{"id":"https://openalex.org/W2053262037","doi":"https://doi.org/10.1109/glocom.2012.6503343","title":"A self-evolving anomaly detection framework for developing highly dependable utility clouds","display_name":"A self-evolving anomaly detection framework for developing highly dependable utility clouds","publication_year":2012,"publication_date":"2012-12-01","ids":{"openalex":"https://openalex.org/W2053262037","doi":"https://doi.org/10.1109/glocom.2012.6503343","mag":"2053262037"},"language":"en","primary_location":{"id":"doi:10.1109/glocom.2012.6503343","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2012.6503343","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044162723","display_name":"Husanbir Singh Pannu","orcid":"https://orcid.org/0000-0002-8375-5235"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Husanbir S. Pannu","raw_affiliation_strings":["Department of Mathematics, University of North Texas, USA"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, University of North Texas, USA","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100333038","display_name":"Jianguo Liu","orcid":"https://orcid.org/0000-0001-7748-0960"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jianguo Liu","raw_affiliation_strings":["Department of Mathematics, University of North Texas, USA"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics, University of North Texas, USA","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082758762","display_name":"Song Fu","orcid":"https://orcid.org/0000-0002-7705-0829"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Song Fu","raw_affiliation_strings":["Department of Computer Science and Engineering, University of North Texas, USA","Department of Computer Science and Engineering , University of North Texas , USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of North Texas, USA","institution_ids":["https://openalex.org/I123534392"]},{"raw_affiliation_string":"Department of Computer Science and Engineering , University of North Texas , USA","institution_ids":["https://openalex.org/I123534392"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5044162723"],"corresponding_institution_ids":["https://openalex.org/I123534392"],"apc_list":null,"apc_paid":null,"fwci":2.9969,"has_fulltext":false,"cited_by_count":29,"citation_normalized_percentile":{"value":0.91493218,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1605","last_page":"1610"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/dependability","display_name":"Dependability","score":0.9608098268508911},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.8662536144256592},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8414959907531738},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7782984972000122},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5273714065551758},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.5067537426948547},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4302336275577545},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.37492793798446655},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.3266105055809021},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.30230119824409485},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23141822218894958},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.1596553921699524},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1232144832611084},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08411294221878052}],"concepts":[{"id":"https://openalex.org/C77019957","wikidata":"https://www.wikidata.org/wiki/Q2689057","display_name":"Dependability","level":2,"score":0.9608098268508911},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.8662536144256592},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8414959907531738},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7782984972000122},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5273714065551758},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.5067537426948547},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4302336275577545},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.37492793798446655},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.3266105055809021},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.30230119824409485},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23141822218894958},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.1596553921699524},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1232144832611084},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08411294221878052},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/glocom.2012.6503343","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2012.6503343","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4399999976158142,"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320338304","display_name":"Los Alamos National Laboratory","ror":"https://ror.org/01e41cf67"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":55,"referenced_works":["https://openalex.org/W1530427892","https://openalex.org/W1553965915","https://openalex.org/W1560061049","https://openalex.org/W1579215414","https://openalex.org/W1874259713","https://openalex.org/W1904710828","https://openalex.org/W1943383135","https://openalex.org/W1970088130","https://openalex.org/W1987482957","https://openalex.org/W1988099502","https://openalex.org/W1993980594","https://openalex.org/W1996937823","https://openalex.org/W2014123937","https://openalex.org/W2025621112","https://openalex.org/W2038819732","https://openalex.org/W2039475678","https://openalex.org/W2053691501","https://openalex.org/W2096121981","https://openalex.org/W2103759606","https://openalex.org/W2105454049","https://openalex.org/W2105497548","https://openalex.org/W2107046766","https://openalex.org/W2107263349","https://openalex.org/W2114296561","https://openalex.org/W2118676041","https://openalex.org/W2120738897","https://openalex.org/W2122646361","https://openalex.org/W2124297537","https://openalex.org/W2135003824","https://openalex.org/W2136290019","https://openalex.org/W2137130182","https://openalex.org/W2138509363","https://openalex.org/W2142754274","https://openalex.org/W2142812297","https://openalex.org/W2143220335","https://openalex.org/W2143522309","https://openalex.org/W2148508494","https://openalex.org/W2156909104","https://openalex.org/W2158907675","https://openalex.org/W2161415693","https://openalex.org/W2164463086","https://openalex.org/W2165542642","https://openalex.org/W2173213060","https://openalex.org/W2555211786","https://openalex.org/W4230674625","https://openalex.org/W4234965040","https://openalex.org/W4251746847","https://openalex.org/W6631825601","https://openalex.org/W6639951305","https://openalex.org/W6654044881","https://openalex.org/W6660198354","https://openalex.org/W6674569788","https://openalex.org/W6680456895","https://openalex.org/W6680785567","https://openalex.org/W6729625342"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W2080951167","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2912112202","https://openalex.org/W2667207928","https://openalex.org/W4377864969"],"abstract_inverted_index":{"Utility":[0],"clouds":[1],"continue":[2],"to":[3,21,56],"grow":[4],"in":[5,8,81,107,136,145],"scale":[6],"and":[7,14,23,43,61,72,139,169],"the":[9,58,153,162],"complexity":[10],"of":[11],"their":[12],"components":[13],"interactions,":[15],"which":[16,173],"introduces":[17],"a":[18,35,73,97],"key":[19],"challenge":[20],"failure":[22,75,112],"resource":[24],"management":[25],"for":[26,38,47,85,104,127,178],"highly":[27,180],"dependable":[28,181],"cloud":[29,45,148],"computing.":[30],"Autonomic":[31],"anomaly":[32,99,129],"detection":[33,100,125,154,167,171],"is":[34,77,114],"crucial":[36],"technique":[37],"understanding":[39],"emergent,":[40],"cloud-wide":[41],"phenomena":[42],"self-managing":[44],"resources":[46],"system-level":[48],"dependability":[49,105],"assurance.":[50],"To":[51],"identify":[52],"anomalies,":[53],"we":[54,95],"need":[55],"monitor":[57],"system":[59,150],"execution":[60],"collect":[62],"health-related":[63],"runtime":[64],"performance":[65],"data.":[66],"These":[67],"data":[68],"are":[69,134],"usually":[70],"unlabeled":[71],"prior":[74,111],"history":[76,113],"not":[78],"always":[79],"available":[80],"production":[82],"systems,":[83],"especially":[84],"newly":[86,122],"deployed":[87],"or":[88],"managed":[89],"utility":[90,108,182],"clouds.":[91,109,183],"In":[92],"this":[93],"paper,":[94],"present":[96],"self-evolving":[98],"framework":[101],"with":[102],"mechanisms":[103],"assurance":[106],"No":[110],"required.":[115],"The":[116],"detector":[117,137,163],"self-evolves":[118],"by":[119],"recursively":[120],"exploring":[121],"generated":[123],"verified":[124],"results":[126,144],"future":[128],"identification.":[130],"Statistical":[131],"learning":[132],"technologies":[133],"exploited":[135],"determination":[138],"working":[140],"dataset":[141],"selection.":[142],"Experimental":[143],"an":[146],"institute-wide":[147],"computing":[149],"show":[151],"that":[152],"accuracy":[155],"improves":[156],"as":[157],"it":[158,175],"evolves.":[159],"With":[160],"self-evolvement,":[161],"can":[164],"achieve":[165],"92.1%":[166],"sensitivity":[168],"83.8%":[170],"specificity,":[172],"makes":[174],"well":[176],"suitable":[177],"building":[179]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
