{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T09:23:37Z","timestamp":1648545817261},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2011,7,22]],"date-time":"2011-07-22T00:00:00Z","timestamp":1311292800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1007\/s11227-011-0653-x","type":"journal-article","created":{"date-parts":[[2011,7,21]],"date-time":"2011-07-21T08:25:35Z","timestamp":1311236735000},"page":"6-26","source":"Crossref","is-referenced-by-count":0,"title":["Data flow analysis for anomaly detection and identification toward resiliency in extreme scale systems"],"prefix":"10.1007","volume":"61","author":[{"given":"Byoung Uk","family":"Kim","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,7,22]]},"reference":[{"key":"653_CR1","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1023\/A:1018972607783","volume":"9","author":"EB Allen","year":"2000","unstructured":"Allen EB, Khoshgoftaar TM, Jones WD, Hudepohl JP (2000) Accuracy of software quality models. Ann Softw Eng 9:103\u2013116","journal-title":"Ann Softw Eng"},{"key":"653_CR2","first-page":"455","volume":"51","author":"EB Allen","year":"2002","unstructured":"Allen EB, Khoshgoftaar TM, Deng J (2002) Using regression trees to classify fault-prone software modules reliability. IEEE Trans Comput 51:455\u2013462","journal-title":"IEEE Trans Comput"},{"key":"653_CR3","first-page":"46","volume-title":"Proc 2003 AMIA annual symp","author":"M Bang","year":"2003","unstructured":"Bang M, Larsson A, Eriksson H (2003) NOSTOS: a paper-based ubiquitous computing healthcare environment to support data capture and collaboration. In: Proc 2003 AMIA annual symp, Washington, DC, pp 46\u201350"},{"key":"653_CR4","volume-title":"Statistical tests: an introduction with minitab commentary","author":"GP Beaumont","year":"1996","unstructured":"Beaumont GP (1996) Statistical tests: an introduction with minitab commentary. Prentice Hall, New York"},{"key":"653_CR5","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/S0164-1212(99)00102-8","volume":"51","author":"LC Briand","year":"2000","unstructured":"Briand LC, Wust J, Daly JW, Porter DV (2000) Exploring the relationship between design measures and software quality in object-oriented systems. J Syst Softw 51:245\u2013273","journal-title":"J Syst Softw"},{"key":"653_CR6","series-title":"(LCPC 2003)","volume-title":"Proceedings of the 16th international workshop on languages and compilers for parallel computing, October","author":"G Bronevetsky","year":"2003","unstructured":"Bronevetsky G, Marques D, Pingali K, Stodghill P (2003) C3: A system for automating application-level checkpointing of MPI programs. In: Proceedings of the 16th international workshop on languages and compilers for parallel computing, October (LCPC 2003)"},{"key":"653_CR7","volume-title":"Proceedings of the international conference on dependable systems and networks, Washington, DC","author":"M Chen","year":"2004","unstructured":"Chen M, K\u0131c\u0131man E, Fratkin E, Brewer E, Fox A (2004) Pinpoint problem determination in large, dynamic, internet services. In: Proceedings of the international conference on dependable systems and networks, Washington, DC"},{"key":"653_CR8","first-page":"85","volume-title":"Advances in intelligent control","author":"S Chenand","year":"1994","unstructured":"Chenand S, Billings SA (1994) Neural networks for nonlinear system modeling and identification. In: Harris CJ (ed) Advances in intelligent control. Taylor & Francis, London, pp 85\u2013112"},{"key":"653_CR9","volume-title":"USENIX security symposium, Washington, DC","author":"M Christodorescu","year":"2003","unstructured":"Christodorescu M, Jha S (2003) Static analysis of executables to detect malicious patterns. In: USENIX security symposium, Washington, DC"},{"key":"653_CR10","volume-title":"ACM SOSP","author":"I Cohen","year":"2005","unstructured":"Cohen I, Zhang S, Goldszmidt M, Symons J, Kelly T, Fox A (2005) Capturing, indexing, clustering, and retrieving system history. In: ACM SOSP"},{"key":"653_CR11","volume-title":"ACM SIGCOMM\u201903","author":"S Dharmapurikar","year":"2003","unstructured":"Dharmapurikar S, Krishnamurthy P, Taylor DE (2003) Longest prefix matching using bloom filters. In: ACM SIGCOMM\u201903, Karlsruhe, Germany, August 25\u201329"},{"key":"653_CR12","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/BF00209184","volume":"5","author":"C Ebert","year":"1996","unstructured":"Ebert C (1996) Classification techniques for metric-based software development. Softw Qual J 5:255\u2013272","journal-title":"Softw Qual J"},{"key":"653_CR13","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1109\/CSMR.2001.914976","volume-title":"Proc on software maintenance and reengineering","author":"F Fioravanti","year":"2001","unstructured":"Fioravanti F, Nesi P (2001) A study on fault-proneness detection of object-oriented systems. In: Proc on software maintenance and reengineering, pp 121\u2013130"},{"key":"653_CR14","volume-title":"ECML\/PKDD","author":"IC Forman George","year":"2004","unstructured":"Forman George IC (2004) Learning from little: comparison of classifiers given little training. In: ECML\/PKDD"},{"key":"653_CR15","unstructured":"Forman G (2003) An extensive empirical study of feature selection metrics for text classification. J\u00a0Mach Learn Res 1289\u20131305"},{"key":"653_CR16","unstructured":"Geist A, Engelmann C (2011) Development of naturally fault tolerant algorithms for computing on 100,000 processors. http:\/\/www.csm.ornl.gov\/~geist\/Lyon2002-geist.pdf"},{"key":"653_CR17","first-page":"130","volume-title":"10th IFIP\/IEEE international workshop on distributed systems: operations and management (DSOM)","author":"B Gruschke","year":"1998","unstructured":"Gruschke B (1998) Integrated event management: event correlation using dependency graphs. In: 10th IFIP\/IEEE international workshop on distributed systems: operations and management (DSOM), pp 130\u2013141"},{"key":"653_CR18","doi-asserted-by":"crossref","unstructured":"Khanna G, Cheng MY, Varadharajan P, Bagchi S, Correia MP, Verissimo PJ (2007) Automated rule-based diagnosis through a distributed monitor system. IEEE Trans Dependable Sec Comput (Dec)","DOI":"10.1109\/TDSC.2007.70211"},{"key":"653_CR19","volume-title":"IEEE METRICS","author":"TM Khoshgoftaar","year":"2001","unstructured":"Khoshgoftaar TM, Allen EB (2001) Controlling overfitting in software quality models: experiments with regression trees and classification. In: IEEE METRICS"},{"key":"653_CR20","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/0164-1212(94)00130-F","volume":"29","author":"TM Khoshgoftaar","year":"1995","unstructured":"Khoshgoftaar TM, Lanning DL (1995) A neural network approach for early detection of program modules having high risk in the maintenance phase. J Syst Softw 29:85\u201391","journal-title":"J Syst Softw"},{"key":"653_CR21","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1023\/A:1024424811345","volume":"8","author":"TM Khoshgoftaar","year":"2003","unstructured":"Khoshgoftaar TM, Seliya N (2003) Fault prediction modeling for software quality estimation: comparing commonly used techniques. Empir Softw Eng 8:255\u2013283","journal-title":"Empir Softw Eng"},{"key":"653_CR22","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1145\/322510.322526","volume":"2","author":"T Lane","year":"1999","unstructured":"Lane T, Brodie CE (1999) Temporal sequence learning and data reduction for anomaly detection. ACM Trans Inf Syst Secur 2:295\u2013331","journal-title":"ACM Trans Inf Syst Secur"},{"key":"653_CR23","volume-title":"Intrusion detection: a survey","author":"A Lazarevic","year":"2006","unstructured":"Lazarevic A, Kumar V, Srivastava J (2006) Intrusion detection: a survey, vol 5. Springer, New York"},{"key":"653_CR24","volume-title":"New security paradigms workshop","author":"C Marceau","year":"2000","unstructured":"Marceau C (2000) Characterizing the behavior of a program using multiple-length N-grams. In: New security paradigms workshop, Cork, Ireland"},{"key":"653_CR25","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/12.980003","volume":"51","author":"R Maxion","year":"2002","unstructured":"Maxion R, Tand KMC (2002) Anomaly detection in embedded systems. IEEE Trans Comput 51:108\u2013120","journal-title":"IEEE Trans Comput"},{"key":"653_CR26","volume-title":"Proc of the ninth international software metrics symposium","author":"AP Nikora","year":"2003","unstructured":"Nikora AP, Munson JC (2003) Developing fault predictors for evolving software systems. In: Proc of the ninth international software metrics symposium"},{"key":"653_CR27","unstructured":"Partow A (2011) http:\/\/www.partow.net\/programming\/hashfunctions\/#Available . HashFunctions"},{"key":"653_CR28","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1109\/CSMR.2002.995794","volume-title":"Proc of the sixth European conference on software maintenance and reengineering","author":"TSY Ping","year":"2002","unstructured":"Ping TSY, Muller H (2002) Predicting fault proneness using OO metrics. An industrial case study. In: Proc of the sixth European conference on software maintenance and reengineering, pp 99\u2013107"},{"key":"653_CR29","first-page":"81","volume":"1","author":"JR Quinlan","year":"1986","unstructured":"Quinlan JR (1986) Induction of decision trees. Mach Learn 1:81\u2013106","journal-title":"Mach Learn"},{"key":"653_CR30","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1109\/MICRO.2001.991120","volume-title":"Proceedings of the 34th annual ACM\/IEEE international symposium on microarchitecture","author":"J Ray","year":"2001","unstructured":"Ray J, Hoe JC, Falsafi B (2001) Dual use of superscalar datapath for transient-fault detection and recovery. In: Proceedings of the 34th annual ACM\/IEEE international symposium on microarchitecture. IEEE Computer Society Press, Los Alamitos, pp 214\u2013224"},{"key":"653_CR31","volume-title":"Proc of the 27th annual international symposium on computer architecture","author":"S Reinhardt","year":"2000","unstructured":"Reinhardt S, Mukherjee S (2000) Transient fault detection via simultaneous multithreading. In: Proc of the 27th annual international symposium on computer architecture"},{"key":"653_CR32","doi-asserted-by":"crossref","unstructured":"Reis GAC, Chang J, Vachharajani N, Rangan R, August DI (2005) SWIFT: software implemented fault tolerance. Code Gener Optim 243\u2013254","DOI":"10.1109\/CGO.2005.34"},{"key":"653_CR33","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/ISSRE.1997.630869","volume-title":"Proceedings of the eighth international symposium on software reliability engineering","author":"R Takahashi","year":"1997","unstructured":"Takahashi R, Muraoka Y, Nakamura Y (1997) Building software quality classification trees: approach, experimentation, evaluation. In: Proceedings of the eighth international symposium on software reliability engineering. IEEE Computer Society Press, Los Alamitos, pp 222\u2013233"},{"issue":"11","key":"653_CR34","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MC.2009.341","volume":"42","author":"J Torrellas","year":"2009","unstructured":"Torrellas J (2009) Architectures for extreme-scale computing. Computer 42(11):28\u201335","journal-title":"Computer"},{"key":"653_CR35","unstructured":"TPC-W (2005) http:\/\/www.tpc.org\/tpcw , April"},{"key":"653_CR36","volume-title":"Data mining for computer security (DMSEC)","author":"R Vargiya","year":"2003","unstructured":"Vargiya R, Chan P (2003) Boundary detection in tokenizing network application payload for anomaly detection. In: Data mining for computer security (DMSEC)"},{"key":"653_CR37","volume-title":"Proceedings of the ninth international symposium on recent advances in intrusion detection","author":"K Wang","year":"2006","unstructured":"Wang K, Parekh JJ, Stolfo SJ (2006) Anagram: a content anomaly detector resistant to mimicry attack. In: Proceedings of the ninth international symposium on recent advances in intrusion detection"},{"key":"653_CR38","unstructured":"Wood A (2011) Data integrity concepts, features, and technology. White paper, Tandem Division, Compaq Computer Corporation"},{"key":"653_CR39","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1002\/qre.392","volume":"17","author":"N Ye","year":"2001","unstructured":"Ye N, Chen Q (2001) An anomaly detection technique based on chi-square statistic. Qual Reliab Eng Int 17:105\u2013112","journal-title":"Qual Reliab Eng Int"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-011-0653-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-011-0653-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-011-0653-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T01:12:54Z","timestamp":1560388374000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-011-0653-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7,22]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,7]]}},"alternative-id":["653"],"URL":"https:\/\/doi.org\/10.1007\/s11227-011-0653-x","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,7,22]]}}}