{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T08:36:38Z","timestamp":1770539798726,"version":"3.49.0"},"reference-count":64,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100000924","name":"Multiple Sclerosis Research Australia","doi-asserted-by":"publisher","award":["MRA19EG02"],"award-info":[{"award-number":["MRA19EG02"]}],"id":[{"id":"10.13039\/501100000924","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Visual. Comput. Graphics"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/tvcg.2019.2934613","type":"journal-article","created":{"date-parts":[[2019,8,22]],"date-time":"2019-08-22T19:35:07Z","timestamp":1566502507000},"page":"1-1","source":"Crossref","is-referenced-by-count":32,"title":["CloudDet: Interactive Visual Analysis of Anomalous Performances in Cloud Computing Systems"],"prefix":"10.1109","author":[{"given":"Ke","family":"Xu","sequence":"first","affiliation":[]},{"given":"Yun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Leni","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yifang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Qiao","sequence":"additional","affiliation":[]},{"given":"Si","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Haidong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Huamin","family":"Qu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2016.2534558"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.12904"},{"key":"ref33","first-page":"197","article-title":"Visualization of anomaly detection using prediction sensitivity","volume":"2","author":"laskov","year":"2005","journal-title":"Sicherheit"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289565"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2009.090604"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2014.129"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2003.1250987"},{"key":"ref36","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"maaten","year":"2008","journal-title":"Journal of Machine Learning Research"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ivs.9500089"},{"key":"ref60","year":"0","journal-title":"S5-a labeled anomaly detection dataset"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2494621.2494643"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1023\/B:DAMI.0000023676.72185.7c"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2791120"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2016.0136"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1023\/B:AIRE.0000045502.10941.a9"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2014.2346922"},{"key":"ref29","article-title":"State of the art of performance visualization","author":"isaacs","year":"0","journal-title":"EuroVis"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4193"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1989.10488517"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1972.tb00912.x"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.184"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466443"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46145-0_17"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2004.1334558"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240781"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518897"},{"key":"ref50","first-page":"449","article-title":"On periodicity detection and structural periodic similarity","author":"vlachos","year":"0","journal-title":"Proceedings of the SIAM International Conference on Data Mining"},{"key":"ref51","first-page":"96","article-title":"Online detection of utility cloud anomalies using metric distributions","author":"wang","year":"0","journal-title":"IEEE Network Operations and Management Symposium"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.94"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174237"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2018.2865026"},{"key":"ref56","first-page":"808","article-title":"Bayesian network anomaly pattern detection for disease outbreaks","author":"wong","year":"0","journal-title":"Proceedings of the 20th International Conference on Machine Learning 2003"},{"key":"ref55","first-page":"237","article-title":"Assumption-free anomaly detection in time series","volume":"5","author":"wei","year":"0","journal-title":"SSDBM"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2006.65"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2430834"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2011.5990537"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4169"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2017.2744419"},{"key":"ref40","first-page":"737","article-title":"Visualization for modeling and simulation: visualization methods for time-dependent data-an overview","author":"m\u00fcller","year":"0","journal-title":"Proceedings of the 35th Winter Simulation Conference Driving Innovation"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2015.2467196"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"ref15","first-page":"34","article-title":"One-class SVM for learning in image retrieval","author":"chen","year":"0","journal-title":"Proceedings of International Conference on Image Processing"},{"key":"ref16","first-page":"3","article-title":"STL: A seasonal-trend decomposition","volume":"6","author":"cleveland","year":"1990","journal-title":"Journal of Official Statistics"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4068"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2015.7381796"},{"key":"ref19","author":"few","year":"2008","journal-title":"Time on the horizon visual"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0365-y"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2007.70415"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/956755.956758"},{"key":"ref5","author":"barnett","year":"1974","journal-title":"Outliers in Statistical Data"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"ref49","first-page":"150","article-title":"Visual analysis of collective anomalies through high-order correlationgraph","author":"tao","year":"0","journal-title":"IEEE Pacific Visualization Symposium"},{"key":"ref7","year":"0","journal-title":"Gwa-t-12 bitbrains dataset"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2008.166"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1145\/2492101.1555360","article-title":"Reference-driven performance anomaly identification","volume":"37","author":"shen","year":"2009","journal-title":"ACM Sigmetrics Performance Evaluation Review"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2015.62015"},{"key":"ref48","author":"shyu","year":"2003","journal-title":"A Novel Anomaly Detection Scheme Based on Principal Component Classifier"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860915-0\/50046-9"},{"key":"ref42","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref41","author":"navaz","year":"2013","journal-title":"Entropy based anomaly detection system to prevent DDOS attacks in cloud"},{"key":"ref44","first-page":"173","article-title":"Two-tone pseudo coloring: Compact visualization for one-dimensional data","author":"saito","year":"0","journal-title":"IEEE Symposium on Information Visualization"},{"key":"ref43","first-page":"769","article-title":"Pad: Performance anomaly detection in multi-server distributed systems","author":"peiris","year":"0","journal-title":"IEEE 7th International Conference on Cloud Computing"}],"container-title":["IEEE Transactions on Visualization and Computer Graphics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/2945\/4359476\/08807232.pdf?arnumber=8807232","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:23:31Z","timestamp":1642004611000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8807232\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":64,"URL":"https:\/\/doi.org\/10.1109\/tvcg.2019.2934613","relation":{},"ISSN":["1077-2626","1941-0506","2160-9306"],"issn-type":[{"value":"1077-2626","type":"print"},{"value":"1941-0506","type":"electronic"},{"value":"2160-9306","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}