{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T07:15:35Z","timestamp":1725693335085},"reference-count":11,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T00:00:00Z","timestamp":1662940800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T00:00:00Z","timestamp":1662940800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,12]]},"DOI":"10.1109\/pimrc54779.2022.9977541","type":"proceedings-article","created":{"date-parts":[[2022,12,20]],"date-time":"2022-12-20T18:57:17Z","timestamp":1671562637000},"page":"583-588","source":"Crossref","is-referenced-by-count":3,"title":["A Hybrid machine learning based model for congestion prediction in mobile networks"],"prefix":"10.1109","author":[{"given":"Sara","family":"Kassan","sequence":"first","affiliation":[{"name":"Orange Labs,Belfort,France"}]},{"given":"Imed","family":"Hadj-Kacem","sequence":"additional","affiliation":[{"name":"Orange Labs,Belfort,France"}]},{"given":"Sana Ben","family":"Jemaa","sequence":"additional","affiliation":[{"name":"Orange Labs,Belfort,France"}]},{"given":"Sylvain","family":"Allio","sequence":"additional","affiliation":[{"name":"Orange Labs,Belfort,France"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/BigData52589.2021.9672056"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/NOMS47738.2020.9110429"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1111\/rssc.12260"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.4097\/kjae.2017.70.4.407"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1609\/aaai.v33i01.33014039"},{"key":"ref5","article-title":"Survey of Network Intrusion Detection Methods from the Perspective of the Knowledge Discovery in Databases Process","author":"coronado","year":"2020","journal-title":"IEEE Transactions on Network and Service Management"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1016\/j.neucom.2018.02.055"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/GLOCOM.2017.8254087"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/WCNC.2019.8885524"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1002\/9781118649480"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.23919\/TMA.2017.8002917"}],"event":{"name":"2022 IEEE 33rd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)","start":{"date-parts":[[2022,9,12]]},"location":"Kyoto, Japan","end":{"date-parts":[[2022,9,15]]}},"container-title":["2022 IEEE 33rd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9977437\/9977449\/09977541.pdf?arnumber=9977541","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T19:32:30Z","timestamp":1673897550000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9977541\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,12]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/pimrc54779.2022.9977541","relation":{},"subject":[],"published":{"date-parts":[[2022,9,12]]}}}