共 18 条
- [1] [Anonymous], 2015, ADV NEURAL INFORM PR
- [2] Basseville M, 1993, DETECTION ABRUPT CHA
- [3] Beitzel S. M., 2004, Proceedings of Sheffield SIGIR 2004. The Twenty-Seventh Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, P321, DOI 10.1145/1008992.1009048
- [4] Charette R., STAGGERING IMPACT IT
- [5] Dorigo M., 1997, IEEE Transactions on Evolutionary Computation, V1, P53, DOI 10.1109/4235.585892
- [6] Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis [J]. 2009 9TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, 2009, : 149 - +
- [7] Glerum K, 2009, SOSP'09: PROCEEDINGS OF THE TWENTY-SECOND ACM SIGOPS SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES, P103
- [8] Hartigan J. A., 1979, Applied Statistics, V28, P100, DOI 10.2307/2346830
- [9] Experience Report: System Log Analysis for Anomaly Detection [J]. 2016 IEEE 27TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2016, : 207 - 218
- [10] Failure prediction in IBM BlueGene/L event logs [J]. ICDM 2007: PROCEEDINGS OF THE SEVENTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, 2007, : 583 - +