LS-ADT: Lightweight and scalable anomaly detection for cloud datacentres
© Springer International Publishing Switzerland 2016. Cloud data centres are implemented as large-scale clusters with demanding requirements for service performance, availability and cost of operation. As a result of scale and complexity, data centres typically exhibit large numbers of system anomal...
| Main Authors: | Barbhuiya, Salim, Papazachos, Z., Kilpatrick, P., Nikolopoulos, D. |
|---|---|
| Format: | Conference Paper |
| Published: |
2016
|
| Online Access: | http://hdl.handle.net/20.500.11937/55175 |
Similar Items
A lightweight tool for anomaly detection in cloud data centres
by: Barbhuiya, Salim, et al.
Published: (2015)
by: Barbhuiya, Salim, et al.
Published: (2015)
LS-DYNA for beginners: an insight into Ls-Prepost and Ls-Dyna
by: Hussain Shah, Qasim, et al.
Published: (2012)
by: Hussain Shah, Qasim, et al.
Published: (2012)
Sistem arkib dalam talian ADT / ODS / Nurul Azri Mohd Radzi
by: Nurul Azri, Mohd Radzi
Published: (2001)
by: Nurul Azri, Mohd Radzi
Published: (2001)
Challenges and Opportunities in Edge Computing
by: Varghese, B., et al.
Published: (2016)
by: Varghese, B., et al.
Published: (2016)
From LS-PREPOST to LS-DYNA: an introduction: LS-Dyna for beginners with 13 step by step solved examples
by: Shah, Qasim Hussain, et al.
Published: (2011)
by: Shah, Qasim Hussain, et al.
Published: (2011)
Scalable Data-agnostic Processing Model with a Priori Scheduling for the Cloud
by: Tan, Rong Kun Jason
Published: (2019)
by: Tan, Rong Kun Jason
Published: (2019)
Scalability enhancement for cloud-based applications using software oriented methods
by: Rana, Muhammad Ehsan, et al.
Published: (2019)
by: Rana, Muhammad Ehsan, et al.
Published: (2019)
Cloud-to-cloud data transfer parallelization framework via spawning intermediate instances for scalable data migration
by: Boey, Calvin Mun Lek
Published: (2019)
by: Boey, Calvin Mun Lek
Published: (2019)
Strength Recovery of Lightweight Concrete under Elevated Temperature
by: Barbhuiya, Salim, et al.
Published: (2014)
by: Barbhuiya, Salim, et al.
Published: (2014)
Fault detection of broken rotor bar in LS-PMSM using random forests
by: Quiroz, Juan C., et al.
Published: (2018)
by: Quiroz, Juan C., et al.
Published: (2018)
An Automated Scalable Framework for Distributing Radio Astronomy Processing Across Clusters and Clouds
by: Mechev, A., et al.
Published: (2017)
by: Mechev, A., et al.
Published: (2017)
Dempster-Shafer for Anomaly Detection
by: Chen, Qi, et al.
Published: (2006)
by: Chen, Qi, et al.
Published: (2006)
Dendritic Cells for Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
Detection of Cross-Channel Anomalies
by: Pham, DucSon, et al.
Published: (2012)
by: Pham, DucSon, et al.
Published: (2012)
Traffic Scene Anomaly Detection
by: Lu, Cai An
Published: (2017)
by: Lu, Cai An
Published: (2017)
SCARECROW: scalable malware reporting, detection and analysis
by: Barakat, Osamah Lutf Hamood, et al.
Published: (2013)
by: Barakat, Osamah Lutf Hamood, et al.
Published: (2013)
UPM's INSPEM to hold EQuaLS 8
by: New Sunday Times,
Published: (2016)
by: New Sunday Times,
Published: (2016)
Secure lightweight client for cloud-based E-Health Model
by: Zhang, Xiaowei
Published: (2023)
by: Zhang, Xiaowei
Published: (2023)
Statistical features analysis of transient current signal for broken bars fault detection in LS-PMSMs
by: Mehrjou, Mohammad Rezazadeh, et al.
Published: (2015)
by: Mehrjou, Mohammad Rezazadeh, et al.
Published: (2015)
Re-engineering grid-based quorum replication into binary vote assignment on cloud: A scalable approach for strong consistency in cloud databases
by: Ainul Azila Che Fauzi, Ainul Azila, et al.
Published: (2025)
by: Ainul Azila Che Fauzi, Ainul Azila, et al.
Published: (2025)
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
Mode I delamination simulation using LS-DYNA
by: Ibrahim, Mohamed S., et al.
Published: (2011)
by: Ibrahim, Mohamed S., et al.
Published: (2011)
An Immune Inspired Approach to Anomaly Detection
by: Twycross, Jamie, et al.
Published: (2007)
by: Twycross, Jamie, et al.
Published: (2007)
Anomaly detection for vision-based inspection
by: Chew, Yan Zhe
Published: (2022)
by: Chew, Yan Zhe
Published: (2022)
The potential use of service-oriented infrastructure framework to enable transparent vertical scalability of cloud computing infrastructure
by: Muchtar, Farkhana, et al.
Published: (2018)
by: Muchtar, Farkhana, et al.
Published: (2018)
The potential use of service-oriented infrastructure framework to enable transparent vertical scalability of cloud computing infrastructure
by: Muchtar, Farkhana, et al.
Published: (2018)
by: Muchtar, Farkhana, et al.
Published: (2018)
Dendritic Cells for Real-Time Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
Generative Models for Anomaly Detection and Its Applications
by: Yu, Jongmin
Published: (2020)
by: Yu, Jongmin
Published: (2020)
Anomaly Detection Framework for PingER Data
by: Danny Wilson, Mandai, et al.
Published: (2015)
by: Danny Wilson, Mandai, et al.
Published: (2015)
Anomaly detection with Attention-based deep autoencoder
by: Yong, Hong Long
Published: (2022)
by: Yong, Hong Long
Published: (2022)
Broken rotor bar detection in LS-PMSMs based on statistical features analysis of start-up current envelope
by: Mehrjou, Mohammad Rezazadeh, et al.
Published: (2015)
by: Mehrjou, Mohammad Rezazadeh, et al.
Published: (2015)
Broken rotor bar detection in LS-PMSM based on startup current analysis using wavelet entropy features
by: Mehrjou, Mohammad Rezazadeh, et al.
Published: (2017)
by: Mehrjou, Mohammad Rezazadeh, et al.
Published: (2017)
Scalable Text Filtering System
by: Foong, Oi Mean, et al.
Published: (2006)
by: Foong, Oi Mean, et al.
Published: (2006)
Supervised anomaly detection in uncertain pseudoperiodic data streams
by: Ma, Jiangang, et al.
Published: (2016)
by: Ma, Jiangang, et al.
Published: (2016)
A refined filter for UHAD to improve anomaly detection
by: Hajamydeen, Asif Iqbal, et al.
Published: (2016)
by: Hajamydeen, Asif Iqbal, et al.
Published: (2016)
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2007)
by: Greensmith, Julie, et al.
Published: (2007)
Using Transformer Models for Stock Market Anomaly Detection
by: Biriukova, Kseniia, et al.
Published: (2023)
by: Biriukova, Kseniia, et al.
Published: (2023)
Anomaly detection in large-scale data stream networks
by: Pham, DucSon, et al.
Published: (2014)
by: Pham, DucSon, et al.
Published: (2014)
Effective Anomaly detection in Sensor Network Data Streams
by: Pham, DucSon, et al.
Published: (2009)
by: Pham, DucSon, et al.
Published: (2009)
Packet header anomaly detection using statistical analysis
by: Yassin, Warusia, et al.
Published: (2014)
by: Yassin, Warusia, et al.
Published: (2014)
Similar Items
-
A lightweight tool for anomaly detection in cloud data centres
by: Barbhuiya, Salim, et al.
Published: (2015) -
LS-DYNA for beginners: an insight into Ls-Prepost and Ls-Dyna
by: Hussain Shah, Qasim, et al.
Published: (2012) -
Sistem arkib dalam talian ADT / ODS / Nurul Azri Mohd Radzi
by: Nurul Azri, Mohd Radzi
Published: (2001) -
Challenges and Opportunities in Edge Computing
by: Varghese, B., et al.
Published: (2016) -
From LS-PREPOST to LS-DYNA: an introduction: LS-Dyna for beginners with 13 step by step solved examples
by: Shah, Qasim Hussain, et al.
Published: (2011)