Data-driven Anomaly Detection Method for Monitoring Runtime Performance of Cloud Computing Platforms
暂无分享,去创建一个
Yang Li | Zhiqiang Yao | Mingwei Lin | Fei Gao | Mingwei Lin | Zhiqiang Yao | Yang Li | Fei Gao
[1] Farrukh Nadeem,et al. An Early Evaluation and Comparison of Three Private Cloud Computing Software Platforms , 2015, Journal of Computer Science and Technology.
[2] Hans-Peter Kriegel,et al. LOF: identifying density-based local outliers , 2000, SIGMOD '00.
[3] Srinivasan Parthasarathy,et al. Towards NIC-based intrusion detection , 2003, KDD '03.
[4] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[5] Richard Wolski,et al. The Eucalyptus Open-Source Cloud-Computing System , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.
[6] Kanishka Bhaduri,et al. Detecting Abnormal Machine Characteristics in Cloud Infrastructures , 2011, 2011 IEEE 11th International Conference on Data Mining Workshops.
[7] Song Fu,et al. Performance Metric Selection for Autonomic Anomaly Detection on Cloud Computing Systems , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[8] Song Fu,et al. An Anomaly Detection Framework for Autonomic Management of Compute Cloud Systems , 2010, 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops.
[9] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[10] Daniel T. Larose,et al. Discovering Knowledge in Data: An Introduction to Data Mining , 2005 .
[11] Wei Bai,et al. Research on Operation Management under the Environment of Cloud Computing Data Center , 2015 .
[12] Li-Der Chou,et al. Statistical Anomaly Detection for Individuals With Cognitive Impairments , 2014, IEEE Journal of Biomedical and Health Informatics.
[13] Abhishek Sharma,et al. Context-Aware Time Series Anomaly Detection for Complex Systems , 2013 .
[14] Zengyou He,et al. Discovering cluster-based local outliers , 2003, Pattern Recognit. Lett..
[15] Rajkumar Buyya,et al. CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms , 2011, Softw. Pract. Exp..
[16] Biming Tian,et al. Anomaly detection in wireless sensor networks: A survey , 2011, J. Netw. Comput. Appl..
[17] Song Fu,et al. Adaptive Anomaly Identification by Exploring Metric Subspace in Cloud Computing Infrastructures , 2013, 2013 IEEE 32nd International Symposium on Reliable Distributed Systems.
[18] Engin Kirda,et al. A security analysis of Amazon's Elastic Compute Cloud service , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012).
[19] Xiaohui Gu,et al. FChain: Toward Black-Box Online Fault Localization for Cloud Systems , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.
[20] Vanish Talwar,et al. Online detection of utility cloud anomalies using metric distributions , 2010, 2010 IEEE Network Operations and Management Symposium - NOMS 2010.
[21] Giuseppina Cretella,et al. Semantic Representation of Cloud Services: A Case Study for Microsoft Windows Azure , 2014, 2014 International Conference on Intelligent Networking and Collaborative Systems.
[22] Jianguo Liu,et al. A self-evolving anomaly detection framework for developing highly dependable utility clouds , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[23] Chen-Feng Wu,et al. Learning Attitude and Its Effect on Applying Cloud Computing Service to IT Education , 2013 .
[24] Vipin Kumar,et al. Similarity Measures for Categorical Data: A Comparative Evaluation , 2008, SDM.