{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:13:10Z","timestamp":1750219990323,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,27]],"date-time":"2022-10-27T00:00:00Z","timestamp":1666828800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,27]]},"DOI":"10.1145\/3571697.3571706","type":"proceedings-article","created":{"date-parts":[[2023,2,6]],"date-time":"2023-02-06T23:09:46Z","timestamp":1675724986000},"page":"63-71","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Endpoint-Performance-Monitoring for a better End-User Experience"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5222-954X","authenticated-orcid":false,"given":"Sven","family":"Beckmann","sequence":"first","affiliation":[{"name":"University of Augsburg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9745-8621","authenticated-orcid":false,"given":"Jonas","family":"Till","sequence":"additional","affiliation":[{"name":"University of Augsburg, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7931-1105","authenticated-orcid":false,"given":"Bernhard","family":"Bauer","sequence":"additional","affiliation":[{"name":"University of Augsburg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,2,6]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Retrieved","author":"Glossary Forrester","year":"2022","unstructured":"Forrester Glossary . End-user experience management . Retrieved May 10, 2022 from https:\/\/forrester.com\/staticassets\/glossary.html Forrester Glossary. End-user experience management. Retrieved May 10, 2022 from https:\/\/forrester.com\/staticassets\/glossary.html"},{"key":"e_1_3_2_1_2_1","volume-title":"Data Mining: Concepts and Techniques","author":"Han Jiawei","year":"2011","unstructured":"Jiawei Han , Micheline Kamber , Jian Pei . 2011 . Data Mining: Concepts and Techniques . Third Edition. Elsevier Jiawei Han, Micheline Kamber, Jian Pei. 2011. Data Mining: Concepts and Techniques. Third Edition. Elsevier"},{"key":"e_1_3_2_1_3_1","volume-title":"Kanoksri Sarinnapakorn and LiWu Chang","author":"Shyu Mei-Ling","year":"2003","unstructured":"Mei-Ling Shyu , Shu-Ching Chen , Kanoksri Sarinnapakorn and LiWu Chang . 2003 . A novel anomaly detection scheme based on principal component classifier. Miami Univ Coral Gables Fl Dept of Electrical and Computer Engineering . Mei-Ling Shyu, Shu-Ching Chen, Kanoksri Sarinnapakorn and LiWu Chang. 2003. A novel anomaly detection scheme based on principal component classifier. Miami Univ Coral Gables Fl Dept of Electrical and Computer Engineering."},{"volume-title":"Data mining: The textbook","author":"Aggarwal Charu C.","key":"e_1_3_2_1_4_1","unstructured":"Charu C. Aggarwal . 2015. Data mining: The textbook . New York : Springer . https:\/\/doi.org\/10.1007\/978-3-319-14142-8 10.1007\/978-3-319-14142-8 Charu C. Aggarwal. 2015. Data mining: The textbook. New York: Springer. https:\/\/doi.org\/10.1007\/978-3-319-14142-8"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133360.2133363"},{"key":"e_1_3_2_1_6_1","volume-title":"Article 15 (July","author":"Chandola Varun","year":"2009","unstructured":"Varun Chandola , Arindam Banerjee , and Vipin Kumar . 2009. Anomaly detection: A survey. ACM Comput. Surv. 41, 3 , Article 15 (July 2009 ), 58 pages. https:\/\/doi.org\/10.1145\/1541880.1541882 10.1145\/1541880.1541882 Varun Chandola, Arindam Banerjee, and Vipin Kumar. 2009. Anomaly detection: A survey. ACM Comput. Surv. 41, 3, Article 15 (July 2009), 58 pages. https:\/\/doi.org\/10.1145\/1541880.1541882"},{"key":"e_1_3_2_1_7_1","volume-title":"85-126. https:\/\/doi.org\/10.1023\/B:AIRE.0000045502.10941.a9","author":"Hodge Victoria","year":"2004","unstructured":"Victoria Hodge and Jim Austin . 2004. \" A survey of outlier detection methodologies.\" Artificial intelligence review 22.2 ( 2004 ): 85-126. https:\/\/doi.org\/10.1023\/B:AIRE.0000045502.10941.a9 10.1023\/B:AIRE.0000045502.10941.a9 Victoria Hodge and Jim Austin. 2004. \"A survey of outlier detection methodologies.\" Artificial intelligence review 22.2 (2004): 85-126. https:\/\/doi.org\/10.1023\/B:AIRE.0000045502.10941.a9"},{"key":"e_1_3_2_1_8_1","volume-title":"Article 15 (July","author":"Chandola Varun","year":"2009","unstructured":"Varun Chandola , Arindam Banerjee , and Vipin Kumar . 2009. Anomaly detection: A survey. ACM Comput. Surv. 41, 3 , Article 15 (July 2009 ), 58 pages. https:\/\/doi.org\/10.1145\/1541880.1541882 10.1145\/1541880.1541882 Varun Chandola, Arindam Banerjee, and Vipin Kumar. 2009. Anomaly detection: A survey. ACM Comput. Surv. 41, 3, Article 15 (July 2009), 58 pages. https:\/\/doi.org\/10.1145\/1541880.1541882"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/ICDM.2018.00015","volume-title":"IEEE International Conference on Data Mining (ICDM), 2018","author":"Ting Kai Ming","year":"2018","unstructured":"Kai Ming Ting , Sunil Aryal and Takashi Washio . 2018 . Which Outlier Detector Should I use ? IEEE International Conference on Data Mining (ICDM), 2018 , pp. 8 - 8 , https:\/\/doi.org\/10.1109\/ICDM.2018.00015 10.1109\/ICDM.2018.00015 Kai Ming Ting, Sunil Aryal and Takashi Washio. 2018. Which Outlier Detector Should I use? IEEE International Conference on Data Mining (ICDM), 2018, pp. 8-8, https:\/\/doi.org\/10.1109\/ICDM.2018.00015"},{"key":"e_1_3_2_1_10_1","first-page":"9428","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence. 33","author":"Borghesi Andrea","year":"2019","unstructured":"Andrea Borghesi , Andrea Bartolini , Michele Lombardi , Michela Milano and Luca Benini . 2019 . Anomaly Detection Using Autoencoders in High Performance Computing Systems . Proceedings of the AAAI Conference on Artificial Intelligence. 33 , 01 (Jul. 2019), 9428 - 9433 . https:\/\/doi.org\/10.1609\/aaai.v33i01.33019428. 10.1609\/aaai.v33i01.33019428 Andrea Borghesi, Andrea Bartolini, Michele Lombardi, Michela Milano and Luca Benini. 2019. Anomaly Detection Using Autoencoders in High Performance Computing Systems. Proceedings of the AAAI Conference on Artificial Intelligence. 33, 01 (Jul. 2019), 9428-9433. https:\/\/doi.org\/10.1609\/aaai.v33i01.33019428."},{"key":"e_1_3_2_1_11_1","volume-title":"Yuval Elovici and Asaf Shabtai","author":"Mirsky Yisroel","year":"2018","unstructured":"Yisroel Mirsky , Tomer Doitshman , Yuval Elovici and Asaf Shabtai . 2018 . Kitsune : an ensemble of autoencoders for online network intrusion detection. arXiv preprint arXiv:1802.09089. https:\/\/doi.org\/10.14722\/ndss.2018.23204 10.14722\/ndss.2018.23204 Yisroel Mirsky, Tomer Doitshman, Yuval Elovici and Asaf Shabtai. 2018. Kitsune: an ensemble of autoencoders for online network intrusion detection. arXiv preprint arXiv:1802.09089. https:\/\/doi.org\/10.14722\/ndss.2018.23204"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/3122009.3242042"},{"key":"e_1_3_2_1_13_1","volume-title":"Retrieved","author":"Dynatrace","year":"2022","unstructured":"Dynatrace : Digital experience monitoring . Retrieved May 11, 2022 from https:\/\/www.dynatrace.com\/monitoring\/platform\/digital-experience-monitoring\/ Dynatrace: Digital experience monitoring. Retrieved May 11, 2022 from https:\/\/www.dynatrace.com\/monitoring\/platform\/digital-experience-monitoring\/"},{"key":"e_1_3_2_1_14_1","unstructured":"Jonah Kowall and Cappelli Will. 2012. Magic quadrant for application performance monitoring. Gartner Research ID G 232180  Jonah Kowall and Cappelli Will. 2012. Magic quadrant for application performance monitoring. Gartner Research ID G 232180"},{"key":"e_1_3_2_1_15_1","volume-title":"Retrieved","author":"Hawes Carry","year":"2022","unstructured":"Carry Hawes . 2022 . What is real user monitoring ? Retrieved May 14, 2022 from https:\/\/www.dynatrace.com\/news\/blog\/what-is-real-user-monitoring\/ Carry Hawes. 2022. What is real user monitoring? Retrieved May 14, 2022 from https:\/\/www.dynatrace.com\/news\/blog\/what-is-real-user-monitoring\/"},{"key":"e_1_3_2_1_16_1","volume-title":"Q4","author":"Hewitt Andrew","year":"2020","unstructured":"Andrew Hewitt . 2020. The Forrester New WaveTM: End-User Experience Management , Q4 2020 . The 11 Providers That Matter Most And How They Stack Up . Andrew Hewitt. 2020. The Forrester New WaveTM: End-User Experience Management, Q4 2020. The 11 Providers That Matter Most And How They Stack Up."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2932769"}],"event":{"name":"ESSE 2022: 2022 The 3rd European Symposium on Software Engineering","acronym":"ESSE 2022","location":"Rome Italy"},"container-title":["2022 The 3rd European Symposium on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3571697.3571706","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3571697.3571706","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:33Z","timestamp":1750182573000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3571697.3571706"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,27]]},"references-count":17,"alternative-id":["10.1145\/3571697.3571706","10.1145\/3571697"],"URL":"https:\/\/doi.org\/10.1145\/3571697.3571706","relation":{},"subject":[],"published":{"date-parts":[[2022,10,27]]},"assertion":[{"value":"2023-02-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}