Leidinio https://doi.org/10.15388/DAMSS.12.2021The information technology (IT) sector is becoming an area where the highest value-added products are being developed. With the growing importance of IT systems, the public sector and business organizations are becoming responsible for data management and storage. More and more processes are managed by IT systems and the amount of data is constantly increasing, therefore security ensuring is becoming a challenge. Understanding the state of infrastructure and systems is essential for ensuring the reliability and stability of services. Information about the health and performance of the system helps to react to issues and make changes with confidence. One of the best ways to gain insight into the...
Cloud computing is a model for on-demand access to shared resources based on the pay-per-use policy....
International audienceThis paper presents a detection process which utilizes various sensors (camera...
With the increase of network virtualization and the disparity of vendors, the continuous monitoring ...
In today’s world there is lots of data requiring automated processing: nobody can analyze and extrac...
The impact of an anomaly is domain-dependent. In a dataset of network activities, an anomaly can imp...
This thesis aims to uncover anomalies in the data describing the performance behavior of a "robot co...
Kubernetes is a portable, extensible, open-source platform for managing containers. It comes with fe...
In recent years, microservices have gained popularity due to their benefits such as increased mainta...
This thesis investigates the possibility of using anomaly detection on performance data of virtual s...
Anomaly detection systems are usually employed to monitor database activities in order to detect sec...
Monitoring has proved to be a crucial part of the operation lifecycle of any computer system, as it ...
Anomaly detection has shown to be a valuable tool in a variety of application domains, e.g. detectin...
Any attempt to introduce automation into the moni-toringof complex physical systems must start from ...
The purpose of this project is to investigate the application of anomaly detection, particularly con...
This thesis studies ways to detect anomalies in server performance and tests simple implementations ...
Cloud computing is a model for on-demand access to shared resources based on the pay-per-use policy....
International audienceThis paper presents a detection process which utilizes various sensors (camera...
With the increase of network virtualization and the disparity of vendors, the continuous monitoring ...
In today’s world there is lots of data requiring automated processing: nobody can analyze and extrac...
The impact of an anomaly is domain-dependent. In a dataset of network activities, an anomaly can imp...
This thesis aims to uncover anomalies in the data describing the performance behavior of a "robot co...
Kubernetes is a portable, extensible, open-source platform for managing containers. It comes with fe...
In recent years, microservices have gained popularity due to their benefits such as increased mainta...
This thesis investigates the possibility of using anomaly detection on performance data of virtual s...
Anomaly detection systems are usually employed to monitor database activities in order to detect sec...
Monitoring has proved to be a crucial part of the operation lifecycle of any computer system, as it ...
Anomaly detection has shown to be a valuable tool in a variety of application domains, e.g. detectin...
Any attempt to introduce automation into the moni-toringof complex physical systems must start from ...
The purpose of this project is to investigate the application of anomaly detection, particularly con...
This thesis studies ways to detect anomalies in server performance and tests simple implementations ...
Cloud computing is a model for on-demand access to shared resources based on the pay-per-use policy....
International audienceThis paper presents a detection process which utilizes various sensors (camera...
With the increase of network virtualization and the disparity of vendors, the continuous monitoring ...