Efficient string matching: An aid to bibliographic search, Commun. ACM, vol.18, issue.6, pp.333-340, 1975. ,
Intrusion detection alarms reduction using root cause analysis and clustering, Computer Communications, vol.32, issue.2, pp.419-430, 2009. ,
Selfdiagnosis technique for virtual private networks combining bayesian networks and case-based reasoning, vol.12, pp.354-366, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01538572
Scalable and fast root cause analysis using inter cluster inference, Proceedings of IEEE International Conference on Communications, ICC, pp.3563-3568, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01676592
Alarm management via temporal pattern learning, Engineering Applications of Artificial Intelligence, vol.65, pp.506-516, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01611635
Pattern matching of alarm flood sequences by a modified Smith-Waterman algorithm. Chemical engineering research and design, vol.91, pp.1085-1094, 2013. ,
A complete chronicle discovery approach: application to activity analysis, Expert Systems, vol.29, issue.4, pp.321-346, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-01354577
Incremental construction of minimal acyclic finite-state automata. Computational linguistics, vol.26, pp.3-16, 2000. ,
Discovering chronicles with numerical time constraints from alarm logs for monitoring dynamic systems, IJCAI, vol.99, pp.620-626, 1999. ,
Situation recognition: Representation and algorithms, IJCAI: International Joint Conference on Artificial Intelligence, vol.01, pp.166-174, 1993. ,
Root cause analysis of network failures using machine learning and summarization techniques, IEEE Communications Magazine, vol.55, issue.9, pp.126-131, 2017. ,
Pattern matching in historical data, AIChE journal, vol.48, issue.9, pp.2022-2038, 2002. ,
Clustering intrusion detection alarms to support root cause analysis, ACM transactions on information and system security (TISSEC), vol.6, pp.443-471, 2003. ,
A space-economical suffix tree construction algorithm, J. ACM, vol.23, issue.2, pp.262-272, 1976. ,
Minimisation of acyclic deterministic automata in linear time, Theoretical Computer Science, vol.92, issue.1, pp.181-189, 1992. ,
URL : https://hal.archives-ouvertes.fr/hal-00619678
Matching patterns from historical data using PCA and distance similarity factors, Proceedings of the American Control Conference, vol.2, pp.1759-1764, 2001. ,
Identification of common molecular subsequences, Journal of Molecular Biology, vol.147, issue.1, pp.195-197, 1981. ,
Learning chronicles signing multiple scenario instances, IFAC Proceedings Volumes, vol.47, pp.10397-10402, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01162866
On-line construction of suffix trees, Algorithmica, vol.14, issue.3, pp.249-260, 1995. ,
Linear pattern matching algorithms, 14th Annual Symposium on Switching and Automata Theory (swat 1973), pp.1-11, 1973. ,