Author of the publication

Micro2vec: Anomaly detection in microservices systems by mining numeric representations of computer logs.

, , and . J. Netw. Comput. Appl., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding the Error Behavior of Complex Critical Software Systems through Field Data.. University of Naples Federico II, Italy, (2016)base-search.net (ftunivnapoli:oai:fedoa.unina.it:11105).A graph-based approach to detect unexplained sequences in a log., , , and . Expert Syst. Appl., (2021)Criticality-aware Monitoring and Orchestration for Containerized Industry 4.0 Environments., , , and . ACM Trans. Embed. Comput. Syst., 23 (1): 5:1-5:28 (January 2024)Achieving Isolation in Mixed-Criticality Industrial Edge Systems with Real-Time Containers., , , and . ECRTS, volume 231 of LIPIcs, page 15:1-15:23. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)Hierarchical Scheduling for Real-Time Containers in Mixed-Criticality Systems., , and . ISSRE Workshops, page 286-287. IEEE, (2021)Message from the RSDA 2022 Workshop Chairs., , , and . ISSRE Workshops, page xxix. IEEE, (2022)RunPHI: Enabling Mixed-criticality Containers via Partitioning Hypervisors in Industry 4.0., , , , , and . ISSRE Workshops, page 134-135. IEEE, (2022)Preventing timing failures in mixed-criticality clouds with dynamic real-time containers., , and . EDCC, page 17-24. IEEE, (2021)Error Monitoring for Legacy Mission-Critical Systems., , and . DSN Workshops, page 66-71. IEEE Computer Society, (2016)Micro2vec: Anomaly detection in microservices systems by mining numeric representations of computer logs., , and . J. Netw. Comput. Appl., (2022)