- Eric Anderson, Michael Hobbs, Kimberly Keeton, Susan Spence,
Mustafa Uysal and Alistair Veitch, "Hippodrome: running loops around
storage system administration," to appear in Proceedings of USENIX
Symposium on File and Storage Technologies (FAST), January 2002.
- Eric Anderson and David A. Patterson, "Extensible, scalable
monitoring for clusters of computers," Proceedings of 11th System
Administration Conference (LISA '97), 1997.
- A. Brown, G. Kar, A. Keller, "An active approach to
characterizing dynamic dependencies for problem determination in a
distributed environment," Proceedings of the 7th International
IFIP/IEEE Symposium on Integrated Management (IM 2001), May,
2001.
- Jake D. Brutlag, "Aberrant behavior detection in time series for
network monitoring," Proceedings of the 14th Systems Administration
Conference (LISA 2000), December, 2000.
- Mark Burgess, "Computer immunology," Proceedings of 12th USENIX
Conference on Large Installation System Administration (LISA),
1998.
- J. Choi, M. Choi, and S. Lee, "An alarm correlation and fault
identification scheme based on OSI managed object classes,"
Proceedings of IEEE International Conference on Communications,
pp. 1547-51, June 1999.
- S. Forrest, S. A. Hofmeyr, A. Somayaji and T. A. Longstaff, "A
sense of self for Unix processes," Proceedings of the IEEE
Symposium on Security and Privacy , pp. 120 - 128, 1996.
- B. Gruschke, "Integrated event management: event correlation
using dependency graphs," Proceedings of 9th IFIP/IEEE
International Workshop on Distributed Systems Operation and Management
(DSOM '98), 1998.
- Joseph L. Hellerstein and Fan Zhang, ``An Introduction to
Change-Point Detection,'' Proceedings of ACM Sigmetrics, June,
1998.
- Joseph L. Hellerstein, Fan Zhang and Perwez Shahabuddin, "A
Statistical Approach to Predictive Detection," Computer
Networks, January, 2000.
- Peter Hoogenboom and Jay Lepreau, "Computer system performance
problem detection using time series models," Proceedings of the
1993 Summer USENIX Technical Conference , pp. 15 - 32, June,
1993.
- Ravishankar Iyer, Zbigniew Kalbarczyk and Mahesh Kalyanakrishnan,
"Measurement-based analysis of networked system availability," in
Performance Evaluation Origins and Directions, Editors G. Haring,
C. Lindemann and M. Reiser, Lecture Notes in Computer Science,
Springer Verlag, 1999.
- S. Katker and M. Paterok, "Fault isolation and event correlation
for integrated fault management," Proceedings of the 7th
International IFIP/IEEE Symposium on Integrated Management (IM V),
pp. 583 - 596, May, 1997.
- Wenke Lee and Salvatore Stolfo, "Data Mining Approaches for
Intrusion Detection," Proceedings of 7th USENIX Security Symposium
, January 1998.
- Darrell Long, Andrew Muir and Richard Golding, "A longitudinal
survey of Internet host reliability," Hewlett-Packard Concurrent
Computing Department Technical report HPL-CCD-95-4, February
1995.
- T. Lunt, A. Tamaru, F. Gilham, R. Jaganathan, P. Neumann,
H. Javitz, A. Valdez and T. Garvey, "A real-time intrusion detection
expert system (IDES) - final technical report," Technical report,
Computer Science Laboratory, SRI International, February 1992.
- H. Mannila, H. Toivonen, and A. I. Verkamo, "Discovering frequent
episodes in sequences," Proceedings of the 1st International
Conference on Knowledge Discovery in Databases and Data Mining,
August 1995.
- Vern Paxson, "Bro: a system for detecting network intruders in
real-time," Proceedings of 7th USENIX Security Symposium ,
January 1998.
- R. Srikant, Fast Algorithms for Mining Association Rules and
Sequential Patterns, PhD thesis, University of Wisconsin -
Madison, 1996.
- R. Srikant and R. Agrawal, "Mining generalized association
rules," Proceedings of the 21st VLDB Conference, 1995.
- S. Yemini, S. Kliger, et al., "High speed and robust event
correlation," IEEE Communications Magazine, 34(5):82-90, May
1996.
- Fan Zhang and Joseph L. Hellerstein, "An Approach to On-Line
Predictive Detection," Proceedings of MASCOTS, 2000.