{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T08:32:28Z","timestamp":1769761948215,"version":"3.49.0"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031360299","type":"print"},{"value":"9783031360305","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-36030-5_38","type":"book-chapter","created":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T17:02:13Z","timestamp":1687971733000},"page":"476-491","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["ATS: A Fully Automatic Troubleshooting System with\u00a0Efficient Anomaly Detection and\u00a0Localization"],"prefix":"10.1007","author":[{"given":"Lu","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Yuan","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Jiyan","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Shangyuan","family":"Zhuang","sequence":"additional","affiliation":[]},{"given":"Yinlong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Liru","family":"Geng","sequence":"additional","affiliation":[]},{"given":"Weiqing","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,26]]},"reference":[{"key":"38_CR1","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/j.cose.2016.11.004","volume":"65","author":"AA Aburomman","year":"2017","unstructured":"Aburomman, A.A., Reaz, M.B.I.: A survey of intrusion detection systems based on ensemble and hybrid classifiers. Comput. Secur. 65, 135\u2013152 (2017)","journal-title":"Comput. Secur."},{"issue":"6","key":"38_CR2","doi-asserted-by":"publisher","first-page":"3709","DOI":"10.1109\/TNET.2017.2761758","volume":"25","author":"F Ahmed","year":"2017","unstructured":"Ahmed, F., Erman, J., et al.: Detecting and localizing end-to-end performance degradation for cellular data services based on TCP loss ratio and round trip time. IEEE\/ACM Trans. Netw. 25(6), 3709\u20133722 (2017)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"38_CR3","unstructured":"Amazon: Amazon found every 100ms of latency cost them 1% in sales. http:\/\/blog.gigaspaces.com\/amazon-found-every-100ms-of-latency-costthem-1-in-sales\/ (Aug 2008)"},{"key":"38_CR4","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.enbuild.2017.02.058","volume":"144","author":"DB Araya","year":"2017","unstructured":"Araya, D.B., Grolinger, K., ElYamany, H.F., Capretz, M.A., Bitsuamlak, G.: An ensemble learning framework for anomaly detection in building energy consumption. Energy Build. 144, 191\u2013206 (2017)","journal-title":"Energy Build."},{"issue":"6","key":"38_CR5","first-page":"1005","volume":"37","author":"WA Chaovalitwongse","year":"2007","unstructured":"Chaovalitwongse, W.A., et al.: On the time series k-nearest neighbor classification of abnormal brain activity. T-SMCA 37(6), 1005\u20131016 (2007)","journal-title":"T-SMCA"},{"key":"38_CR6","doi-asserted-by":"crossref","unstructured":"Chen, Z., et al.: Combining MIC feature selection and feature-based MSPCA for network traffic anomaly detection. In: 2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC), pp. 176\u2013181. IEEE (2016)","DOI":"10.1109\/DIPDMWC.2016.7529385"},{"key":"38_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2016.03.011","volume":"66","author":"G Folino","year":"2016","unstructured":"Folino, G., Sabatino, P.: Ensemble based collaborative and distributed intrusion detection systems: a survey. J. Netw. Comput. Appl. 66, 1\u201316 (2016)","journal-title":"J. Netw. Comput. Appl."},{"key":"38_CR8","unstructured":"Goldstein, M., Dengel, A.: Histogram-based outlier score (HBOS): a fast unsupervised anomaly detection algorithm. KI-2012: Poster and Demo Track. vol. 9 (2012)"},{"key":"38_CR9","doi-asserted-by":"crossref","unstructured":"Golovin, D., Solnik, B., et al.: Google vizier: a service for black-box optimization. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1487\u20131495 (2017)","DOI":"10.1145\/3097983.3098043"},{"key":"38_CR10","unstructured":"Google. http:\/\/glinden.blogspot.com\/2006\/11\/marissa-mayer-at-web-20.html (2006)"},{"key":"38_CR11","doi-asserted-by":"crossref","unstructured":"Groth, D., Hartmann, S., Klie, S., Selbig, J.: Principal components analysis. In: Computational Toxicology, pp. 527\u2013547 (2013)","DOI":"10.1007\/978-1-62703-059-5_22"},{"issue":"9\u201310","key":"38_CR12","doi-asserted-by":"publisher","first-page":"1641","DOI":"10.1016\/S0167-8655(03)00003-5","volume":"24","author":"Z He","year":"2003","unstructured":"He, Z., Xu, X., Deng, S.: Discovering cluster-based local outliers. Pattern Recogn. Lett. 24(9\u201310), 1641\u20131650 (2003)","journal-title":"Pattern Recogn. Lett."},{"key":"38_CR13","doi-asserted-by":"crossref","unstructured":"Jabbar, M.A., Aluvalu, R., Reddy, S.S.S.: Cluster based ensemble classification for intrusion detection system. In: Proceedings of the 9th International Conference on Machine Learning and Computing (ICMLC), pp. 253\u2013257 (2017)","DOI":"10.1145\/3055635.3056595"},{"key":"38_CR14","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1007\/11731139_68","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"W Jin","year":"2006","unstructured":"Jin, W., Tung, A.K.H., Han, J., Wang, W.: Ranking outliers using symmetric neighborhood relationship. In: Ng, W.-K., Kitsuregawa, M., Li, J., Chang, K. (eds.) PAKDD 2006. LNCS (LNAI), vol. 3918, pp. 577\u2013593. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11731139_68"},{"key":"38_CR15","doi-asserted-by":"crossref","unstructured":"Jing, P., Han, Y., Sun, J., Lin, T., Hu, Y.: AutoRoot: a novel fault localization schema of multi-dimensional root causes. In: 2021 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1\u20137. IEEE (2021)","DOI":"10.1109\/WCNC49053.2021.9417302"},{"issue":"1","key":"38_CR16","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s00591-010-0080-8","volume":"58","author":"F Klinker","year":"2011","unstructured":"Klinker, F.: Exponential moving average versus moving exponential average. Math. Semesterberichte 58(1), 97\u2013107 (2011)","journal-title":"Math. Semesterberichte"},{"key":"38_CR17","doi-asserted-by":"crossref","unstructured":"Laptev, N., Amizadeh, S., Flint, I.: Generic and scalable framework for automated time-series anomaly detection. In: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD), pp. 1939\u20131947 (2015)","DOI":"10.1145\/2783258.2788611"},{"key":"38_CR18","doi-asserted-by":"crossref","unstructured":"Li, Z., Luo, C., et al.: Generic and robust localization of multi-dimensional root causes. In: 2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE), pp. 47\u201357. IEEE (2019)","DOI":"10.1109\/ISSRE.2019.00015"},{"key":"38_CR19","doi-asserted-by":"crossref","unstructured":"Li, Z., Zhao, Y., et al.: COPOD: copula-based outlier detection. In: 2020 IEEE International Conference on Data Mining (ICDM), pp. 1118\u20131123. IEEE (2020)","DOI":"10.1109\/ICDM50108.2020.00135"},{"key":"38_CR20","doi-asserted-by":"crossref","unstructured":"Liu, D., Zhao, Y., et al.: Opprentice: towards practical and automatic anomaly detection through machine learning. In: Proceedings of the 2015 Internet Measurement Conference (IMC), pp. 211\u2013224 (2015)","DOI":"10.1145\/2815675.2815679"},{"key":"38_CR21","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation forest. In: 2008 Eighth IEEE International Conference on Data Mining, pp. 413\u2013422. IEEE (2008)","DOI":"10.1109\/ICDM.2008.17"},{"issue":"1","key":"38_CR22","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1109\/MNET.2018.1800020","volume":"33","author":"M Luglio","year":"2019","unstructured":"Luglio, M., Romano, S.P., Roseti, C., Zampognaro, F.: Service delivery models for converged satellite-terrestrial 5G network deployment: a satellite-assisted CDN use-case. IEEE Netw. 33(1), 142\u2013150 (2019)","journal-title":"IEEE Netw."},{"issue":"8","key":"38_CR23","doi-asserted-by":"publisher","first-page":"1176","DOI":"10.14778\/3389133.3389136","volume":"13","author":"M Ma","year":"2020","unstructured":"Ma, M., et al.: Diagnosing root causes of intermittent slow queries in cloud databases. Proc. VLDB Endowment 13(8), 1176\u20131189 (2020)","journal-title":"Proc. VLDB Endowment"},{"issue":"4","key":"38_CR24","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1111\/j.1467-9892.1983.tb00373.x","volume":"4","author":"AI McLeod","year":"1983","unstructured":"McLeod, A.I., Li, W.K.: Diagnostic checking arma time series models using squared-residual autocorrelations. J. Time Ser. Anal. 4(4), 269\u2013273 (1983)","journal-title":"J. Time Ser. Anal."},{"key":"38_CR25","doi-asserted-by":"crossref","unstructured":"Meng, Y., Zhang, S., et al.: Localizing failure root causes in a microservice through causality inference. In: 2020 IEEE\/ACM 28th International Symposium on Quality of Service (IWQoS), pp. 1\u201310. IEEE (2020)","DOI":"10.1109\/IWQoS49365.2020.9213058"},{"key":"38_CR26","doi-asserted-by":"crossref","unstructured":"Mirza, A.H.: Computer network intrusion detection using various classifiers and ensemble learning. In: 2018 26th Signal Processing and Communications Applications Conference (SIU), pp. 1\u20134. IEEE (2018)","DOI":"10.1109\/SIU.2018.8404704"},{"key":"38_CR27","unstructured":"Netflix. https:\/\/github.com\/netflix\/surus (2019)"},{"issue":"2","key":"38_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3439950","volume":"54","author":"G Pang","year":"2021","unstructured":"Pang, G., Shen, C., Cao, L., Hengel, A.V.D.: Deep learning for anomaly detection: a review. ACM Comput. Surv. (CSUR) 54(2), 1\u201338 (2021)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"38_CR29","unstructured":"Persson, M., Rudenius, L.: Anomaly detection and fault localization an automated process for advertising systems. Master\u2019s thesis (2018)"},{"key":"38_CR30","doi-asserted-by":"crossref","unstructured":"Pham, N.T., Foo, E., et al.: Improving performance of intrusion detection system using ensemble methods and feature selection. In: The Australasian Computer Science Week Multiconference (ACSW), pp. 1\u20136 (2018)","DOI":"10.1145\/3167918.3167951"},{"key":"38_CR31","doi-asserted-by":"crossref","unstructured":"Rahman, M.A., Shoaib, S., et al.: A bayesian optimization framework for the prediction of diabetes mellitus. In: 2019 5th International Conference on Advances in Electrical Engineering (ICAEE), pp. 357\u2013362. IEEE (2019)","DOI":"10.1109\/ICAEE48663.2019.8975480"},{"key":"38_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/4586875","volume":"2020","author":"S Rajagopal","year":"2020","unstructured":"Rajagopal, S., Kundapur, P.P., Hareesha, K.S.: A stacking ensemble for network intrusion detection using heterogeneous datasets. Secur. Commun. Netw. 2020, 1\u20139 (2020)","journal-title":"Secur. Commun. Netw."},{"key":"38_CR33","doi-asserted-by":"crossref","unstructured":"Su, Y., Zhao, Y., et al.: Robust anomaly detection for multivariate time series through stochastic recurrent neural network. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 2828\u20132837 (2019)","DOI":"10.1145\/3292500.3330672"},{"key":"38_CR34","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.apm.2021.03.020","volume":"97","author":"S Sun","year":"2021","unstructured":"Sun, S., Jin, F., et al.: A new hybrid optimization ensemble learning approach for carbon price forecasting. Appl. Math. Model. 97, 182\u2013205 (2021)","journal-title":"Appl. Math. Model."},{"key":"38_CR35","doi-asserted-by":"publisher","first-page":"10909","DOI":"10.1109\/ACCESS.2018.2804764","volume":"6","author":"Y Sun","year":"2018","unstructured":"Sun, Y., Zhao, Y., et al.: HotSpot: Anomaly localization for additive KPIs with multi-dimensional attributes. IEEE Access 6, 10909\u201310923 (2018)","journal-title":"IEEE Access"},{"key":"38_CR36","unstructured":"Tencent. https:\/\/github.com\/tencent\/metis (2019)"},{"key":"38_CR37","doi-asserted-by":"crossref","unstructured":"Vanerio, J., Casas, P.: Ensemble-learning approaches for network security and anomaly detection. In: Big-DAMA@SIGCOMM, pp. 1\u20136 (2017)","DOI":"10.1145\/3098593.3098594"},{"key":"38_CR38","doi-asserted-by":"publisher","first-page":"181580","DOI":"10.1109\/ACCESS.2019.2959699","volume":"7","author":"Z Wang","year":"2019","unstructured":"Wang, Z., Fu, Y., Song, C., Zeng, P., Qiao, L.: Power system anomaly detection based on OCSVM optimized by improved particle swarm optimization. IEEE Access 7, 181580\u2013181588 (2019)","journal-title":"IEEE Access"},{"key":"38_CR39","unstructured":"Zhao, Y., Nasrullah, Z., Li, Z.: PyOD: a python toolbox for scalable outlier detection. J. Mach. Learn. Res. 20(96), 1\u20137 (2019). http:\/\/jmlr.org\/papers\/v20\/19-011.html"},{"key":"38_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.107049","volume":"169","author":"Y Zhong","year":"2020","unstructured":"Zhong, Y., Chen, W., et al.: HELAD: a novel network anomaly detection model based on heterogeneous ensemble learning. Comput. Netw. 169, 107049 (2020)","journal-title":"Comput. Netw."}],"container-title":["Lecture Notes in Computer Science","Computational Science \u2013 ICCS 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-36030-5_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,24]],"date-time":"2024-05-24T01:06:31Z","timestamp":1716512791000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-36030-5_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031360299","9783031360305"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-36030-5_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"26 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Prague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Czech Republic","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccs-computsci2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iccs-meeting.org\/iccs2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"530","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"188","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"94","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,8","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}