_strings":["KDDI R&D Laboratories, Fujimino, Saitama, JAPAN","KDDI R&D Laboratories, Inc, 2-1-15 Ohara, Fujimino, Saitama, Japan"],"affiliations":[{"raw_affiliation_string":"KDDI R&D Laboratories, Fujimino, Saitama, JAPAN","institution_ids":["https://openalex.org/I4210164495"]},{"raw_affiliation_string":"KDDI R&D Laboratories, Inc, 2-1-15 Ohara, Fujimino, Saitama, Japan","institution_ids":["https://openalex.org/I4210164495"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103904281","display_name":"Masanori Miyazawa","orcid":null},"institutions":[{"id":"https://openalex.org/I4210164495","display_name":"KDDI Research (Japan)","ror":"https://ror.org/05qsqt662","country_code":"JP","type":"company","lineage":["https://openalex.org/I4210164495"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Masanori Miyazawa","raw_affiliation_strings":["KDDI R&D Laboratories, Fujimino, Saitama, JAPAN","KDDI R&D Laboratories, Inc, 2-1-15 Ohara, Fujimino, Saitama, Japan"],"affiliations":[{"raw_affiliation_string":"KDDI R&D Laboratories, Fujimino, Saitama, JAPAN","institution_ids":["https://openalex.org/I4210164495"]},{"raw_affiliation_string":"KDDI R&D Laboratories, Inc, 2-1-15 Ohara, Fujimino, Saitama, Japan","institution_ids":["https://openalex.org/I4210164495"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078763967","display_name":"Michiaki Hayashi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210164495","display_name":"KDDI Research (Japan)","ror":"https://ror.org/05qsqt662","country_code":"JP","type":"company","lineage":["https://openalex.org/I4210164495"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Michiaki Hayashi","raw_affiliation_strings":["KDDI R&D Laboratories, Fujimino, Saitama, JAPAN","KDDI R&D Laboratories, Inc, 2-1-15 Ohara, Fujimino, Saitama, Japan"],"affiliations":[{"raw_affiliation_string":"KDDI R&D Laboratories, Fujimino, Saitama, JAPAN","institution_ids":["https://openalex.org/I4210164495"]},{"raw_affiliation_string":"KDDI R&D Laboratories, Inc, 2-1-15 Ohara, Fujimino, Saitama, Japan","institution_ids":["https://openalex.org/I4210164495"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035040105","display_name":"Rolf Stadler","orcid":"https://orcid.org/0000-0001-6039-8493"},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Rolf Stadler","raw_affiliation_strings":["ACECESS Linnaeus Center, KTH Royal Institute of Technology"],"affiliations":[{"raw_affiliation_string":"ACECESS Linnaeus Center, KTH Royal Institute of Technology","institution_ids":["https://openalex.org/I86987016"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5109887569"],"corresponding_institution_ids":["https://openalex.org/I4210164495"],"apc_list":null,"apc_paid":null,"fwci":2.9954,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.9180802,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"315","last_page":"320"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7958803176879883},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.7482886910438538},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.734241247177124},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6001816987991333},{"id":"https://openalex.org/keywords/network-functions-virtualization","display_name":"Network Functions Virtualization","score":0.4979588985443115},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.44004929065704346},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4377237558364868},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.42566585540771484},{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.41099128127098083},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.37956634163856506},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.30295228958129883},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.27336353063583374},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2224707305431366},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.16548889875411987}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7958803176879883},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.7482886910438538},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.734241247177124},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6001816987991333},{"id":"https://openalex.org/C200789330","wikidata":"https://www.wikidata.org/wiki/Q7000834","display_name":"Network Functions Virtualization","level":3,"score":0.4979588985443115},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.44004929065704346},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4377237558364868},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.42566585540771484},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.41099128127098083},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.37956634163856506},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.30295228958129883},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.27336353063583374},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2224707305431366},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.16548889875411987},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/apnoms.2015.7275446","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apnoms.2015.7275446","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1482683038","https://openalex.org/W1579991003","https://openalex.org/W1979279766","https://openalex.org/W2020891699","https://openalex.org/W2034179412","https://openalex.org/W2055350293","https://openalex.org/W2079862709","https://openalex.org/W2139145615","https://openalex.org/W4213332169","https://openalex.org/W6634614743"],"related_works":["https://openalex.org/W2883256816","https://openalex.org/W2171408034","https://openalex.org/W3003320923","https://openalex.org/W2106140982","https://openalex.org/W2152313554","https://openalex.org/W2064303750","https://openalex.org/W1509300825","https://openalex.org/W3148545455","https://openalex.org/W2461440407","https://openalex.org/W2309305620"],"abstract_inverted_index":{"Network":[0],"function":[1],"virtualization":[2,28],"(NFV)":[3],"introduces":[4],"additional":[5],"complexity":[6],"to":[7],"network":[8,17],"management,":[9],"since":[10],"the":[11,24,31,37,66,72,98],"placement":[12],"and":[13,27,36,70,116,133],"behavior":[14,53],"of":[15,33,39,54,103,113,146],"virtualized":[16],"functions":[18],"(VNFs)":[19],"can":[20,106,136],"be":[21,107,137],"independent":[22],"from":[23,122],"underlying":[25],"hardware,":[26],"technology":[29],"increases":[30],"number":[32],"monitoring":[34],"points":[35],"amount":[38],"statistical":[40],"data.":[41],"In":[42,87],"our":[43],"previous":[44],"work,":[45],"we":[46,90],"proposed":[47],"a":[48,57,83,92,101,110,123],"framework":[49],"for":[50,74],"detecting":[51],"anomalous":[52],"VNFs":[55],"using":[56,109,142],"SOM-based":[58],"technique.":[59],"The":[60],"solution":[61,93],"relies":[62],"upon":[63],"manually":[64],"configuring":[65],"SOM":[67,117],"clustering":[68,118],"parameters":[69],"selecting":[71],"statistics":[73,115],"each":[75],"failure":[76],"type":[77],"in":[78,82,97],"advance,":[79],"which":[80],"results":[81,121],"high":[84,140],"maintenance":[85],"load.":[86],"this":[88],"paper,":[89],"provide":[91],"that":[94,100,126],"is":[95],"universal":[96],"sense":[99],"range":[102],"different":[104],"faults":[105],"detected":[108,138],"single":[111],"set":[112],"local":[114],"parameters.":[119],"Experimental":[120],"testbed":[124],"show":[125],"faults,":[127],"including":[128],"memory":[129],"leak,":[130],"packet":[131],"congestion,":[132,135],"session":[134],"with":[139],"accuracy":[141],"only":[143],"four":[144],"types":[145],"performance":[147],"statistics.":[148]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
