Real-Time Anomaly Detection of NoSQL Systems Based on Resource Usage Monitoring
暂无分享,去创建一个
[1] Arun Kejariwal,et al. A Novel Technique for Long-Term Anomaly Detection in the Cloud , 2014, HotCloud.
[2] Rajkumar Buyya,et al. Energy Efficient Resource Management in Virtualized Cloud Data Centers , 2010, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing.
[3] Vijay V. Raghavan,et al. NoSQL Systems for Big Data Management , 2014, 2014 IEEE World Congress on Services.
[4] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[5] Ling Huang,et al. In-Network PCA and Anomaly Detection , 2006, NIPS.
[6] Heng Tao Shen,et al. Principal Component Analysis , 2009, Encyclopedia of Biometrics.
[7] Ying-Wong Cheung,et al. Lag Order and Critical Values of the Augmented Dickey-Fuller Test , 1995 .
[8] Lon-Mu Liu,et al. FORECASTING AND TIME SERIES ANALYSIS USING THE SCA STATISTICAL SYSTEM , 1994 .
[9] Rajkumar Buyya,et al. Elastic Load Balancing for Dynamic Virtual Machine Reconfiguration Based on Vertical and Horizontal Scaling , 2019, IEEE Transactions on Services Computing.
[10] Adam Silberstein,et al. Benchmarking cloud serving systems with YCSB , 2010, SoCC '10.
[11] K. Piromsopa,et al. SARIMA based network bandwidth anomaly detection , 2012, 2012 Ninth International Conference on Computer Science and Software Engineering (JCSSE).
[12] Arun Kejariwal,et al. Automatic Anomaly Detection in the Cloud Via Statistical Learning , 2017, ArXiv.
[13] Stelios Sotiriadis,et al. Semantic Aware Online Detection of Resource Anomalies on the Cloud , 2016, 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom).
[14] Athanasios V. Vasilakos,et al. GreenDCN: A General Framework for Achieving Energy Efficiency in Data Center Networks , 2013, IEEE Journal on Selected Areas in Communications.
[15] Enda Barrett,et al. CPU workload forecasting of machines in data centers using LSTM recurrent neural networks and ARIMA models , 2017, 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST).
[16] Enrique V. Carrera,et al. Load balancing and unbalancing for power and performance in cluster-based systems , 2001 .
[17] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[18] Stelios Sotiriadis,et al. Online Phase Detection and Characterization of Cloud Applications , 2017, 2017 IEEE International Conference on Cloud Computing Technology and Science (CloudCom).