{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T07:34:00Z","timestamp":1770536040418,"version":"3.49.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/bigdata47090.2019.9005653","type":"proceedings-article","created":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T01:05:34Z","timestamp":1582592734000},"page":"1367-1374","source":"Crossref","is-referenced-by-count":7,"title":["RAMP: Real-Time Anomaly Detection in Scientific Workflows"],"prefix":"10.1109","author":[{"given":"J.","family":"Dinal Herath","sequence":"first","affiliation":[]},{"given":"Changxin","family":"Bai","sequence":"additional","affiliation":[]},{"given":"Guanhua","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Ping","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Shiyong","family":"Lu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2013.57"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0005738"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HPCSim.2016.7568396"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"677","DOI":"10.1093\/nar\/gkq429","article-title":"myexperiment: a repository and social network for the sharing of bioinformatics workflows","volume":"38","author":"goble","year":"2010","journal-title":"Nucleic Acids Research"},{"key":"ref15","first-page":"1","article-title":"Online workflow management and performance analysis with stampede","author":"gunter","year":"2011","journal-title":"International Conference on Network and Service Management"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2014.16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2012.38"},{"key":"ref18","article-title":"Entropy based anomaly detection system to prevent ddos attacks in cloud","author":"navaz","year":"2013","journal-title":"arXiv 1308 6745"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503343"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2494621.2494643"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2018.00018"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0179"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.04.070"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84628-757-2_4"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0085"},{"key":"ref5","first-page":"1","article-title":"Time is of the essence: Machine learning-based intrusion detection in industrial time series data","author":"anton","year":"2018","journal-title":"ICDM Workshops"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"ref7","article-title":"Conformalized density-and distance-based anomaly detection in time-series data","author":"burnaev","year":"2016","journal-title":"arXiv 1608 04585"},{"key":"ref2","article-title":"Bayesian online changepoint detection","author":"adams","year":"2007","journal-title":"arXiv 0710 3742"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2008.5217932"},{"key":"ref1","year":"2019","journal-title":"Numenta"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.014"},{"key":"ref22","first-page":"46","article-title":"Failure analysis of distributed scientific workflows executing in the cloud","author":"samak","year":"2012","journal-title":"8th International Conference on Network and Service Management"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.2011.55"},{"key":"ref24","author":"tan","year":"2012","journal-title":"Online performance anomaly prediction and prevention for complex distributed systems"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-016-5567-7"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0069"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2011.5990537"}],"event":{"name":"2019 IEEE International Conference on Big Data (Big Data)","location":"Los Angeles, CA, USA","start":{"date-parts":[[2019,12,9]]},"end":{"date-parts":[[2019,12,12]]}},"container-title":["2019 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8986695\/9005444\/09005653.pdf?arnumber=9005653","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T17:47:20Z","timestamp":1658080040000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9005653\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/bigdata47090.2019.9005653","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}