International audienceA mobile operator offers many mobile data communication services to its users, such as e-mail, Web browsing, company proprietary services. Although quick detection of communication and software failures are important to improve users’ satisfaction, such a quick detection is difficult because the services are served by many servers, network nodes and mobile terminals. Thus we developed the anomaly detection technique for the mobile operator’s network to detect anomalies caused by communication failures such as server and network halts. Our technique is based on the observation that users reconnect to servers many times when a communication failure occurs. It is useful not only to detect such communication failures, but ...
One of the critical technologies required for the large scale acceptance of network functions virtua...
The purpose of this paper is to demonstrate the Sample Space Algorithm that can be used to monitor t...
Mobile traffic and number of connected devices have been increasing exponentially nowadays, with cus...
Huge amounts of operation data are constantly collected from the performance monitoring and system l...
New security threats emerge against mobiledevices as the devices’ computing power and storagecapabil...
Functioning mobile telecommunication networks are taken for granted in present-day society. The netw...
This paper proposes an anomaly detection framework that utilizes key performance indicators (KPIs) a...
International audienceToday's network operators strive to create self-healing cellular networks that...
Mobile communication networks produce massive amounts of data which may be useful in identifying the...
The efficient and effective monitoring of mobile networks is vital given the number of users who rel...
Modern cellular networks are complex systems offering a wide range of services and present challenge...
International audiencen mobile environment, nodes can move around and voluntarily leave or join the ...
Word processed copy.Includes bibliographical references (leaves 118-121).In this research, we presen...
The dissertation investigated the creation of an anomaly detection approach to identify anomalies i...
International audienceIn order to help the network maintainers with the daily diagnosis and optimiza...
One of the critical technologies required for the large scale acceptance of network functions virtua...
The purpose of this paper is to demonstrate the Sample Space Algorithm that can be used to monitor t...
Mobile traffic and number of connected devices have been increasing exponentially nowadays, with cus...
Huge amounts of operation data are constantly collected from the performance monitoring and system l...
New security threats emerge against mobiledevices as the devices’ computing power and storagecapabil...
Functioning mobile telecommunication networks are taken for granted in present-day society. The netw...
This paper proposes an anomaly detection framework that utilizes key performance indicators (KPIs) a...
International audienceToday's network operators strive to create self-healing cellular networks that...
Mobile communication networks produce massive amounts of data which may be useful in identifying the...
The efficient and effective monitoring of mobile networks is vital given the number of users who rel...
Modern cellular networks are complex systems offering a wide range of services and present challenge...
International audiencen mobile environment, nodes can move around and voluntarily leave or join the ...
Word processed copy.Includes bibliographical references (leaves 118-121).In this research, we presen...
The dissertation investigated the creation of an anomaly detection approach to identify anomalies i...
International audienceIn order to help the network maintainers with the daily diagnosis and optimiza...
One of the critical technologies required for the large scale acceptance of network functions virtua...
The purpose of this paper is to demonstrate the Sample Space Algorithm that can be used to monitor t...
Mobile traffic and number of connected devices have been increasing exponentially nowadays, with cus...