Follow
Antonio Pecchia
Title
Cited by
Cited by
Year
Event logs for the analysis of software failures: A rule-based approach
M Cinque, D Cotroneo, A Pecchia
IEEE Transactions on Software Engineering 39 (6), 806-821, 2012
1472012
Industry practices and event logging: Assessment of a critical software development process
A Pecchia, M Cinque, G Carrozza, D Cotroneo
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 2 …, 2015
922015
Improving log-based field failure data analysis of multi-node computing systems
A Pecchia, D Cotroneo, Z Kalbarczyk, RK Iyer
2011 IEEE/IFIP 41st International Conference on Dependable Systems …, 2011
862011
Microservices monitoring with event logs and black box execution tracing
M Cinque, R Della Corte, A Pecchia
IEEE transactions on services computing 15 (1), 294-307, 2019
622019
Memory leak analysis of mission-critical middleware
G Carrozza, D Cotroneo, R Natella, A Pecchia, S Russo
Journal of Systems and Software 83 (9), 1556-1567, 2010
552010
Assessing and improving the effectiveness of logs for the analysis of software faults
M Cinque, D Cotroneo, R Natella, A Pecchia
2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010
532010
Automated root cause identification of security alerts: Evaluation in a SaaS Cloud
D Cotroneo, A Paudice, A Pecchia
Future Generation Computer Systems 56, 375-387, 2016
402016
Identifying compromised users in shared computing infrastructures: A data-driven bayesian network approach
A Pecchia, A Sharma, Z Kalbarczyk, D Cotroneo, RK Iyer
2011 IEEE 30th International Symposium on Reliable Distributed Systems, 127-136, 2011
402011
Detection of software failures through event logs: An experimental study
A Pecchia, S Russo
2012 IEEE 23rd International Symposium on Software Reliability Engineering …, 2012
382012
Challenges and directions in security information and event management (SIEM)
M Cinque, D Cotroneo, A Pecchia
2018 IEEE International Symposium on Software Reliability Engineering …, 2018
362018
Rt-cases: Container-based virtualization for temporally separated mixed-criticality task sets
M Cinque, R Della Corte, A Eliso, A Pecchia
31st Euromicro Conference on Real-Time Systems (ECRTS 2019), 2019
352019
AutoLog: Anomaly detection by deep autoencoding of system logs
M Catillo, A Pecchia, U Villano
Expert Systems with Applications 191, 116263, 2022
342022
Assessing direct monitoring techniques to analyze failures of critical industrial systems
M Cinque, D Cotroneo, R Della Corte, A Pecchia
2014 IEEE 25th international symposium on software reliability engineering …, 2014
302014
Contextual filtering and prioritization of computer application logs for security situational awareness
M Cinque, R Della Corte, A Pecchia
Future Generation Computer Systems 111, 668-680, 2020
292020
Debugging‐workflow‐aware software reliability growth analysis
M Cinque, D Cotroneo, A Pecchia, R Pietrantuono, S Russo
Software Testing, Verification and Reliability 27 (7), e1638, 2017
292017
A logging approach for effective dependability evaluation of complex systems
M Cinque, D Cotroneo, A Pecchia
2009 Second International Conference on Dependability, 105-110, 2009
292009
Transferability of machine learning models learned from public intrusion detection datasets: the cicids2017 case study
M Catillo, A Del Vecchio, A Pecchia, U Villano
Software Quality Journal 30 (4), 955-981, 2022
272022
Characterizing direct monitoring techniques in software systems
M Cinque, D Cotroneo, R Della Corte, A Pecchia
IEEE Transactions on Reliability 65 (4), 1665-1681, 2016
262016
Filtering security alerts for the analysis of a production saas cloud
A Pecchia, D Cotroneo, R Ganesan, S Sarkar
2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing …, 2014
242014
Demystifying the role of public intrusion datasets: A replication study of DoS network traffic data
M Catillo, A Pecchia, M Rak, U Villano
Computers & Security 108, 102341, 2021
222021
The system can't perform the operation now. Try again later.
Articles 1–20