Follow
Antonio Pecchia
Title
Cited by
Cited by
Year
Event logs for the analysis of software failures: A rule-based approach
M Cinque, D Cotroneo, A Pecchia
IEEE Transactions on Software Engineering 39 (6), 806-821, 2012
1212012
Improving log-based field failure data analysis of multi-node computing systems
A Pecchia, D Cotroneo, Z Kalbarczyk, RK Iyer
2011 IEEE/IFIP 41st International Conference on Dependable Systems …, 2011
812011
Industry practices and event logging: Assessment of a critical software development process
A Pecchia, M Cinque, G Carrozza, D Cotroneo
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 2 …, 2015
742015
Memory leak analysis of mission-critical middleware
G Carrozza, D Cotroneo, R Natella, A Pecchia, S Russo
Journal of Systems and Software 83 (9), 1556-1567, 2010
542010
Assessing and improving the effectiveness of logs for the analysis of software faults
M Cinque, D Cotroneo, R Natella, A Pecchia
2010 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2010
512010
Microservices monitoring with event logs and black box execution tracing
M Cinque, R Della Corte, A Pecchia
IEEE transactions on services computing, 2019
442019
Detection of software failures through event logs: An experimental study
A Pecchia, S Russo
2012 IEEE 23rd International Symposium on Software Reliability Engineering …, 2012
382012
Identifying compromised users in shared computing infrastructures: A data-driven bayesian network approach
A Pecchia, A Sharma, Z Kalbarczyk, D Cotroneo, RK Iyer
2011 IEEE 30th International Symposium on Reliable Distributed Systems, 127-136, 2011
382011
Automated root cause identification of security alerts: Evaluation in a SaaS Cloud
D Cotroneo, A Paudice, A Pecchia
Future Generation Computer Systems 56, 375-387, 2016
372016
Assessing direct monitoring techniques to analyze failures of critical industrial systems
M Cinque, D Cotroneo, R Della Corte, A Pecchia
2014 IEEE 25th International Symposium on Software Reliability Engineering …, 2014
292014
A logging approach for effective dependability evaluation of complex systems
M Cinque, D Cotroneo, A Pecchia
2009 Second International Conference on Dependability, 105-110, 2009
292009
Characterizing direct monitoring techniques in software systems
M Cinque, D Cotroneo, R Della Corte, A Pecchia
IEEE Transactions on Reliability 65 (4), 1665-1681, 2016
242016
Filtering security alerts for the analysis of a production saas cloud
A Pecchia, D Cotroneo, R Ganesan, S Sarkar
2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing …, 2014
232014
Debugging‐workflow‐aware software reliability growth analysis
M Cinque, D Cotroneo, A Pecchia, R Pietrantuono, S Russo
Software Testing, Verification and Reliability 27 (7), e1638, 2017
222017
On the impact of debugging on software reliability growth analysis: a case study
M Cinque, C Gaiani, DD Stradis, A Pecchia, R Pietrantuono, S Russo
International Conference on Computational Science and Its Applications, 461-475, 2014
222014
Contextual filtering and prioritization of computer application logs for security situational awareness
M Cinque, R Della Corte, A Pecchia
Future Generation Computer Systems 111, 668-680, 2020
192020
Multiobjective testing resource allocation under uncertainty
R Pietrantuono, P Potena, A Pecchia, D Rodriguez, S Russo, ...
IEEE Transactions on Evolutionary Computation 22 (3), 347-362, 2017
182017
Rt-cases: Container-based virtualization for temporally separated mixed-criticality task sets
M Cinque, R Della Corte, A Eliso, A Pecchia
31st Euromicro Conference on Real-Time Systems (ECRTS 2019), 2019
172019
Challenges and directions in security information and event management (SIEM)
M Cinque, D Cotroneo, A Pecchia
2018 IEEE International Symposium on Software Reliability Engineering …, 2018
172018
Entropy-based security analytics: Measurements from a critical information system
M Cinque, R Della Corte, A Pecchia
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
152017
The system can't perform the operation now. Try again later.
Articles 1–20