Event logs for the analysis of software failures: A rule-based approach M Cinque, D Cotroneo, A Pecchia IEEE Transactions on Software Engineering 39 (6), 806-821, 2012 | 155 | 2012 |
Industry practices and event logging: Assessment of a critical software development process A Pecchia, M Cinque, G Carrozza, D Cotroneo 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 2 …, 2015 | 101 | 2015 |
Improving log-based field failure data analysis of multi-node computing systems A Pecchia, D Cotroneo, Z Kalbarczyk, RK Iyer 2011 IEEE/IFIP 41st International Conference on Dependable Systems …, 2011 | 87 | 2011 |
Microservices monitoring with event logs and black box execution tracing M Cinque, R Della Corte, A Pecchia IEEE transactions on services computing 15 (1), 294-307, 2019 | 68 | 2019 |
Memory leak analysis of mission-critical middleware G Carrozza, D Cotroneo, R Natella, A Pecchia, S Russo Journal of Systems and Software 83 (9), 1556-1567, 2010 | 56 | 2010 |
Assessing and improving the effectiveness of logs for the analysis of software faults M Cinque, D Cotroneo, R Natella, A Pecchia 2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010 | 54 | 2010 |
AutoLog: Anomaly detection by deep autoencoding of system logs M Catillo, A Pecchia, U Villano Expert Systems with Applications 191, 116263, 2022 | 48 | 2022 |
Challenges and directions in security information and event management (SIEM) M Cinque, D Cotroneo, A Pecchia 2018 IEEE International Symposium on Software Reliability Engineering …, 2018 | 45 | 2018 |
Identifying compromised users in shared computing infrastructures: A data-driven bayesian network approach A Pecchia, A Sharma, Z Kalbarczyk, D Cotroneo, RK Iyer 2011 IEEE 30th International Symposium on Reliable Distributed Systems, 127-136, 2011 | 41 | 2011 |
Automated root cause identification of security alerts: Evaluation in a SaaS Cloud D Cotroneo, A Paudice, A Pecchia Future Generation Computer Systems 56, 375-387, 2016 | 40 | 2016 |
Rt-cases: Container-based virtualization for temporally separated mixed-criticality task sets M Cinque, R Della Corte, A Eliso, A Pecchia 31st Euromicro Conference on Real-Time Systems (ECRTS 2019), 2019 | 38 | 2019 |
Detection of software failures through event logs: An experimental study A Pecchia, S Russo 2012 IEEE 23rd International Symposium on Software Reliability Engineering …, 2012 | 38 | 2012 |
CPS-GUARD: Intrusion detection for cyber-physical systems and IoT devices using outlier-aware deep autoencoders M Catillo, A Pecchia, U Villano Computers & Security 129, 103210, 2023 | 32 | 2023 |
Contextual filtering and prioritization of computer application logs for security situational awareness M Cinque, R Della Corte, A Pecchia Future Generation Computer Systems 111, 668-680, 2020 | 32 | 2020 |
Transferability of machine learning models learned from public intrusion detection datasets: the CICIDS2017 case study M Catillo, A Del Vecchio, A Pecchia, U Villano Software Quality Journal 30 (4), 955-981, 2022 | 31 | 2022 |
Assessing direct monitoring techniques to analyze failures of critical industrial systems M Cinque, D Cotroneo, R Della Corte, A Pecchia 2014 IEEE 25th international symposium on software reliability engineering …, 2014 | 31 | 2014 |
A logging approach for effective dependability evaluation of complex systems M Cinque, D Cotroneo, A Pecchia 2009 Second International Conference on Dependability, 105-110, 2009 | 29 | 2009 |
Debugging‐workflow‐aware software reliability growth analysis M Cinque, D Cotroneo, A Pecchia, R Pietrantuono, S Russo Software Testing, Verification and Reliability 27 (7), e1638, 2017 | 28 | 2017 |
Characterizing direct monitoring techniques in software systems M Cinque, D Cotroneo, R Della Corte, A Pecchia IEEE Transactions on Reliability 65 (4), 1665-1681, 2016 | 26 | 2016 |
Filtering security alerts for the analysis of a production saas cloud A Pecchia, D Cotroneo, R Ganesan, S Sarkar 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing …, 2014 | 26 | 2014 |