{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T20:10:23Z","timestamp":1725912623776},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319663784"},{"type":"electronic","value":"9783319663791"}],"license":[{"start":{"date-parts":[[2017,10,5]],"date-time":"2017-10-05T00:00:00Z","timestamp":1507161600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-66379-1_22","type":"book-chapter","created":{"date-parts":[[2017,10,4]],"date-time":"2017-10-04T08:08:21Z","timestamp":1507104501000},"page":"247-261","source":"Crossref","is-referenced-by-count":0,"title":["A Taxonomy of Anomalies in Distributed Cloud Systems: The CRI-Model"],"prefix":"10.1007","author":[{"given":"Kim","family":"Reichert","sequence":"first","affiliation":[]},{"given":"Alexander","family":"Pokahr","sequence":"additional","affiliation":[]},{"given":"Till","family":"Hohenberger","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Haubeck","sequence":"additional","affiliation":[]},{"given":"Winfried","family":"Lamersdorf","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,5]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Avizienis, A., Laprie, J.-C., Randell, B.: Dependability and its threats: a taxonomy. In: Proceedings of IFIP 18th World Computer Congress, pp. 91\u2013120 (2004)","DOI":"10.1007\/978-1-4020-8157-6_13"},{"key":"22_CR2","unstructured":"Baddar, S., Merlo, A., Migliardi, M.: Anomaly detection in computer networks: a state-of-the-art review. J. Wirel. Mobile Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 5(4), 29\u201364 (2014)"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Barford, P. et al.: A signal analysis of network traffic anomalies. In: The Second ACM SIGCOMM Workshop, pp. 71\u201382 (2002)","DOI":"10.1145\/637201.637210"},{"issue":"3","key":"22_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 1\u201315 (2009)","journal-title":"ACM Comput. Surv."},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Ghosh, S., Reilly, D.L.: Credit card fraud detection with a neural-network. In: 1994 Proceedings of the Twenty-Seventh Hawaii International Conference on System Sciences, vol. 3, pp. 621\u2013630 (1994)","DOI":"10.1109\/HICSS.1994.323314"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Goldstein, M., Uchida, S.: A comparative evaluation of unsupervised anomaly detection algorithms for multivariate data. PloS one 11(4), 1\u201331 (2016). e0152173","DOI":"10.1371\/journal.pone.0152173"},{"issue":"1","key":"22_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2791120","volume":"48","author":"O Ibidunmoye","year":"2015","unstructured":"Ibidunmoye, O., Hern\u00e1ndez-Rodriguez, F., Elmroth, E.: Performance anomaly detection and bottleneck identification. ACM Comput. Surv. 48(1), 1\u201335 (2015)","journal-title":"ACM Comput. Surv."},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Kumar, M., Ghani, R., Mei, Z.-S.: Data mining to predict and prevent errors in health insurance claims processing. In: The 16th ACM SIGKDD International Conference, pp. 65\u201374 (2010)","DOI":"10.1145\/1835804.1835816"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Ladiges, J., et al.: Evolution management of production facilities by semiautomated requirement verification. at-Automatisierungstechnik 62(11), 781\u2013793 (2014)","DOI":"10.1515\/auto-2014-1100"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Mazel, J., Fontugne, R., Fukuda, K.: A taxonomy of anomalies in backbone network traffic. In: IWCMC 2014\u201410th Int. Wireless Communications and Mobile Computing Conference, pp. 30\u201336 (2014)","DOI":"10.1109\/IWCMC.2014.6906328"},{"issue":"2","key":"22_CR11","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/997150.997156","volume":"34","author":"J Mirkovic","year":"2004","unstructured":"Mirkovic, J., Reiher, P.: A taxonomy of DDoS attack and DDoS defense mechanisms. SIGCOMM Comp. Comm. Rev. 34(2), 39\u201353 (2004)","journal-title":"SIGCOMM Comp. Comm. Rev."},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Nielsen, J.: Usability Engineering. Elsevier (1994)","DOI":"10.1016\/B978-0-08-052029-2.50007-3"},{"key":"22_CR13","unstructured":"Pertet, S., et al.: Causes of failure in web applications, Parallel Data Laboratory December, pp. 1\u201319 (2005)"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Plonka, D., Barford, P.: Network anomaly confirmation, diagnosis and remediation. In: 47th Annual Allerton Conference on Communication, Control, and Computing, pp. 128\u2013135 (2009)","DOI":"10.1109\/ALLERTON.2009.5394858"},{"issue":"9","key":"22_CR15","first-page":"1689","volume":"53","author":"D Tobergte","year":"2013","unstructured":"Tobergte, D., Curtis, S.: Why Internet services fail and what can be done about these. J. Chem. Inf. Model. 53(9), 1689\u20131699 (2013)","journal-title":"J. Chem. Inf. Model."}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing XI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66379-1_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T06:41:34Z","timestamp":1570171294000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-66379-1_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,5]]},"ISBN":["9783319663784","9783319663791"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66379-1_22","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2017,10,5]]}}}