1. Chiosi, M., et al.: Network Functions Virtualisation. Introductory White Paper. Cited 2019-10-10 Available at: https://portal.etsi.org/nfv/nfv_white_paper.pdf (2015)
2. Eiman, M.: Minimum Technical Performance Requirements for IMT-2020 Radio Interface(s). Presentation. Cited 2019-10-10. https://www.itu.int/en/ITU-R/study-groups/rsg5/rwp5d/imt-2020/Documents/S01-1_Requirements%20for%20IMT-2020_Rev.pdf (2018)
3. Frank, E., Hall, M.A., Witten, I.H.: Data Mining: Practical Machine Learning Tools and Techniques, Morgan Kaufmann, 4th edn. San Francisco, CA, USA (2016). ISBN: 0128042915 9780128042915
4. Vergara-Reyes, J., Martinez-Ordonez, M.C., Ordonezy, A., Rendon O.M.C.: IP traffic classification in NFV: a benchmarking of supervised machine learning algorithms. In: IEEE Colombian Conference on Communications and Computing (2017). https://doi.org/10.1109/ColComCon.2017.8088199
5. Alshammari, R., Nur Zincir-Heywood, A.: Identification of VoIP encrypted traffic using a machine learning approach. J. King Saud Univ. Comput. Inf. Sci. Arch. 27(1), 77–92 (2015). https://doi.org/10.1016/j.jksuci.2014.03.013