{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:08:50Z","timestamp":1775912930804,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T00:00:00Z","timestamp":1634256000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T00:00:00Z","timestamp":1634256000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Reliable Intell Environ"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s40860-021-00158-x","type":"journal-article","created":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T19:27:03Z","timestamp":1634326023000},"page":"359-377","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Improved data-driven root cause analysis in fog computing environment"],"prefix":"10.1007","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6463-0509","authenticated-orcid":false,"given":"Chetan","family":"Bulla","sequence":"first","affiliation":[]},{"given":"Mahantesh N.","family":"Birje","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,15]]},"reference":[{"key":"158_CR1","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.sysarc.2019.02.009","volume":"98","author":"A Yousefpour","year":"2019","unstructured":"Yousefpour A et al (2019) All one needs to know about fog computing and related edge computing paradigms: a complete survey. J Syst Architect 98:289\u2013330. https:\/\/doi.org\/10.1016\/j.sysarc.2019.02.009","journal-title":"J Syst Architect"},{"issue":"3","key":"158_CR2","doi-asserted-by":"publisher","first-page":"4732","DOI":"10.35940\/ijrte.C6857.098319","volume":"8","author":"CM Bulla","year":"2019","unstructured":"Bulla CM, Birje MN (2019) Cloud monitoring system: basics, phases and challenges. IJRTE 8(3):4732\u20134746. https:\/\/doi.org\/10.35940\/ijrte.C6857.098319","journal-title":"IJRTE"},{"issue":"4","key":"158_CR3","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s10723-011-9181-4","volume":"9","author":"MN Birje","year":"2011","unstructured":"Birje MN, Manvi SS (2011) Wigrimma: A wireless grid monitoring model using agents. Journal of Grid Computing 9(4):549\u2013572","journal-title":"Journal of Grid Computing"},{"key":"158_CR4","doi-asserted-by":"publisher","unstructured":"Singh H (2020) Big data, industry 4.0 and cyber-physical systems integration: a smart industry context. Mater Today Proc. https:\/\/doi.org\/10.1016\/j.matpr.2020.07.170","DOI":"10.1016\/j.matpr.2020.07.170"},{"key":"158_CR5","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.future.2020.10.015","volume":"116","author":"B Steenwinckel","year":"2021","unstructured":"Steenwinckel B et al (2021) FLAGS: a methodology for adaptive anomaly detection and root cause analysis on sensor data streams by fusing expert knowledge with machine learning. Fut Gen Comput Syst 116:30\u201348. https:\/\/doi.org\/10.1016\/j.future.2020.10.015","journal-title":"Fut Gen Comput Syst"},{"key":"158_CR6","unstructured":"Sol\u00e9 M, Munt\u00e9s-Mulero V, Rana AI, Estrada G (2017) Survey on models and techniques for root cause analysis. arXiv:1701.08546 [cs]. Accessed 23 Mar 2021. [Online]. arXiv:1701.08546"},{"key":"158_CR7","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1016\/j.proeng.2014.02.233","volume":"69","author":"G Andreadis","year":"2014","unstructured":"Andreadis G, Klazoglou P, Niotaki K, Bouzakis K-D (2014) Classification and review of multi-agents systems in the manufacturing section. Proc Eng 69:282\u2013290. https:\/\/doi.org\/10.1016\/j.proeng.2014.02.233","journal-title":"Proc Eng"},{"issue":"1","key":"158_CR8","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1016\/j.eswa.2014.06.037","volume":"42","author":"YY Wee","year":"2015","unstructured":"Wee YY, Cheah WP, Tan SC, Wee K (2015) A method for root cause analysis with a Bayesian belief network and fuzzy cognitive map. Expert Syst Appl 42(1):468\u2013487. https:\/\/doi.org\/10.1016\/j.eswa.2014.06.037","journal-title":"Expert Syst Appl"},{"key":"158_CR9","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1016\/j.future.2018.12.002","volume":"95","author":"S Lu","year":"2019","unstructured":"Lu S, Wei X, Rao B, Tak B, Wang L, Wang L (2019) LADRA: log-based abnormal task detection and root cause analysis in big data processing with Spark. Fut Gen Comput Syst 95:392\u2013403. https:\/\/doi.org\/10.1016\/j.future.2018.12.002","journal-title":"Fut Gen Comput Syst"},{"issue":"2","key":"158_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3392149","volume":"4","author":"F Lin","year":"2020","unstructured":"Lin F, Muzumdar K, Laptev NP, Curelea M-V, Lee S, Sankar S (2020) Fast dimensional analysis for root cause investigation in a large-scale service environment. Proc ACM Meas Anal Comput Syst 4(2):1\u201323. https:\/\/doi.org\/10.1145\/3392149","journal-title":"Proc ACM Meas Anal Comput Syst"},{"key":"158_CR11","doi-asserted-by":"publisher","first-page":"110432","DOI":"10.1016\/j.jss.2019.110432","volume":"159","author":"\u00c1 Brand\u00f3n","year":"2020","unstructured":"Brand\u00f3n \u00c1, Sol\u00e9 M, Hu\u00e9lamo A, Solans D, P\u00e9rez MS, Munt\u00e9s-Mulero V (2020) Graph-based root cause analysis for service-oriented and microservice architectures. J Syst Softw 159:110432. https:\/\/doi.org\/10.1016\/j.jss.2019.110432","journal-title":"J Syst Softw"},{"key":"158_CR12","doi-asserted-by":"publisher","first-page":"106527","DOI":"10.1016\/j.knosys.2020.106527","volume":"211","author":"C Liu","year":"2021","unstructured":"Liu C, Lore KG, Jiang Z, Sarkar S (2021) Root cause analysis for time-series anomalies via spatiotemporal graphical modeling in distributed complex systems. Knowl-Based Syst 211:106527. https:\/\/doi.org\/10.1016\/j.knosys.2020.106527","journal-title":"Knowl-Based Syst"},{"key":"158_CR13","unstructured":"Li W, Johan T, Erik E, Odej K (2020) MicroRCA: Root cause Localization of Performance Issues in Microservices. IEEE\/IFIP network operations and management symposium (NOMS), Budapest, Hungary"},{"key":"158_CR14","unstructured":"Stamatis DH (2003) Failure mode and effect analysis: FMEA from theory to execution. Quality Press"},{"issue":"3","key":"158_CR15","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1109\/TR.1985.5222114","volume":"34","author":"W-S Lee","year":"1985","unstructured":"Lee W-S et al (1985) Fault tree analysis, methods, and applications: a review. IEEE Trans Reliab 34(3):194\u2013203","journal-title":"IEEE Trans Reliab"},{"key":"158_CR16","doi-asserted-by":"publisher","first-page":"1013","DOI":"10.1007\/s10822-020-00314-0","volume":"34","author":"R Rodr\u00edguez-P\u00e9rez","year":"2020","unstructured":"Rodr\u00edguez-P\u00e9rez R, Bajorath J (2020) Interpretation of machine learning models using shapley values: application to compound potency and multi-target activity predictions. J Comput Aided Mol Des 34:1013\u20131026. https:\/\/doi.org\/10.1007\/s10822-020-00314-0","journal-title":"J Comput Aided Mol Des"},{"issue":"12","key":"158_CR17","doi-asserted-by":"publisher","first-page":"3493","DOI":"10.3390\/en11123493","volume":"11","author":"C Tian","year":"2018","unstructured":"Tian C et al (2018) A deep neural network model for short-term load forecast based on long short-term memory network and convolutional neural network. Energies 11(12):3493","journal-title":"Energies"},{"key":"158_CR18","doi-asserted-by":"crossref","unstructured":"Sakurada M, Takehisa Y (2014) Anomaly detection using autoencoders with nonlinear dimensionality reduction. Proceedings of the MLSDA 2014 2nd Workshop on Machine Learning for Sensory Data Analysis","DOI":"10.1145\/2689746.2689747"},{"issue":"1","key":"158_CR19","doi-asserted-by":"publisher","first-page":"73","DOI":"10.4018\/IJCAC.2021010104","volume":"11","author":"CM Bulla","year":"2021","unstructured":"Bulla CM, Birje MN (2021) A multi-agent-based data collection and aggregation model for fog-enabled cloud monitoring. Int J Cloud Appl Comput 11(1):73\u201392. https:\/\/doi.org\/10.4018\/IJCAC.2021010104","journal-title":"Int J Cloud Appl Comput"},{"key":"158_CR20","doi-asserted-by":"publisher","first-page":"101039","DOI":"10.1016\/j.ecoinf.2019.101039","volume":"56","author":"MV Garc\u00eda","year":"2020","unstructured":"Garc\u00eda MV, Jos\u00e9 LA (2020) Shapley additive explanations for NO2 forecasting. Ecol Inf 56:101039","journal-title":"Ecol Inf"},{"key":"158_CR21","doi-asserted-by":"crossref","unstructured":"Kaur H et al (2020) Interpreting interpretability: understanding data scientists\u2019 use of interpretability tools for machine learning. In: Proceedings of the 2020 CHI conference on human factors in computing systems","DOI":"10.1145\/3313831.3376219"},{"key":"158_CR22","doi-asserted-by":"publisher","unstructured":"Davis N, Raina G, Jagannathan K (2019) LSTM-based anomaly detection: detection rules from extreme value theory. arXiv:1909.06041 [cs, stat], vol. 11804, pp. 572\u2013583, https:\/\/doi.org\/10.1007\/978-3-030-30241-2-48","DOI":"10.1007\/978-3-030-30241-2-48"},{"key":"158_CR23","doi-asserted-by":"crossref","unstructured":"Gjorgiev L, Gievska S (2020) Time series anomaly detection with variational autoencoder using Mahalanobis distance. In: Dimitrova V, Dimitrovski I (eds) ICT innovations, machine learning and applications, Springer, Cham 1316:42\u201355","DOI":"10.1007\/978-3-030-62098-1_4"},{"key":"158_CR24","unstructured":"NASA Turbofan Jet Engine Data Set: Run to Failure Degradation Simulation. https:\/\/www.kaggle.com\/behrad3d\/nasa-cmaps [updated on 26-07-2019]"},{"key":"158_CR25","doi-asserted-by":"crossref","unstructured":"Lempinen H (2012) Constructing a Design Framework for Performance Dashboards. In: Keller C, Wiberg M, \u00c5gerfalk PJ, Eriksson JSZ Lundstr\u00f6m (eds) Nordic contributions in IS research, vol. 124. Springer, Berlin, pp 109\u2013130","DOI":"10.1007\/978-3-642-32270-9_7"},{"key":"158_CR26","unstructured":"\u201cShap Documentation\u201d, https:\/\/shap.readthedocs.io\/en\/latest\/"},{"key":"158_CR27","doi-asserted-by":"crossref","unstructured":"Jiang Y, Sun H, Ding J, Liu Y (2015) A data transmission method for resource monitoring under cloud computing environment. IJGDC 8(2), 15\u201324. https:\/\/doi.org\/10.14257\/ijgdc.2015.8.2.03","DOI":"10.14257\/ijgdc.2015.8.2.03"},{"key":"158_CR28","doi-asserted-by":"publisher","unstructured":"Huang H, Wang L (2010) P&P: a combined push-pull model for resource monitoring in cloud computing environment. In: 2010 IEEE 3rd international conference on cloud computing, Miami, FL, pp 260\u2013267. https:\/\/doi.org\/10.1109\/CLOUD.2010.85","DOI":"10.1109\/CLOUD.2010.85"},{"key":"158_CR29","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1016\/j.ins.2016.06.009","volume":"370\u2013371","author":"X Lu","year":"2016","unstructured":"Lu X, Yin J, Xiong NN, Deng S, He G, Yu H (2016) JTangCMS: an efficient monitoring system for cloud platforms. Inf Sci 370\u2013371:402\u2013423. https:\/\/doi.org\/10.1016\/j.ins.2016.06.009","journal-title":"Inf Sci"},{"key":"158_CR30","doi-asserted-by":"publisher","unstructured":"Zhang R, Zou Q (2018) Time series prediction and anomaly detection of light curve using LSTM neural network. J Phys Conf Ser 1061:012012. https:\/\/doi.org\/10.1088\/1742-6596\/1061\/1\/012012","DOI":"10.1088\/1742-6596\/1061\/1\/012012"},{"key":"158_CR31","unstructured":"Russo S, Disch A, Blumensaat F, Villez K (2021) Anomaly detection using deep autoencoders for in-situ wastewater systems monitoring data. arXiv:2002.03843"},{"issue":"2","key":"158_CR32","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s41060-019-00186-0","volume":"8","author":"S Maya","year":"2019","unstructured":"Maya S, Ueno K, Nishikawa T (2019) dLSTM: a new approach for anomaly detection using deep learning with delayed prediction. Int J Data Sci Anal 8(2):137\u2013164. https:\/\/doi.org\/10.1007\/s41060-019-00186-0","journal-title":"Int J Data Sci Anal"},{"key":"158_CR33","doi-asserted-by":"publisher","unstructured":"Wu L, Tordsson J, Elmroth E, Kao O (2020) MicroRCA: root cause localization of performance issues in microservices. in: NOMS 2020\u20132020 IEEE\/IFIP network operations and management symposium, Budapest. Hungary 1\u20139. https:\/\/doi.org\/10.1109\/NOMS47738.2020.9110353","DOI":"10.1109\/NOMS47738.2020.9110353"},{"issue":"21","key":"158_CR34","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.ifacol.2018.09.385","volume":"51","author":"W Yue","year":"2018","unstructured":"Yue W, Chen X, Huang K, Zeng Z, Xie Y (2018) Knowledge modeling for root cause analysis of complex systems based on dynamic fuzzy cognitive maps. IFAC-Pap OnLine 51(21):13\u201318. https:\/\/doi.org\/10.1016\/j.ifacol.2018.09.385","journal-title":"IFAC-Pap OnLine"},{"issue":"6","key":"158_CR35","doi-asserted-by":"publisher","first-page":"2166","DOI":"10.3390\/app10062166","volume":"10","author":"J Qiu","year":"2020","unstructured":"Qiu J, Du Q, Yin K, Zhang S-L, Qian C (2020) A causality mining and knowledge graph based method of root cause diagnosis for performance anomaly in cloud applications. Appl Sci 10(6):2166. https:\/\/doi.org\/10.3390\/app10062166","journal-title":"Appl Sci"},{"issue":"9","key":"158_CR36","doi-asserted-by":"publisher","first-page":"1843","DOI":"10.3182\/20130619-3-RU-3018.00057","volume":"46","author":"L Abele","year":"2013","unstructured":"Abele L, Anic M, Gutmann T, Folmer J, Kleinsteuber M, Vogel-Heuser B (2013) Combining knowledge modeling and machine learning for alarm root cause analysis. IFAC Proc 46(9):1843\u20131848. https:\/\/doi.org\/10.3182\/20130619-3-RU-3018.00057","journal-title":"IFAC Proc"},{"key":"158_CR37","doi-asserted-by":"publisher","first-page":"115035","DOI":"10.1016\/j.eswa.2021.115035","volume":"178","author":"K Waghen","year":"2021","unstructured":"Waghen K, Ouali M-S (2021) Multi-level interpretable logic tree analysis: a data-driven approach for hierarchical causality analysis. Expert Syst Appl 178:115035. https:\/\/doi.org\/10.1016\/j.eswa.2021.115035","journal-title":"Expert Syst Appl"},{"key":"158_CR38","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.conengprac.2017.09.021","volume":"70","author":"B Rashidi","year":"2018","unstructured":"Rashidi B, Singh DS, Zhao Q (2018) Data-driven root-cause fault diagnosis for multivariate non-linear processes. Control Eng Pract 70:134\u2013147. https:\/\/doi.org\/10.1016\/j.conengprac.2017.09.021","journal-title":"Control Eng Pract"},{"key":"158_CR39","unstructured":"Steenwinckel B, Heyvaert P, De Paepe D, Janssens O, Vanden Hautte S, Dimou A, De Turck F, Van Hoecke S, Ongenae F (2018) Towards adaptive anomaly detection and root cause analysis by automated extraction of knowledge from risk analyses. In: 9th International Semantic Sensor Networks Workshop, Co-Located with 17th international semantic web conference (ISWC 2018), vol 2213"},{"key":"158_CR40","doi-asserted-by":"publisher","unstructured":"Nanduri A, Sherry L (2016) Anomaly detection in aircraft data using Recurrent Neural Networks (RNN). In: 2016 Integrated Communications Navigation and Surveillance (ICNS), Herndon, VA, USA, pp 5C2-1\u20135C2-8. https:\/\/doi.org\/10.1109\/ICNSURV.2016.7486356","DOI":"10.1109\/ICNSURV.2016.7486356"}],"container-title":["Journal of Reliable Intelligent Environments"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-021-00158-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40860-021-00158-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-021-00158-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,2]],"date-time":"2022-11-02T19:52:21Z","timestamp":1667418741000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40860-021-00158-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,15]]},"references-count":40,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["158"],"URL":"https:\/\/doi.org\/10.1007\/s40860-021-00158-x","relation":{},"ISSN":["2199-4668","2199-4676"],"issn-type":[{"value":"2199-4668","type":"print"},{"value":"2199-4676","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,15]]},"assertion":[{"value":"29 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 September 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 October 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}