<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Artificial Intelligence in virtualized networks: a journey</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Silvia Fichera</string-name>
          <email>silvia.fichera@vodafone.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Antonino Artale</string-name>
          <email>antonino.artale@vodafone.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Arman Derstepanians</string-name>
          <email>Arman.Derstepanians@santannapisa.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Luigi Pannocchi</string-name>
          <email>luigi.pannocchi@santannapisa.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tommaso Cucinotta</string-name>
          <email>tommaso.cucinotta@santannapisa.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>Anomaly Detection, Network Function Virtualization, Artificial Intelligence</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>. Behavioral Pattern analysis</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Vodafone Spa</institution>
          ,
          <addr-line>via Lorenteggio, Milan, 20147</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This paper provides an overview of the research activities in the area of Artificial Intelligence applied to Network Function Virtualization (NFV), carried out by Vodafone, jointly with Scuola Superiore Sant'Anna of Pisa. Artificial Intelligence techniques have been used on system-level data gathered from Virtual Machines (VMs) composing a multitude of Virtualized Network Functions (VNFs), to tackle a number of problems: from trafic forecasting for capacity planning and optimization, to the of-line analysis of the daily behavior of metrics to identify possible anomalous patterns, to a Near Real time (NRT) approach for metric prediction and anomaly detection, so to trigger prompt reaction of operators of the infrastructure and services. These problems become particularly challenging in the context of the Vodafone infrastructure, spanning across several data centers for NFV throughout a dozen European Countries.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        1. Introduction
munications, where network operators are increasingly
adopting virtualization technologies and principles from
the area of Cloud Computing, as key ingredients to create
lfexible and scalable network infrastructures. This led to
the so-called Network Function Virtualization (NFV) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ],
a paradigm pushing network operators to shift away from
traditional physical network appliances, typically sized
for peak-hour workloads, moving towards Virtualized
Network functions (VNFs). These are softwarized
versions of network services (i.e., packet processing for radio
access, core network, security and auditing, monitoring
and billing, etc.), that can be deployed flexibly and
elastically on general-purpose servers, as clusters of virtual
machines (VMs) providing high reliability and precise
performance levels. The NFV trend in modern
networking infrastructures brings also new challenges, revolving
around the capability of performing accurate workload
predictions, on-time anomaly detection, and optimum
allocation of virtual or physical resources throughout the
infrastructure [
        <xref ref-type="bibr" rid="ref2 ref3 ref4 ref5">2, 3, 4, 5</xref>
        ].
nized by CINI, May 29–31, 2023, Pisa, Italy
∗Corresponding author.
      </p>
    </sec>
    <sec id="sec-2">
      <title>The proposed method utilizes Self-Organizing Maps</title>
      <p>(SOM) to analyze patterns of VM metrics in data centers
for NFV, to provide a visual understanding of the main
behavioral patterns, promptly detect anomalies. This
technique can perform a joint analysis of system-level
metrics obtained from the infrastructure monitoring system
from individual VNFs (VNF metrics). These metrics are In our technique, a VM is observed through its
moveobtained from the NFV infrastructure manager, VMWare ment among the best matching unit (BMU) during the
vRealize Operations 1, and the monitoring subsystems analysis time frame. Any changes in the BMU that are
disof the virtualized services. By jointly analyzing these tant from the previous location could indicate anomalous
metrics, we can gain a more comprehensive understand- behavior and trigger an alarm. This enables an operator
ing of the major behavioral patterns of VMs and detect to focus on a specific set of VMs and their hosts, and
consuspicious (anomalous) behaviors. duct a further analysis that would be too time-consuming</p>
      <p>SOM-based clustering was performed jointly on a set or impractical for the entire infrastructure.
of input metrics, analyzing monthly data at a 5-minutes Additionally, we provide a mechanism for automated
granularity (288 samples per day per metric per moni- detection of potential suspect behaviors. A simple
tored VM), resulting in several GBs of data per month for threshold-based alert is triggered whenever an input
sama specific region. ple is associated with a neuron that has a quantization</p>
      <p>Figure 1 shows the workflow used to transform the error greater than the specified threshold (i.e., it is too
input INFRA metrics. First, the raw data undergo pre- far from its BMU). These samples are likely to represent
processing to address any data-quality issues and to re- uncommon behaviors and are marked as misclassified.
tain only relevant metric information. Next, the input The misclassified samples can be regarded as suspect
samples for each VM are constructed by consolidating or anomalous patterns that require further inspection.
the individual metric contributions into a single vector The misclassification mechanism can also immediately
for each pre-defined period. The considered steps are: notify operators of potential misconfigurations where a
i) normalization: this was done scaling each daily time- too small SOM grid size has been chosen, leading to an
series pattern by either subtracting its mean and dividing excessive number of misclassified time series.
by its standard deviation, or normalizing to a range of
values between 0 and 1 using the historical minima and 2.1. Grouping neurons
maxima values observed for each metric; ii) missing value
treatment: to address missing data and significant difer- A noteworthy observation from using the SOM-based
ences in metric magnitude, a data imputation strategy classification is that when employing relatively large
consisting of simple linear interpolation is performed; iii) SOM networks, the training phase often resulted in
mulifltering: the input data are filtered on the k specified met- tiple adjacent SOM neurons capturing very similar
behavrics and partitioned to have a sample for each metric, VM, iors. This aligns with the topology-preservation property
and period. Each input vector to the SOM is a concatena- of SOMs, which maps similar input vectors in the input
tion of k vectors related to the pre-processed time-series space to adjacent neurons in the SOM grid. Although
of the k metrics for 1 day for one of the considered VMs. this can be controlled to some extent using various
neigh</p>
      <p>Once the training phase is completed, the SOM is used borhood radiuses, data center operators need to view a
to identify the best matching unit (BMU) for each input group of adjacent neurons with similar weight vectors as
sample, providing the clustering functionality. The BMU a single behavioral cluster. To address this, we
incorpois the neuron that has the least quantization error when rated a straightforward clustering strategy after the SOM
compared with the input sample. This output can be processing stage, which combines neurons having weight
used by a data center operators to visually examine the vectors at a distance lower than a specified threshold into
behaviors captured by the trained SOM neurons, and the same group. Consequently, our technique enables the
identify suspect or anomalous VM behaviors. consolidation of similar clusters based on the distances
between the representative vectors of SOM neurons,
reducing the likelihood of triggering an unnecessary alarm</p>
    </sec>
    <sec id="sec-3">
      <title>1See: https://docs.vmware.com/en/vRealize-Operations/index.html</title>
      <p>(e.g., frequent movements of a VM over time between
two similar neurons) and facilitating the interpretation
of results by human operators.</p>
      <p>
        As an example, we have selected a data set containing
CPU and NET metrics for several VMs in April 2020.
Fig. 2 shows how the 5 × 5 SOM has classified the whole
behaviors of diferent VMs in 5 groups i.e. red, orange
which are regarded as high-working level groups, green
and brown which are low-working and gray which is
almost a flat neuron. Also, the behavior of each VM and
its possible change during the whole month is shown in
Fig. 3. This way, we designed an alerting system for VMs
based on their daily behavior. Namely, by considering a
period of time, an alert is raised once the daily behavior
of a VM has been classified once in a diferent group.
The results of such an alerting system, called ”Strong
Alerting System” (SAS), is shown in Fig. 4, where the
dark green cells are the alerts. However, SAS showed
to be prone to create a lot of false positives, since even
one behavioral change raises the alert, but, as visible
in the figure, several changes happen recurrently over
week-ends, so they are to be regarded as non-anomalous
changes. To overcome this issue, we also defined a ”Weak
Alerting System” (WAS), where an alert is raised when
a group change occurs that is not among the weekly
changes occurring every week-end. Interested readers
can find more details in [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <sec id="sec-3-1">
        <title>3. Real-Time Anomaly Detection</title>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>In NFV and cloud management frameworks, anomaly</title>
      <p>detection techniques are utilized to identify issues within
the infrastructure by examining the vast amount of data
available through the monitoring subsystem. Real-time
anomaly detection, or NRT, aims to accomplish this task
promptly as soon as new data is obtained at run-time.
We are dealing with metrics to be analyzed in real-time
from all the NFV data centers located in 11 EU countries.
The main objective is to identify anomalous points in the
resource consumption and application level metrics of
VMs/VNFs, which are monitored in the NFV and cloud
management frameworks. Therefore, we require a
scalable design, which is explained below.</p>
      <sec id="sec-4-1">
        <title>3.1. System Architecture</title>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>2More information at: https://cloud.google.com/.</title>
      <p>(GCP) environment, using the Cloud Big Table3 service
as a reliable NoSQL storage for the gathered time-series.
Meta-data related to all active VMs in the Vodafone
virtual network infrastructure is stored in a separate SQL
database, including their unique identifiers and
timestamps of creation, termination or other relevant events.</p>
      <p>The raw metrics data collected every 5 minutes for
each VM are merged into a single vector for a given
period and cleaned before processing with diferent
algorithms for anomaly detection. The system is modular,
allowing the configuration of various ML/AI techniques
that comply with a simple interface, deployed as Google
Cloud Functions4. These functions are triggered
periodically using the Google Tasks service5, with the output
being an anomaly score for each new data point injected
into the data processing pipeline since the last activation.</p>
      <p>In the post-processing phase, single anomalous points
followed by non-anomalous points are ignored, while
sequences of three or more timestamps marked as
anomalous are saved in a persistent storage database accessible
to operators through the Grafana framework6.</p>
      <sec id="sec-5-1">
        <title>3.2. Methods and Algorithms</title>
        <p>
          In order to perform NRT anomaly detection (AD), we
use two main techniques: Prediction-based AD, where
values output by a prediction model are compared with
the actual samples, and, if a given threshold is exceeded,
the samples are considered anomalous; ML Algorithms
designed to directly identify anomalies/outliers, such
as Isolation Forest [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] Local Outlier Factor [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] and
One-Class SVM [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ].
        </p>
        <p>We used two main methods to perform NRT anomaly
detection based on predictive models:
Long-ShortTerm-Memory (LSTM) auto-encoders, and Simple
Median (SM), a much simpler model based on
statistical and mathematical relations among the values of
the data-set, i.e., based on the ”averaged” behavior of
the previous days of each VM and calculated based on a
statistical median.</p>
      </sec>
      <sec id="sec-5-2">
        <title>3.3. Results</title>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>In our context, anomalies are defined as data points</title>
      <p>whose behavior difer from the behavior exhibited
previously by the same VM, as visible in Fig. 6.</p>
      <p>We have performed comparisons among the accuracy
in AD obtained with diferent methods and algorithms.
Some AD algorithms, like Isolation Forests, were able to
spot U-shape anomalous intervals like those shown in</p>
    </sec>
    <sec id="sec-7">
      <title>3More information at: https://cloud.google.com/bigtable. 4More information at: https://cloud.google.com/functions. 5See: https://cloud.google.com/tasks/docs/tutorial-gcf. 6More information is available at: https://grafana.com/.</title>
      <p>Fig. 6, only when occurring at the borders of the
statistical distribution of the samples, failing to detect them
in several cases, in our data sets. However, a vectorial
extension of Isolation Forests was able to spot at least
the beginning and ending intervals of these anomalies.</p>
      <p>
        For the predictive models, we identified a number of
scenarios in our reference data set as particularly critical,
because they were including multiple diferent
anomalies occurring in the same day, and/or in consecutive
days, sometimes spanning 3-4 consecutive days, making
the analysis more challenging. In this case, the Simple
Median detector we realized outperformed LSTM
autoencoders both in spotting diferent anomalies and
producing fewer false alarms. Fig. 6 shows specifically that
SM has been able to spot all anomalous points of two
diferent anomalous intervals for a particular VM on 30th
of January without any false positive detection. Details
are skipped for the sake of brevity, but the interested
reader can find additional details in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], where we also
made publicly available part of the data-set we used.
      </p>
      <sec id="sec-7-1">
        <title>4. Capacity Planning for VNFs</title>
        <p>At Vodafone, the deployment of an NFV Infrastructure
consists in allocating computation workload, in the form
of Virtual Machines (VMs), taking care of not exceeding
the available hardware resources of the servers,
considering the logistic limitations, and dealing with
afinity/antiafinity constraints on the workload. The optimal
resource allocation problem has been tackled using both
classical optimization, and a Genetic Algorithm.</p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>Classical Optimization Optimization-based methods</title>
      <p>
        are employed when optimality guarantees are needed.
Optimal placement problems are usually encoded as
Mixed Integer Linear Programs (MILP) or, as Boolean
Linear Programs (BLP), as done in [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. However, whilst
reliable solvers, both commercial and free, are available,
MILPs and BLPs formulations sufer from the curse of
computational complexity and tend to become too slow
when the problem size grows. At Vodafone, we found
problems that were too big to be solved optimally.
      </p>
    </sec>
    <sec id="sec-9">
      <title>Heuristics Heuristics-based methods are another com</title>
      <p>
        mon approach to the resource provisioning problem.
These are usually ad hoc algorithms designed to
provide a solution, following simple rules that depend on
the specific problem to be solved. A lot of efort has been
placed into developing Heuristics for resource allocation
problems [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Taking advantage of the knowledge of
the problem, simple heuristics reach a feasible solution
faster than optimization-based approaches, clearly, at the
expense of optimality.
      </p>
      <sec id="sec-9-1">
        <title>4.1. Proposed Approach</title>
      </sec>
    </sec>
    <sec id="sec-10">
      <title>To support Vodafone during the deployment of the Soft</title>
      <p>
        ware Defined components on their network, a hybrid
approach that exploits Computational Intelligence has
been pursued. The success of AI techniques for solv- Figure 7: Generic Structure of a Genetic Algorithm.
ing similar placement problems is well reported in many
other works, such as [
        <xref ref-type="bibr" rid="ref13 ref14 ref15">13, 14, 15</xref>
        ]. Precisely, a Genetic generates diferent processing orders, swapping couples
Algorithm has been employed to solve the resource pro- of VMs, that will be tested for performance.
visioning problem, obtaining a good trade-of between
solution time and the optimality of the solution. Inter- 4.2. Experimental Evaluation
ested readers can find more information in our prior
published work on the topic [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], where the used data-set
was also made publicly available.
      </p>
    </sec>
    <sec id="sec-11">
      <title>An experimental campaign, using real problems provided</title>
      <p>by Vodafone, has been set up to evaluate the proposed
approach. The goal was to allocate the Virtual Machines to
Genetic Algorithms Genetic Algorithms are based on the minimum number of Hosts. The results are compared
simple heuristics and can take advantage of the knowl- with the ones obtained from a classical BLP approach and
edge of the problem, having the possibility to avoid local a simple First-Fit heuristic. As expected, the proposed
minima, and thus are more likely to reach good-enough approach achieved a trade-of between the quality of the
solutions. By tuning the algorithm hyper-parameters, it solution, in terms of used Hosts, and the time to get the
is possible to achieve a good performance, in terms of so- solution. In Fig. 8 the solutions of some representative
lution optimality, and still get a solution time comparable instances, for a diferent amount of VMs to be placed,
with the simple heuristics. are reported. For large problems with thousands of VMs</p>
      <p>Instead of operating on a single solution, Genetic Al- the Heuristic approach delivers a sub-optimal solution,
gorithms evaluate a population of diferent solutions, whilst the Genetic Algorithm’s one is comparable with
iteratively evaluating every single solution and propagat- the optimal one returned from the MILP problem. As
ing a subset of the population (active population) selected far as the computation time is concerned, Fig. 9 reports
with some criteria. A schematic representation of the the time necessary to obtain the solutions reported in
algorithm is shown in Fig. 7. Often, the criteria to sort Fig. 8. In this case, the pattern shows that the Heuristic
and select candidates are just how good the solution is, is the fastest approach, while the MILP approach takes
but there are cases where the selection also considers the longest amount of time to return the solutions. The
the population variability and some specific features. Be- Genetic Algorithm stays in between. For large problems,
tween iterations, the selected solutions are also blended the solution time of the Genetic Algorithm is still
considtogether or altered to generate new individuals that can ered acceptable by Vodafone operators, whilst the MILP
hopefully have the good properties of the parents even- is considered too slow.
tually improving with respect to them.</p>
      <p>In the specific case of the approach used at Vodafone, 5. Conclusions
the Genetic Algorithm is based on a First Fit heuristic
where the processing order of the VMs to be placed is This paper provided an overview of how AI and ML
techthe optimization variable of the Genetic algorithm. That niques are being used within the Vodafone NFV
infrasis, the algorithm will search for the processing order tructure to ease and enhance a number of data-center
that will give the best result once placed by a First-Fit. operations related to workload prediction, anomaly
deThe generation of new candidates is implemented by tection and capacity planning.
mutating existing solutions. The mutation randomly</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <article-title>[1] ETSI, Network Functions Virtualisation, White Paper 1, SDN</article-title>
          and Openflow World Congress, Darmstadt, Germany,
          <year>2012</year>
          . URL: https://portal.etsi.org/ NFV/NFV_White_Paper.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J. Gil</given-names>
            <surname>Herrera</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. F.</given-names>
            <surname>Botero</surname>
          </string-name>
          ,
          <article-title>Resource Allocation in NFV: A Comprehensive Survey</article-title>
          ,
          <source>IEEE Trans. on Netw. and Serv. Manag</source>
          .
          <volume>13</volume>
          (
          <year>2016</year>
          )
          <fpage>518</fpage>
          -
          <lpage>532</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>F. L.</given-names>
            <surname>Pires</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Barán</surname>
          </string-name>
          ,
          <article-title>A virtual machine placement taxonomy</article-title>
          ,
          <source>in: 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing</source>
          ,
          <year>2015</year>
          , pp.
          <fpage>159</fpage>
          -
          <lpage>168</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Tian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Buyya</surname>
          </string-name>
          ,
          <article-title>A survey on load balancing algorithms for virtual machines placement in cloud computing</article-title>
          ,
          <source>Concurrency and Computation: Practice and Experience</source>
          <volume>29</volume>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>N. T.</given-names>
            <surname>Hieu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. D.</given-names>
            <surname>Francesco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. Y.</given-names>
            <surname>Jääski</surname>
          </string-name>
          ,
          <article-title>A virtual machine placement algorithm for balanced resource utilization in cloud data centers</article-title>
          ,
          <source>in: Proceedings of the 2014 IEEE International Conference on Cloud Computing, CLOUD '14</source>
          , IEEE Computer Society, USA,
          <year>2014</year>
          , p.
          <fpage>474</fpage>
          -
          <lpage>481</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>G.</given-names>
            <surname>Lanciano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ritacco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Brau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Cucinotta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Vannucci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Artale</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Barata</surname>
          </string-name>
          , E. Sposato,
          <article-title>Using self-organizing maps for the behavioral analysis of virtualized network functions</article-title>
          , in: D.
          <string-name>
            <surname>Ferguson</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Pahl</surname>
          </string-name>
          , M. Helfert (Eds.),
          <source>Cloud Computing and Services Science</source>
          , Springer International Publishing, Cham,
          <year>2021</year>
          , pp.
          <fpage>153</fpage>
          -
          <lpage>177</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>F. T.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. M.</given-names>
            <surname>Ting</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.-H.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <article-title>Isolation forest</article-title>
          , in: 2008
          <source>Eighth IEEE International Conference on Data Mining</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>413</fpage>
          -
          <lpage>422</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>E.</given-names>
            <surname>Schubert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Zimek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.-P.</given-names>
            <surname>Kriegel</surname>
          </string-name>
          ,
          <article-title>Local outlier detection reconsidered: A generalized view on locality with applications to spatial, video, and network outlier detection, Data Min</article-title>
          .
          <source>Knowl. Discov</source>
          .
          <volume>28</volume>
          (
          <year>2014</year>
          )
          <fpage>190</fpage>
          -
          <lpage>237</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>P.</given-names>
            <surname>Oliveri</surname>
          </string-name>
          ,
          <article-title>Class-modelling in food analytical chemistry: Development, sampling, optimisation and validation issues - a tutorial</article-title>
          ,
          <source>Analytica Chimica Acta</source>
          <volume>982</volume>
          (
          <year>2017</year>
          )
          <fpage>9</fpage>
          -
          <lpage>19</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Derstepanians</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Vannucci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Cucinotta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Sahebrao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lahiri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Artale</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Fichera</surname>
          </string-name>
          ,
          <article-title>Near realtime anomaly detection in nfv infrastructures</article-title>
          ,
          <source>in: 2022 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>26</fpage>
          -
          <lpage>32</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>T.</given-names>
            <surname>Cucinotta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Lugones</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Cherubini</surname>
          </string-name>
          , E. Jul,
          <article-title>Data Centre Optimisation Enhanced by Software Defined Networking</article-title>
          ,
          <source>in: 2014 IEEE 7th International Conference on Cloud Computing</source>
          ,
          <year>2014</year>
          , pp.
          <fpage>136</fpage>
          -
          <lpage>143</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S.</given-names>
            <surname>Martello</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Toth</surname>
          </string-name>
          , Knapsack Problems: Algorithms and Computer Implementations, John Wiley Sons, Inc., USA,
          <year>1990</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Khoshkholghi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Taheri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Bhamare</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kassler</surname>
          </string-name>
          ,
          <article-title>Optimized service chain placement using genetic algorithm</article-title>
          ,
          <source>in: 2019 IEEE Conference on Network Softwarization (NetSoft)</source>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>S.</given-names>
            <surname>Long</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Xing</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <article-title>A reinforcement learning-based virtual machine placement strategy in cloud data centers</article-title>
          ,
          <source>in: 2020 IEEE 22nd International Conference on High Performance Computing and Communications; IEEE 18th International Conference on Smart City; IEEE 6th International Conference on Data Science and Systems</source>
          (HPCC/SmartCity/DSS),
          <year>2020</year>
          , pp.
          <fpage>223</fpage>
          -
          <lpage>230</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>A.</given-names>
            <surname>Jumnal</surname>
          </string-name>
          ,
          <string-name>
            <surname>S. M.</surname>
          </string-name>
          <article-title>Dilip Kumar, Optimal VM Placement Approach Using Fuzzy Reinforcement Learning for Cloud Data Centers</article-title>
          ,
          <source>in: 3rd International Conference on Intelligent Communication Technologies and Virtual Mobile Networks</source>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>T.</given-names>
            <surname>Cucinotta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Pannocchi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Galli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Fichera</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lahiri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Artale</surname>
          </string-name>
          ,
          <article-title>Optimum VM placement for NFV infrastructures</article-title>
          , in: IEEE International Conference on Cloud Engineering (IC2E), IEEE,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>