A Confidence-Guided Anomaly Detection Approach Jointly Using Multiple Machine Learning Algorithms
暂无分享,去创建一个
Shenwei Huang | Tao Li | Zongming Jin | Xueshuo Xie | Qingqi Han | Tao Li | Shenwei Huang | Xueshuo Xie | Zongming Jin | Qingqi Han
[1] Hans-Peter Kriegel,et al. LOF: identifying density-based local outliers , 2000, SIGMOD 2000.
[2] João Gama,et al. A survey on concept drift adaptation , 2014, ACM Comput. Surv..
[3] Armando Fox,et al. Fingerprinting the datacenter: automated classification of performance crises , 2010, EuroSys '10.
[4] Andrea Borghesi,et al. Scheduling-based power capping in high performance computing systems , 2018, Sustain. Comput. Informatics Syst..
[5] Ilia Nouretdinov,et al. Transcend: Detecting Concept Drift in Malware Classification Models , 2017, USENIX Security Symposium.
[6] Hui Xiong,et al. Failure Prediction in IBM BlueGene/L Event Logs , 2007, ICDM.
[7] Ling Huang,et al. Online System Problem Detection by Mining Patterns of Console Logs , 2009, 2009 Ninth IEEE International Conference on Data Mining.
[8] Michael I. Jordan,et al. Failure diagnosis using decision trees , 2004 .
[9] Michael I. Jordan,et al. Detecting large-scale system problems by mining console logs , 2009, SOSP '09.
[10] Zhi-Hua Zhou,et al. Isolation Forest , 2008, 2008 Eighth IEEE International Conference on Data Mining.
[11] Alexey Tsymbal,et al. The problem of concept drift: definitions and related work , 2004 .
[12] Feifei Li,et al. DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning , 2017, CCS.
[13] Shilin He,et al. Experience Report: System Log Analysis for Anomaly Detection , 2016, 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE).
[14] Qiang Fu,et al. Mining Invariants from Console Logs for System Problem Detection , 2010, USENIX Annual Technical Conference.
[15] Felix Naumann,et al. Data fusion , 2009, CSUR.
[16] Yu Zhang,et al. Log Clustering Based Problem Identification for Online Service Systems , 2016, 2016 IEEE/ACM 38th International Conference on Software Engineering Companion (ICSE-C).
[17] A. Nur Zincir-Heywood,et al. Fast entropy based alert detection in super computer logs , 2010, 2010 International Conference on Dependable Systems and Networks Workshops (DSN-W).
[18] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[19] Bernhard Schölkopf,et al. Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.
[20] Julian Fierrez,et al. Fingerprint Databases and Evaluation , 2015 .
[21] Luca Benini,et al. Anomaly Detection using Autoencoders in High Performance Computing Systems , 2018, DDC@AI*IA.
[22] Zhou Li,et al. Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data , 2014, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[23] Vladimir Vovk,et al. A tutorial on conformal prediction , 2007, J. Mach. Learn. Res..