Author of the publication

"The tail wags the dog": A study of anomaly detection in commercial application performance.

, , and . CoRR, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of IT Service Management from an Organisational Perspective., and . WEBIST (2), page 140-152. INSTICC Press, (2006)Similarity and Logic Based Ontology Mapping for Security Management., , and . FLAIRS, page 653-659. AAAI Press, (2005)Security Alert Management in E-Business Networks., and . ICEB, page 880-885. Academic Publishers/World Publishing Corporation, (2004)The Financial Viability of eHealth and mHealth., , and . FinanceCom, volume 401 of Lecture Notes in Business Information Processing, page 111-116. Springer, (2020)Evaluation Methodology for the Security of e-Finance Systems., and . EEE, page 120-123. IEEE Computer Society, (2005)Towards an Ontology-Driven Approach for the Interoperability Problem in Security Compliance., , and . FLAIRS, page 165-171. AAAI Press, (2006)Converging Blockchain and Social Business for Socio-Economic Development., , , , and . IEEE BigData, page 3039-3048. IEEE, (2018)An Interactive Diagnosis and Repair of OWL Ontology., , and . ICSC, page 113-120. IEEE Computer Society, (2007)Embracing Dynamic Evolution in Distributed Systems, , and . IEEE Software, 21 (2): 49-55 (2004)Representation of knowledge in information technology Service Capability Maturity Model (IT Service CMM)., , and . RCIS, page 215-226. IEEE, (2008)