共 37 条
[1]
An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment
[J].
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS,
2018, 7
[2]
Survey on Anomaly Detection using Data Mining Techniques
[J].
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015,
2015, 60
:708-713
[3]
Performance Evaluation of Microservices Architectures using Containers
[J].
2015 IEEE 14TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA),
2015,
:27-34
[4]
[Anonymous], JAEGEROPEN SOURC END
[5]
archive.eclipse, TRACECOMPASS EASE SC
[6]
Desnoyers M., 2006, OLS OTT LIN S CIT, V2006, P209
[7]
DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1285-1298
[8]
Fay: Extensible Distributed Tracing from Kernels to Clusters
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
2012, 30 (04)
[9]
On Improving Deep Learning Trace Analysis with System Call Arguments
[J].
2021 IEEE/ACM 18TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2021),
2021,
:120-130
[10]
Service Dependency Graph Analysis in Microservice Architecture
[J].
PERSPECTIVES IN BUSINESS INFORMATICS RESEARCH, BIR 2020,
2020, 398
:128-139