Proceedings of the 2015 Internet Measurement Conference 2015
DOI: 10.1145/2815675.2815679
|View full text |Cite
|
Sign up to set email alerts
|

Opprentice

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 198 publications
(20 citation statements)
references
References 39 publications
0
20
0
Order By: Relevance
“…Because these algorithms typically have simple assumptions for applicable KPIs, expert's efforts need to be involved to pick a suitable detector for a given KPI, and then fine-tune the detector's parameters based on the training data. Simple ensemble of these detectors, such as majority vote [8] and normalization [35], do not help much either according to [25]. As a result, these detectors see only limited use in the practice.…”
Section: Previous Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Because these algorithms typically have simple assumptions for applicable KPIs, expert's efforts need to be involved to pick a suitable detector for a given KPI, and then fine-tune the detector's parameters based on the training data. Simple ensemble of these detectors, such as majority vote [8] and normalization [35], do not help much either according to [25]. As a result, these detectors see only limited use in the practice.…”
Section: Previous Workmentioning
confidence: 99%
“…Supervised ensemble approaches. To circumvent the hassle of algorithm/parameter tuning for traditional statistical anomaly detectors, supervised ensemble approaches, EGADS [21] and Opprentice [25], were proposed. They train anomaly classifiers using the user feedbacks as labels and using anomaly scores output by traditional detectors as features.…”
Section: Previous Workmentioning
confidence: 99%
See 1 more Smart Citation
“…It is obvious that the selected studies were published in 92 different outlets, where the vast majority of studies were published in IEEE Access (6 publications), Procedia Computer Science (5 publications), IEEE Internet of Things Journal (4 publications), [125], Contagio [112], UPC [112], ISOT [112], MCFP [112], KPI [140], Telemetry [141], WUIL [142], DARPA 1998 [143], GureKDD [144], GSB [145], Intel Lab [145], Indoor WSN [145], RPL-NDDS17 [146], NIMS [90], UNB-CICT [50], Digiturk [147], Labris [147], IoT Botnet [148], Moore [149], ISCXVPN 2016 [149], CICIDS 2018 [52], Malicious URLs [107], TRAbID [53], CIDDS-001 [104] 25…”
Section: Mapping Selected Studies By Publication Typesmentioning
confidence: 99%
“…Anomaly detection is also a critical task with lots of efforts from both industrial practitioners and academic researchers [19,32,41,48]. Specifically, there is a body of work focusing on anomaly detection in key performance indicators (KPIs) in order to monitor systems and identify incidents [9,23,25,30,46]. For instance, Li et al [46] propose ROCKA, a robust and rapid time series clustering algorithm to cluster KPIs for anomaly detection.…”
Section: Related Work 71 Incident Identificationmentioning
confidence: 99%