A survey on device behavior fingerprinting: Data sources, techniques, application scenarios, and datasets
In the current network-based computing world, where the number of interconnected devices
grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at …
grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at …
A systematic review on anomaly detection for cloud computing environments
T Hagemann, K Katsarou - Proceedings of the 2020 3rd Artificial …, 2020 - dl.acm.org
The detection of anomalies in data is a far-reaching field of research which also applies to
the field of cloud computing in several different ways: from the detection of various types of …
the field of cloud computing in several different ways: from the detection of various types of …
iReTADS: An Intelligent Real‐Time Anomaly Detection System for Cloud Communications Using Temporal Data Summarization and Neural Network
A new distributed environment at less financial expenditure on communication over the
Internet is presented by cloud computing. In recent times, the increased number of users has …
Internet is presented by cloud computing. In recent times, the increased number of users has …
Clouddet: Interactive visual analysis of anomalous performances in cloud computing systems
Detecting and analyzing potential anomalous performances in cloud computing systems is
essential for avoiding losses to customers and ensuring the efficient operation of the …
essential for avoiding losses to customers and ensuring the efficient operation of the …
Insight from a docker container introspection
T Watts, RG Benton, WB Glisson… - … Conference on System …, 2019 - par.nsf.gov
Large-scale adoption of virtual containers has stimulated concerns by practitioners and
academics about the viability of data acquisition and reliability due to the decreasing …
academics about the viability of data acquisition and reliability due to the decreasing …
A multilevel learning model for predicting CPU utilization in cloud data centers
M Daraghmeh, A Agarwal… - 2023 IEEE Intl Conf on …, 2023 - ieeexplore.ieee.org
In the contemporary era of cloud computing, efficient and precise prediction of CPU
utilization ensures optimal performance and energy efficiency in data centers. Traditional …
utilization ensures optimal performance and energy efficiency in data centers. Traditional …
Anomaly detection on industrial time series for retaining energy efficiency
P Theumer, R Zeiser, L Trauner, G Reinhart - Procedia CIRP, 2021 - Elsevier
Improving upon or even just retaining energy efficiency at industrial plants presents a rising
challenge. Energy efficiency is gradually lowered due to equipment wear and operating …
challenge. Energy efficiency is gradually lowered due to equipment wear and operating …
Cost‐efficiency disk failure prediction via threshold‐moving
T Jiang, P Huang, K Zhou - Concurrency and Computation …, 2020 - Wiley Online Library
Summary Self‐Monitoring, Analysis, and Reporting Technology (SMART) is a technology in
hard disk drives to predict impending disk failures for data repair in advance. As the …
hard disk drives to predict impending disk failures for data repair in advance. As the …
An Enhanced Seasonal-Hybrid ESD technique for robust anomaly detection on time series
RG Vieira, MA Leone Filho, R Semolini - Anais do XXXVI Simpósio …, 2018 - sol.sbc.org.br
Nowadays, time series data underlies countless research activities. Despite the wide range
of techniques to capture and process all this information, issues such as analyzing large …
of techniques to capture and process all this information, issues such as analyzing large …
Virtual machine migration-based Intrusion Detection System in cloud environment using deep recurrent neural network
BV Srinivas, I Mandal, S Keshavarao - Cybernetics and Systems, 2024 - Taylor & Francis
Cloud system attracts users with the desired features, and in the meanwhile, cloud system
may experience various security issues. An effective intrusion detection system is offered by …
may experience various security issues. An effective intrusion detection system is offered by …