{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T06:47:09Z","timestamp":1725864429347},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319454764"},{"type":"electronic","value":"9783319454771"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45477-1_14","type":"book-chapter","created":{"date-parts":[[2016,9,3]],"date-time":"2016-09-03T05:34:41Z","timestamp":1472880881000},"page":"172-183","source":"Crossref","is-referenced-by-count":3,"title":["Automatic Invariant Selection for Online Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Leonardo","family":"Aniello","sequence":"first","affiliation":[]},{"given":"Claudio","family":"Ciccotelli","sequence":"additional","affiliation":[]},{"given":"Marcello","family":"Cinque","sequence":"additional","affiliation":[]},{"given":"Flavio","family":"Frattini","sequence":"additional","affiliation":[]},{"given":"Leonardo","family":"Querzoni","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Russo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,4]]},"reference":[{"issue":"4","key":"14_CR1","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1007\/s10586-006-0008-1","volume":"9","author":"G Jiang","year":"2006","unstructured":"Jiang, G., Chen, H., Yoshihira, K.: Discovering likely invariants of distributed transaction systems for autonomic system management. Cluster Comput. 9(4), 385\u2013399 (2006)","journal-title":"Cluster Comput."},{"key":"14_CR2","unstructured":"Lou, J.-G., et al.: Mining invariants from console logs for system problem detection. In: Proceedings of the USENIX Annual Technical Conference (2010)"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Xu, X., Zhu, L., Weber, I., Bass, L., Sun, D.: POD-diagnosis: error diagnosis of sporadic operations on cloud applications. In: 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN) (2014)","DOI":"10.1109\/DSN.2014.94"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Sharma, A.B., et al.: Fault detection and localization in distributed systems using invariant relationships. In: 43rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN) (2013)","DOI":"10.1109\/DSN.2013.6575304"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Sarkar, S., Ganesan, R., Cinque, M., Frattini, F., Russo, S., Savignano, A.: Mining invariants from SaaS application logs. In: Tenth European Dependable Computing Conference (EDCC 2014) (May 2014)","DOI":"10.1109\/EDCC.2014.18"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Frattini, F., Sarkar, S., Khasnabish, J., Russo, S.: Using invariants for anomaly detection: the case study of a SaaS application. In: IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) (2014)","DOI":"10.1109\/ISSREW.2014.57"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Sahoo, S.K., et al.: Using likely program invariants to detect hardware errors. In: IEEE International Conference on Dependable Systems and Networks (DSN) (2008)","DOI":"10.1109\/DSN.2008.4630072"},{"issue":"2","key":"14_CR8","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1109\/32.908957","volume":"27","author":"M Ernst","year":"2001","unstructured":"Ernst, M., Cockrell, J., Griswold, W.G., Notkin, D.: Dynamically discovering likely program invariants to support program evolution. IEEE Trans. Softw. Eng. 27(2), 99\u2013123 (2001)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"14_CR9","unstructured":"Jain, R.: The Art of Computer Systems Performance Analysis. Wiley (1991)"},{"key":"14_CR10","unstructured":"Ticket Monster. http:\/\/www.jboss.org\/ticket-monster\/"},{"key":"14_CR11","unstructured":"Tsung. http:\/\/tsung.erlang-projects.org\/"},{"issue":"1","key":"14_CR12","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A Avizienis","year":"2004","unstructured":"Avizienis, A., et al.: Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable Secur. Comput. 1(1), 11\u201333 (2004)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"1","key":"14_CR13","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1145\/2654822.2541983","volume":"42","author":"J Zhang","year":"2014","unstructured":"Zhang, J., et al.: Encore: exploiting system environment and correlation information for misconfiguration detection. SIGARCH Comput. Archit. News 42(1), 687\u2013700 (2014)","journal-title":"SIGARCH Comput. Archit. News"},{"key":"14_CR14","unstructured":"Rice University - Division of Information Technology, Why Are My Jobs Not Running?, April 2013. http:\/\/rcsg.rice.edu\/rcsg\/shared\/scheduling.html"},{"key":"14_CR15","unstructured":"IGI - Italian Grid Infrastructure, Troubleshooting guide for CREAM, April 2013. https:\/\/wiki.italiangrid.it\/twiki\/bin\/view\/CREAM\/TroubleshootingGuide"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Bovenzi, A., Cotroneo, D., Pietrantuono, R., Russo, S.: Workload characterization for software aging analysis. In: IEEE 22nd International Symposium on Software Reliability Engineering (ISSRE) (2011)","DOI":"10.1109\/ISSRE.2011.18"},{"key":"14_CR17","volume-title":"Genetic Algorithms in Search, Optimization, and Machine Learning","author":"D Goldberg","year":"1989","unstructured":"Goldberg, D.: Genetic Algorithms in Search, Optimization, and Machine Learning. Addison-Wesley, Boston (1989)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45477-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,25]],"date-time":"2020-09-25T19:23:02Z","timestamp":1601061782000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45477-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319454764","9783319454771"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45477-1_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}