{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:47:37Z","timestamp":1725540457328},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642104442"},{"type":"electronic","value":"9783642104459"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10445-9_11","type":"book-chapter","created":{"date-parts":[[2009,11,4]],"date-time":"2009-11-04T02:06:08Z","timestamp":1257300368000},"page":"205-225","source":"Crossref","is-referenced-by-count":2,"title":["How to Keep Your Head above Water While Detecting Errors"],"prefix":"10.1007","author":[{"given":"Ignacio","family":"Laguna","sequence":"first","affiliation":[]},{"given":"Fahad A.","family":"Arshad","sequence":"additional","affiliation":[]},{"given":"David M.","family":"Grothe","sequence":"additional","affiliation":[]},{"given":"Saurabh","family":"Bagchi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Kruegel, C., Valeur, F., Vigna, G., Kemmerer, R.: Stateful intrusion detection for high-speed network\u2019s. In: IEEE Symp. on Security and Privacy (2002)","DOI":"10.1109\/SECPRI.2002.1004378"},{"issue":"4","key":"11_CR2","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1016\/j.cose.2004.07.005","volume":"24","author":"W. Jiang","year":"2005","unstructured":"Jiang, W., Song, H., Dai, Y.: Real-time Intrusion Detection for High-speed Networks. Computers & Security\u00a024(4), 287\u2013294 (2005)","journal-title":"Computers & Security"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Krishnamurthy, B., Sen, S., Zhang, Y., Chen, Y.: Sketch-based change detection: Methods, evaluation, and applications. In: IMC 2003 (2003)","DOI":"10.1145\/948205.948236"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Mining Anomalies Using Traffic Feature Distributions. ACM SIGCOMM Comput. Commun. Rev.\u00a035(4) (October 2005)","DOI":"10.1145\/1090191.1080118"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Mai, J., Chuah, C., Sridharan, A., Ye, T., Zang, H.: Is Sampled Data Sufficient for Anomaly Detection? In: IMC 2006 (2006)","DOI":"10.1145\/1177080.1177102"},{"key":"11_CR6","unstructured":"Barham, P., Donnelly, A., Isaacs, R., Mortier, R.: Using Magpie for Request Extraction and Workload Modeling. In: USENIX OSDI (2004)"},{"key":"11_CR7","unstructured":"Chen, M.Y., Accardi, A., Kiciman, E., Lloyd, J., Patterson, D., Fox, A., Brewer, E.: Path-based failure and evolution management. In: USENIX NSDI (2004)"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Aguilera, M.K., Mogul, J.C., Wiener, J.L., Reynolds, P., Muthitacharoen, A.: Performance debugging for distributed systems of black boxes. In: ACM SOSP (2003)","DOI":"10.1145\/945445.945454"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Reynolds, P., Wiener, J.L., Mogul, J.C., Aguilera, M.K., Vahdat, A.: WAP5: black-box performance debugging for wide-area systems. In: WWW 2006 (2006)","DOI":"10.1145\/1135777.1135830"},{"issue":"2","key":"11_CR10","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1109\/TDSC.2006.17","volume":"3","author":"G. Khanna","year":"2006","unstructured":"Khanna, G., Varadharajan, P., Bagchi, S.: Automated online monitoring of distributed applications through external monitors. IEEE Trans. on Dependable and Secure Computing\u00a03(2), 115\u2013129 (2006)","journal-title":"IEEE Trans. on Dependable and Secure Computing"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Khanna, G., Laguna, I., Arshad, F.A., Bagchi, S.: Stateful Detection in High Throughput Distributed Systems. In: SRDS 2007 (2007)","DOI":"10.1109\/SRDS.2007.15"},{"key":"11_CR12","unstructured":"The Java EE 5 Tutorial (September 2007), http:\/\/java.sun.com\/javaee\/5\/docs\/tutorial\/doc\/"},{"key":"11_CR13","unstructured":"GlassFish: Open Source Application Server (2008), https:\/\/glassfish.dev.java.net\/"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Klein, D., Manning, C.D.: Parsing with treebank grammars. Assoc. for Computational Linguistics (2001)","DOI":"10.3115\/1073012.1073056"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Schuff, D.L., Pai, V.S.: Design Alternatives for a High-Performance Self-Securing Ethernet Network Interface. In: IPDPS 2007 (2007)","DOI":"10.1109\/IPDPS.2007.370290"},{"issue":"5","key":"11_CR16","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1109\/TNN.2005.853411","volume":"16","author":"E. Kiciman","year":"2005","unstructured":"Kiciman, E., Fox, A.: Detecting application-level failures in component-based Internet services. IEEE Trans. Neural Networks\u00a016(5), 1027\u20131041 (2005)","journal-title":"IEEE Trans. Neural Networks"},{"key":"11_CR17","unstructured":"Apache Tomcat: An Open Source JSP and Servlet Container, http:\/\/tomcat.apache.org\/"},{"key":"11_CR18","unstructured":"TPC-W Benchmark, http:\/\/www.tpc.org"},{"issue":"3","key":"11_CR19","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1109\/TR.2006.879609","volume":"55","author":"M. Grottke","year":"2006","unstructured":"Grottke, M., Li, L., Vaidyanathan, K., Trivedi, K.S.: Analysis of Software Aging in a Web Server. IEEE Trans. on Reliability\u00a055(3), 411\u2013420 (2006)","journal-title":"IEEE Trans. on Reliability"},{"key":"11_CR20","unstructured":"Brockwell, P.J., Davis, R.A.: Time Series: Theory and Methods, 2nd edn. (1998)"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Williams, A.W., Pertet, S.M., Narasimhan, P.: Tiresias: Black-Box Failure Prediction in Distributed Systems. In: IPDPS (2007)","DOI":"10.1109\/IPDPS.2007.370345"},{"key":"11_CR22","unstructured":"Laguna, I., Arshad, F.A., Grothe, D.M., Bagchi, S.: How To Keep Your Head Above Water While Detecting Errors. ECE Technical Reports, Purdue University, http:\/\/docs.lib.purdue.edu\/ecetr\/379"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Wu, Y.S., Bagchi, S., Singh, N., Wita, R.: Spam Detection in Voice-Over-IP Calls through Semi-Supervised Clustering. In: IEEE\/IFIP DSN 2009 (2009)","DOI":"10.1109\/DSN.2009.5270323"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Rabiner, L.R.: A tutorial on Hidden Markov Models and selected applications in speech recognition. Proceedings of the IEEE\u00a077(2) (February 1989)","DOI":"10.1109\/5.18626"}],"container-title":["Lecture Notes in Computer Science","Middleware 2009"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10445-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T11:59:40Z","timestamp":1558612780000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10445-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642104442","9783642104459"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10445-9_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}