Experience report: Anomaly detection of cloud application operations using log and cloud metric correlation analysis

M Farshchi, JG Schneider, I Weber… - 2015 IEEE 26th …, 2015 - ieeexplore.ieee.org
Failure of application operations is one of the main causes of system-wide outages in cloud
environments. This particularly applies to DevOps operations, such as backup …

Lightweight collaborative anomaly detection for the IoT using blockchain

Y Mirsky, T Golomb, Y Elovici - Journal of Parallel and Distributed …, 2020 - Elsevier
Due to their rapid growth and deployment, the Internet of things (IoT) have become a central
aspect of our daily lives. Unfortunately, IoT devices tend to have many vulnerabilities which …

An intrusion detection scheme based on anomaly mining in Internet of Things

R Fu, K Zheng, D Zhang, Y Yang - 2011 - IET
Internet of things (IOT) is vulnerable to malicious attacks because of opening deployment
and limited resources. It's heterogeneous and distributed characters make conventional …

Tackling the big data 4 vs for anomaly detection

J Camacho, G Macia-Fernandez… - … IEEE conference on …, 2014 - ieeexplore.ieee.org
In this paper, a framework for anomaly detection and forensics in Big Data is introduced. The
framework tackles the Big Data 4 Vs: Variety, Veracity, Volume and Velocity. The varied …

Toward accurate anomaly detection in industrial internet of things using hierarchical federated learning

X Wang, S Garg, H Lin, J Hu… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) is an emerging technology that can promote the
development of industrial intelligence, improve production efficiency, and reduce …

Smart anomaly detection using data-driven techniques in iot edge: a survey

J Manokaran, G Vairavel - Proceedings of Third International Conference …, 2022 - Springer
In this article, we survey the different data-driven techniques for smart anomaly detection at
the Internet of Things (IoT) edge. Anomaly detection is a significant study issue because of …

Anomaly detection methods for IIoT networks

L Zhou, H Guo - … on Service Operations and Logistics, and …, 2018 - ieeexplore.ieee.org
IIoT networks are different from general IT networks such as office or business networks
where multiple various types of applications, protocols and traffic profiles are presented, and …

Outlier detection in sensed data using statistical learning models for IoT

N Nesa, T Ghosh, I Banerjee - 2018 IEEE Wireless …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) devices are composed of millions of sensors that continuously sense
environmental parameters which are effectively fused to gain insights on a particular area or …

Machine learning techniques for security of Internet of Things (IoT) and fog computing systems

M Moh, R Raju - … on High Performance Computing & Simulation …, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) is a network of interconnected computing devices having the
ability to transfer data over a network, without needing human interaction. Software and …

Technical issues of forensic investigations in cloud computing environments

D Birk, C Wegener - 2011 Sixth IEEE international workshop on …, 2011 - ieeexplore.ieee.org
Cloud Computing is arguably one of the most discussed information technologies today. It
presents many promising technological and economical opportunities. However, many …