default search action
Szabolcs Nováczki
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j3]Gábor Horváth, Edith Kovács, Roland Molontay, Szabolcs Nováczki:
Copula-Based Anomaly Scoring and Localization for Large-Scale, High-Dimensional Continuous Data. ACM Trans. Intell. Syst. Technol. 11(3): 26:1-26:26 (2020)
2010 – 2019
- 2019
- [i1]Gábor Horváth, Edith Kovács, Roland Molontay, Szabolcs Nováczki:
Copula-based anomaly scoring and localization for large-scale, high-dimensional continuous data. CoRR abs/1912.02166 (2019) - 2016
- [c21]Gabriela F. Ciocarlie, Cherita Corbett, Eric Yeh, Christopher Connolly, Henning Sanneck, Muhammad Naseer ul Islam, Borislava Gajic, Szabolcs Nováczki, Kimmo Hätönen:
Diagnosis cloud: Sharing knowledge across cellular networks. CNSM 2016: 228-232 - [c20]Márton Kajó, Szabolcs Nováczki:
A Genetic Feature Selection Algorithm for Anomaly Classification in Mobile Networks. ICIN 2016 - 2015
- [c19]Szabolcs Nováczki, Borislava Gajic:
Fixed-Resolution Growing Neural Gas for Clustering the Mobile Networks Data. EANN 2015: 181-191 - [c18]Borislava Gajic, Szabolcs Nováczki, Stephen S. Mwanje:
An improved anomaly detection in mobile networks by using incremental time-aware clustering. IM 2015: 1286-1291 - [c17]Szabolcs Nováczki, Tsvetko Tsvetkov, Henning Sanneck, Stephen S. Mwanje:
A Scoring Method for the Verification of Configuration Changes in Self-Organizing Networks. MONAMI 2015: 3-15 - [c16]Gabriela F. Ciocarlie, Eric Yeh, Christopher Connolly, Cherita Corbett, Ulf Lindqvist, Henning Sanneck, Kimmo Hätönen, Szabolcs Nováczki, Muhammad Naseer ul Islam, Borislava Gajic:
Alarm Prioritization and Diagnosis for Cellular Networks. MONAMI 2015: 28-42 - 2014
- [c15]Gabriela F. Ciocarlie, Chih-Chieh Cheng, Christopher Connolly, Ulf Lindqvist, Szabolcs Nováczki, Henning Sanneck, Muhammad Naseer ul Islam:
Managing scope changes for cellular network-level anomaly detection. ISWCS 2014: 375-379 - [c14]Tsvetko Tsvetkov, Szabolcs Nováczki, Henning Sanneck, Georg Carle:
A configuration management assessment method for SON verification. ISWCS 2014: 380-384 - [c13]Gabriela F. Ciocarlie, Chih-Chieh Cheng, Christopher Connolly, Ulf Lindqvist, Kenneth Nitz, Szabolcs Nováczki, Henning Sanneck, Muhammad Naseer ul Islam:
Demo: SONVer: SON verification for operational cellular networks. ISWCS 2014: 611-612 - [c12]Tsvetko Tsvetkov, Szabolcs Nováczki, Henning Sanneck, Georg Carle:
A Post-Action Verification Approach for Automatic Configuration Parameter Changes in Self-Organizing Networks. MONAMI 2014: 135-148 - [c11]Gabriela F. Ciocarlie, Christopher Connolly, Chih-Chieh Cheng, Ulf Lindqvist, Szabolcs Nováczki, Henning Sanneck, Muhammad Naseer ul Islam:
Anomaly Detection and Diagnosis for Automatic Radio Network Verification. MONAMI 2014: 163-176 - [c10]Gabriela F. Ciocarlie, Ulf Lindqvist, Kenneth Nitz, Szabolcs Nováczki, Henning Sanneck:
On the feasibility of deploying cell anomaly detection in operational cellular networks. NOMS 2014: 1-6 - [c9]Gabriela F. Ciocarlie, Ulf Lindqvist, Kenneth Nitz, Szabolcs Nováczki, Henning Sanneck:
DCAD: Dynamic Cell Anomaly Detection for operational cellular networks. NOMS 2014: 1-2 - 2013
- [c8]Gabriela F. Ciocarlie, Ulf Lindqvist, Szabolcs Nováczki, Henning Sanneck:
Detecting anomalies in cellular networks using an ensemble method. CNSM 2013: 171-174 - [c7]Szabolcs Nováczki:
An improved anomaly detection and diagnosis framework for mobile network operators. DRCN 2013: 234-241 - 2012
- [j2]Péter Szilágyi, Szabolcs Nováczki:
An Automatic Detection and Diagnosis Framework for Mobile Communication Systems. IEEE Trans. Netw. Serv. Manag. 9(2): 184-197 (2012) - [c6]Viktor Farkas, Balázs Héder, Szabolcs Nováczki:
A Split Connection TCP Proxy in LTE Networks. EUNICE 2012: 263-274 - 2011
- [c5]Szabolcs Nováczki, Péter Szilágyi:
Radio Channel Degradation Detection and Diagnosis Based on Statistical Analysis. VTC Spring 2011: 1-2
2000 – 2009
- 2009
- [c4]László Bokor, László Tamás Zeke, Szabolcs Nováczki, Gábor Jeney:
Protocol design and analysis of a HIP-based per-application mobility management platform. MOBIWAC 2009: 7-16 - [c3]László Bokor, Szabolcs Nováczki, László Tamás Zeke, Gábor Jeney:
Design and evaluation of host identity protocol (HIP) simulation framework for INET/OMNeT++. MSWiM 2009: 124-133 - 2008
- [j1]Szabolcs Nováczki, László Bokor, Gábor Jeney, Sándor Imre:
Design and Evaluation of a Novel HIP-Based Network Mobility Protocol. J. Networks 3(1): 10-24 (2008) - 2007
- [c2]László Bokor, Szabolcs Nováczki, Sándor Imre:
A Complete HIP Based Framework for Secure Micromobility. MoMM 2007: 111-122 - [c1]Szabolcs Nováczki, László Bokor, Sándor Imre:
A HIP Based Network Mobility Protocol. SAINT Workshops 2007: 48
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-13 20:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint