[1] |
SAHOO R K , OLINER A J , RISH I ,et al. Critical event prediction for proactive management in large scale computer clusters[A]. Proceedings of KDD 2003[C]. Washington,DC,USA, 2003. 426-435.
|
[2] |
FU S , XU C . Exploring event correlation for event prediction in coalitions of clusters[A]. Proceedings of the International Conference for High Performance Computing,Networking,Storage,and Analysis[C]. Reno,USA, 2007. 1-12.
|
[3] |
FU S , XU C . Quantifying temporal and spatial correlation of failure events for proactive management[A]. Proceedings of 26th IEEE International Symposium on Reliable Distributed Systems (SRDS2007)[C]. Beijing,China, 2007. 175-184.
|
[4] |
SALFNER F , TSCHIRPKE S . Error log processing for accurate event prediction[A]. Proceedings of the USENIX Workshop on the Analysis of System Logs(WASL)[C]. San Diego,USA, 2008.
|
[5] |
LOU J G , FU Q , WANG Y ,et al. Mining dependency in distributed systems through unstructured logs analysis[J]. ACM SIGOPS Operating Systems Review archive, 2010,44(1): 91-96.
|
[6] |
OLINER A , STEARLEY J . What supercomputers say:a study of five system logs[A]. Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07)[C]. Edinburgh,UK, 2007. 575-584.
|
[7] |
ROUILLARD J P . Real-time log file analysis using the simple event correlator (SEC)[A]. Proceedings of LISA '04:Eighteenth Systems Administration Conference[C]. Atlanta,USA, 2004. 233-150.
|
[8] |
TANG D , IYER R K . Analysis and modeling of correlated failures in multicomputer systems[J]. IEEE Transactions on Computers, 1992,41(5): 567-577.
|
[9] |
OLINER A J , AIKEN A , STEARLEY J . Alert Detection in Logs[A]. Proceedings of Eighth IEEE International Conference on Data Mining (ICDM'08)[C]. Pisa,Italy, 2008. 959-964.
|
[10] |
张有东, 曾庆凯, 王建东 . 网络协同取证计算研究[J]. 计算机学报, 2010,33(3): 504-513. ZHANG Y D , ZENG Q K , WANG J D . Studies of network coordinative forensics computing[J]. Chinese Journal of Computers, 2010,33(3): 504-513.
|
[11] |
伏晓, 石进, 谢立 . 用于自动证据分析的层次化入侵场景重构方法[J]. 软件学报, 2011,22(5): 996-1008. FU X , SHI J , XIE L . Layered intrusion scenario reconstruction method for automated evidence analysis[J]. Journal of Software, 2011,22(5): 996-1008.
|