MA2DF: A multi-agent anomaly detection framework

Y Thounaojam, W Setiawan… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Time-sensitive safety-critical systems store traces as a collection of time-stamped messages
that are generated while a system is operating. Analysis of these traces becomes a key task …

[PDF][PDF] An Optimization Method of Knowledge Mapping Relationship Based on Improved Ant Colony Algorithm

SF Xu, YN Jiang - Journal of Computers, 2022 - csroc.org.tw
The current knowledge mapping relationship optimization methods cannot obtain high-
precision information. An optimization method of knowledge mapping relationship based on …

Using SPARQL to express Causality in Explainable Cyber-Physical Systems

PR Aryan, M Deimel, FJ Ekaputra… - 2021 8th International …, 2021 - ieeexplore.ieee.org
Causality knowledge is an essential component of an explainable cyber-physical systems.
Since this knowledge mainly come from domain experts, manual annotation of causality is …

Development of Advanced Advisory System for Anomalies (AAA) to Predict and Detect the Abnormal Operation in Fired Heaters for Real Time Process Safety and …

F Qasim, DH Lee, J Won, JK Ha, SJ Park - Energies, 2021 - mdpi.com
As the technology is emerging, the process industries are actively migrating to Industry 4.0 to
optimize energy, production, profit, and the quality of products. It should be noted that real …

ABC in Root Cause Analysis: Discovering Missing Information and Repairing System Failures

X Li, A Bundy, R Zhu, F Wang, S Mauceri, L Xu… - … Conference on Machine …, 2022 - Springer
Root-cause analysis (RCA) is a crucial task in software system maintenance, where system
logs play an essential role in capturing system behaviours and describing failures …

FLAM: Locating and Mitigating 5GC Network Failure with Knowledge Graphs in China Telecom's Network

P Yu, H Zhang, X Jiang, Y Zhou, X Yan, Q Zeng, Y Lin - 2023 - researchsquare.com
China Telecom's fifth-generation core (5GC) network is complicated owing to own
characterizations of service based architecture and network functions vir-tualization, and …

Guiding code analysis and generation with probabilistic constraints

Z Wu - 2022 - ideals.illinois.edu
Different forms of constraints have been a useful kind of artifacts across multiple computer
science domains, especially in code analysis and generation tasks. Existing constraint …

Causanom: Anomaly Detection With Flexible Causal Graphs

S Strelnikoff, A Jammalamadaka… - The International FLAIRS …, 2023 - journals.flvc.org
Causality-based anomaly detection methods provide at least two significant theoretical
benefits over purely statistical methods: 1. Improved robustness to non-anomalous out-of …

[PDF][PDF] Spectrum-Based Fault Localization for Microservices via Log Analysis

JMR de Castro Silva - 2022 - repositorio-aberto.up.pt
Microservices is a distributed software architecture that divides the business logic of an
application into more minor, fine-grained services. Due to their distributed nature …

Fault root cause location based on machine learning in 5G core network

X Jiang, P Yu, X Yan, Q Zeng, H Zhang… - … , and Internet of …, 2023 - spiedigitallibrary.org
With the development of the virtualization of 5G core (5GC) network, the network architecture
is more complex. Once faults occur, the fault root cause location (RCL) is difficult. Traditional …