A Grid computing site consists of various services including Grid middlewares, such as Computing Element, Storage Element and so on. Ensuring a safe and stable operation of the services is a key role of site administrators. Logs produced by the services provide useful information for understanding the status of the site. However, it is a time-consuming task for site administrators to monitor and analyze the service logs everyday. Therefore, a support framework (gridalert), which detects anomaly logs and alerts to site administrators, has been developed using Machine Learning techniques. Typical classifications using Machine Learning require pre-defined labels. It is difficult to collect a large amount of anomaly logs to build a Machine ...
The only way for the world to move into the bright future is to move from nonrenewable resources in...
Malicious attack detection is one of the critical cyber-security challenges in the peer-to-peer smar...
Anomaly detection is the process of finding outliers in data. This report will explore the use of un...
A Grid computing site is composed of various services including Grid middleware, such as Computing E...
The IHEP local cluster is a middle-sized HEP data center which consists of 20'000 CPU slots, hundred...
This thesis investigates the possibility of using anomaly detection on performance data of virtual s...
This paper introduces a generic and scalable anomaly detection framework. Anomaly detection can impr...
With the explosion of the number of distributed applications, a new dynamic server environment emerg...
Anomalies in data can be of great importance as they often indicate faulty behaviour. Locating these...
Network anomaly detection system enables to monitor computer network that behaves differently from t...
Annually, the Large Hadron Collider (LHC) demands a huge amount of computing resources to deal with ...
The occurrence of anomalies and unexpected, process-related faults is a major problem for manufactur...
The power system complexity and associated stability problems are greatly linked to the increasing p...
Anomaly detection has become a crucial part of the protection of information and integrity. Due to t...
The smart grid integrates Information and Communication Technologies (ICT) into the traditional powe...
The only way for the world to move into the bright future is to move from nonrenewable resources in...
Malicious attack detection is one of the critical cyber-security challenges in the peer-to-peer smar...
Anomaly detection is the process of finding outliers in data. This report will explore the use of un...
A Grid computing site is composed of various services including Grid middleware, such as Computing E...
The IHEP local cluster is a middle-sized HEP data center which consists of 20'000 CPU slots, hundred...
This thesis investigates the possibility of using anomaly detection on performance data of virtual s...
This paper introduces a generic and scalable anomaly detection framework. Anomaly detection can impr...
With the explosion of the number of distributed applications, a new dynamic server environment emerg...
Anomalies in data can be of great importance as they often indicate faulty behaviour. Locating these...
Network anomaly detection system enables to monitor computer network that behaves differently from t...
Annually, the Large Hadron Collider (LHC) demands a huge amount of computing resources to deal with ...
The occurrence of anomalies and unexpected, process-related faults is a major problem for manufactur...
The power system complexity and associated stability problems are greatly linked to the increasing p...
Anomaly detection has become a crucial part of the protection of information and integrity. Due to t...
The smart grid integrates Information and Communication Technologies (ICT) into the traditional powe...
The only way for the world to move into the bright future is to move from nonrenewable resources in...
Malicious attack detection is one of the critical cyber-security challenges in the peer-to-peer smar...
Anomaly detection is the process of finding outliers in data. This report will explore the use of un...