{"id":"https://openalex.org/W1976247347","doi":"https://doi.org/10.1109/cnsm.2013.6727825","title":"Identifying missed monitoring alerts based on unstructured incident tickets","display_name":"Identifying missed monitoring alerts based on unstructured incident tickets","publication_year":2013,"publication_date":"2013-10-01","ids":{"openalex":"https://openalex.org/W1976247347","doi":"https://doi.org/10.1109/cnsm.2013.6727825","mag":"1976247347"},"language":"en","primary_location":{"id":"doi:10.1109/cnsm.2013.6727825","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cnsm.2013.6727825","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100723083","display_name":"Liang Tang","orcid":"https://orcid.org/0000-0001-6977-6534"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Liang Tang","raw_affiliation_strings":["School of Computer Science, Florida International University, Miami, FL, USA","Sch. of Comput. Sci., Florida Int. Univ., Miami, FL, USA"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Florida International University, Miami, FL, USA","institution_ids":["https://openalex.org/I19700959"]},{"raw_affiliation_string":"Sch. of Comput. Sci., Florida Int. Univ., Miami, FL, USA","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100455376","display_name":"Tao Li","orcid":"https://orcid.org/0000-0003-1697-8022"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tao Li","raw_affiliation_strings":["School of Computer Science, Florida International University, Miami, FL, USA","Sch. of Comput. Sci., Florida Int. Univ., Miami, FL, USA"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Florida International University, Miami, FL, USA","institution_ids":["https://openalex.org/I19700959"]},{"raw_affiliation_string":"Sch. of Comput. Sci., Florida Int. Univ., Miami, FL, USA","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037060213","display_name":"Larisa Shwartz","orcid":"https://orcid.org/0000-0001-5878-0765"},"institutions":[{"id":"https://openalex.org/I1341412227","display_name":"IBM (United States)","ror":"https://ror.org/05hh8d621","country_code":"US","type":"company","lineage":["https://openalex.org/I1341412227"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Larisa Shwartz","raw_affiliation_strings":["Operational Innovations, IBM T.J. Watson Research Center, Yorktown Heights, NY, USA","Operational Innovations, IBM T.J. Watson Res. Center, Yorktown Heights, NY, USA"],"affiliations":[{"raw_affiliation_string":"Operational Innovations, IBM T.J. Watson Research Center, Yorktown Heights, NY, USA","institution_ids":["https://openalex.org/I1341412227"]},{"raw_affiliation_string":"Operational Innovations, IBM T.J. Watson Res. Center, Yorktown Heights, NY, USA","institution_ids":["https://openalex.org/I1341412227"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031125475","display_name":"Genady Ya. Grabarnik","orcid":"https://orcid.org/0000-0001-8068-0920"},"institutions":[{"id":"https://openalex.org/I142823887","display_name":"St. John's University","ror":"https://ror.org/00bgtad15","country_code":"US","type":"education","lineage":["https://openalex.org/I142823887"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Genady Ya. Grabarnik","raw_affiliation_strings":["Dept. Math & Computer Science, St. John's University, Queens, NY, USA","Dept. Math & Comput. Sci., St. John's Univ., Queens, NY, USA"],"affiliations":[{"raw_affiliation_string":"Dept. Math & Computer Science, St. John's University, Queens, NY, USA","institution_ids":["https://openalex.org/I142823887"]},{"raw_affiliation_string":"Dept. Math & Comput. Sci., St. John's Univ., Queens, NY, USA","institution_ids":["https://openalex.org/I142823887"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100723083"],"corresponding_institution_ids":["https://openalex.org/I19700959"],"apc_list":null,"apc_paid":null,"fwci":1.4498,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.83063585,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"143","last_page":"146"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8856961727142334},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5217167735099792},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4708288013935089},{"id":"https://openalex.org/keywords/system-monitoring","display_name":"System monitoring","score":0.4420084059238434},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4075968265533447},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.0829954445362091}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8856961727142334},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5217167735099792},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4708288013935089},{"id":"https://openalex.org/C200749887","wikidata":"https://www.wikidata.org/wiki/Q1165574","display_name":"System monitoring","level":2,"score":0.4420084059238434},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4075968265533447},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0829954445362091},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cnsm.2013.6727825","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cnsm.2013.6727825","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6299999952316284}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W109103174","https://openalex.org/W164902916","https://openalex.org/W1539745582","https://openalex.org/W1564518192","https://openalex.org/W1565377632","https://openalex.org/W1738379222","https://openalex.org/W1953040390","https://openalex.org/W1956559956","https://openalex.org/W1965626898","https://openalex.org/W2006971521","https://openalex.org/W2014080776","https://openalex.org/W2038819732","https://openalex.org/W2053691501","https://openalex.org/W2062826175","https://openalex.org/W2074448485","https://openalex.org/W2114554028","https://openalex.org/W2136159049","https://openalex.org/W2148143831","https://openalex.org/W2148356029","https://openalex.org/W2149684865","https://openalex.org/W2168505553","https://openalex.org/W2325227998","https://openalex.org/W2482589566","https://openalex.org/W2774503693","https://openalex.org/W6606699393","https://openalex.org/W6632363105","https://openalex.org/W6637832812","https://openalex.org/W6684719391","https://openalex.org/W7056068982"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W4402327032","https://openalex.org/W2382290278"],"abstract_inverted_index":{"Automatic":[0],"system":[1,28,74,82,108,138,160],"monitoring":[2,19],"is":[3],"an":[4,87],"efficient":[5],"and":[6,32,67,113,134],"reliable":[7],"mean":[8],"for":[9,72,90,127,143],"problem":[10],"detection":[11],"in":[12,118],"enterprise":[13,166],"IT":[14,34,37,167],"infrastructures.":[15],"The":[16,76,103,140,169],"performance":[17],"of":[18,131,175],"systems":[20],"depends":[21],"on":[22,158],"their":[23],"configurations":[24,49],"specified":[25],"by":[26,101],"the":[27,36,48,56,73,92,107,111,115,129,136,173,176],"administrators.":[29,75],"In":[30],"dynamic":[31],"large":[33,165],"environments,":[35],"infrastructures":[38],"are":[39,99,156],"frequently":[40],"changed":[41],"to":[42,62,150],"meet":[43],"various":[44],"business":[45],"requirements,":[46],"so":[47],"may":[50],"not":[51],"be":[52,148],"always":[53],"consistent":[54],"with":[55,152],"updated":[57],"status.":[58],"Misconfigurations":[59],"can":[60,79,147],"lead":[61],"false":[63,68,77,93,116],"positive":[64],"(false":[65],"alarms)":[66],"negative":[69],"(missing":[70],"alerts)":[71],"negatives":[78,94,117],"cause":[80],"serious":[81],"faults.":[83],"This":[84,120],"paper":[85],"presents":[86],"automatic":[88],"approach":[89,121],"discovering":[91],"from":[95,163],"incident":[96,132,161],"tickets":[97,133,162],"that":[98],"created":[100],"humans.":[102],"discovered":[104],"results":[105,171],"help":[106],"administrators":[109],"correct":[110],"misconfigurations":[112],"minimize":[114],"future.":[119],"applies":[122],"a":[123,164],"text":[124],"classification":[125],"model":[126],"analyzing":[128],"descriptions":[130],"identifying":[135],"corresponding":[137],"issues.":[139],"domain":[141],"knowledge":[142],"describing":[144],"those":[145],"issues":[146],"incorporated":[149],"assist":[151],"this":[153],"model.":[154],"Experiments":[155],"conducted":[157],"real":[159],"infrastructure.":[168],"experimental":[170],"demonstrate":[172],"effectiveness":[174],"proposed":[177],"approach.":[178]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2}],"updated_date":"2026-01-13T01:12:25.745995","created_date":"2025-10-10T00:00:00"}
