ArXiv, 1–16.
Besta, M., Peter, E., Gerstenberger, R., Fischer, M.,
Podstawski, M., Barthels, C., Alonso, G., & Hoefler, T.
(2019). Demystifying Graph Databases: Analysis and
Taxonomy of Data Organization, System Designs, and
Graph Queries. CoRR, abs/1910.0.
Bleikertz, S., Vogel, C., & Groß, T. (2014). Cloud radar:
Near real-time detection of security failures in dynamic
virtualized infrastructures. ACM International
Conference Proceeding Series, 2014, 26–35.
Bleikertz, S., Vogel, C., Gross, T., & Mödersheim, S.
(2015). Proactive security analysis of changes in
virtualized infrastructures. ACM International
Conference Proceeding Series, 7-11 Dec, 51–60.
Clemente, P. J., & Lozano-Tello, A. (2018). Model Driven
Development Applied to Complex Event Processing for
Near Real-Time Open Data. Sensors, 18(12).
Cucinotta, T., Lanciano, G., Ritacco, A., Vannucci, M.,
Artale, A., Barata, J., Sposato, E., & Basili, L. (2020).
Behavioral analysis for virtualized network functions:
A som-based approach. CLOSER 2020 - Proceedings
of the 10th International Conference on Cloud
Computing and Services Science, Closer, 150–160.
Dunning, T., & Ellen Friedman. (2014). Time Series
Databases: New Ways to Store and Access Data.
O’Reilly Media, Inc.
Farooq, H. M., & Otaibi, N. M. (2018). Optimal machine
learning algorithms for cyber threat detection.
Proceedings - 2018 UKSim-AMSS 20th International
Conference on Modelling and Simulation, UKSim
2018, 32–37.
Francis, N., Green, A., Guagliardo, P., Libkin, L.,
Lindaaker, T., Marsault, V., Plantikow, S., Selmer, P.,
& Taylor, A. (2018.). Cypher : An Evolving Query
Language for Property Graphs. SIGMOD '18:
Proceedings of the 2018 International Conference on
Management of Data, 1433–1445.
Grolinger, K., Higashino, W. A., Tiwari, A., & Capretz, M.
A. M. (2013). Data management in cloud
environments: NoSQL and NewSQL data stores.
Journal of Cloud Computing, 2(1).
Harper, R., & Tee, P. (2019). A method for temporal event
correlation. 2019 IFIP/IEEE Symposium on Integrated
Network and Service Management, IM 2019, 13–18.
Hartmann, T., Fouquet, F., Jimenez, M., Rouvoy, R., & Le
Traon, Y. (2017). Analyzing Complex Data in Motion
at Scale with Temporal Graphs. The 29th International
Conference on Software Engineering & Knowledge
Engineering (SEKE’17), Jul 2017, Pittsburgh, US, pp.
6.
Hesse, G., & Lorenz, M. (2016). Conceptual survey on data
stream processing systems. Proceedings of the
International Conference on Parallel and Distributed
Systems - ICPADS, 2016, 797–802.
Jensen, S. K., Pedersen, T. B., & Thomsen, C. (2017). Time
Series Management Systems: A Survey. IEEE
Transactions on Knowledge and Data Engineering,
29(11), 2581–2600. 2.
Kambatla, K., Kollias, G., Kumar, V., & Grama, A. (2014).
Trends in big data analytics . Journal of Parallel and
Distributed Computing, 74(7), 2561–2573
Kampars, J., & Grabis, J. (2018). Near Real-time Big-data
Processing for Data Driven Applications. Proceedings
- 2017 International Conference on Big Data
Innovations and Applications, Innovate-Data 2017, 35–
42.
Kofod-petersen, A. (2014). How to do a structured
literature review in computer science. Researchgate,
May 2015, 1–7.
Kreps, J. (2014). Questioning the Lambda Architecture.
The Lambda Architecture has its merits, but
alternatives are worth exploring. O’Reilly Media on
line, July.
Lal, D. K., & Suman, U. (2020). A Survey of Real-Time
Big Data Processing Algorithms. Lecture Notes in
Mechanical Engineering, 3–10.
Lin, J., Ravichandiran, R., Bannazadeh, H., & Leon-Garcia,
A. (2015). Monitoring and measurement in software-
defined infrastructure. Proceedings of the 2015
IFIP/IEEE International Symposium on Integrated
Network Management, IM 2015, 742–745.
Lin, J., Zhang, Q., Bannazadeh, H., & Leon-Garcia, A.
(2016). Automated anomaly detection and root cause
analysis in virtualized cloud infrastructures.
Proceedings of the NOMS 2016 - 2016 IEEE/IFIP
Network Operations and Management Symposium,
Noms, 550–556.
Majumdar, S., Madi, T., Wang, Y., Tabiban, A., Oqaily, M.,
Alimohammadifar, A., Jarraya, Y., Pourzandi, M.,
Wang, L., & Debbabi, M. (2019). Cloud security
auditing. In Advances in Information Security (Vol. 76).
Malewicz, G., Austern, M. H., Bik, A. J. C., Dehnert, J. C.,
Horn, I., Leiser, N., & Czajkowski, G. (2010). Pregel :
A System for Large-Scale Graph Processing. 135–145.
Mensah, P., Dubus, S., Kanoun, W., Morin, C., Piolle, G.,
& Totel, E. (2017). Connectivity graph reconstruction
for networking cloud infrastructures. 2017 IEEE 16th
International Symposium on Network Computing and
Applications, 1–9.
Mijumbi, R., Asthana, A., Bernal, C., & Castejon, M.
(2019). MAYOR: machine learning and analytics for
automated operations and recovery. Proceedings -
International Conference on Computer
Communications and Networks, ICCCN, 2019-July.
Miyazawa, M., Hayashi, M., & Stadler, R. (2015). VNMF:
Distributed fault detection using clustering approach
for network function virtualization. Proceedings of the
2015 IFIP/IEEE International Symposium on
Integrated Network Management, IM 2015, 640–645.
Nasir, M. A. U., De Francisci Morales, G., García-Soriano,
D., Kourtellis, N., & Serafini, M. (2015). The power of
both choices: Practical load balancing for distributed
stream processing engines. Proceedings - International
Conference on Data Engineering, 2015-May, 137–148.
Natu, M., Ghosh, R. K., Shyamsundar, R. K., & Ranjan, R.
(2016). Holistic Performance Monitoring of Hybrid
Clouds: Complexities and Future Directions. IEEE
Cloud Computing, 3(1), 72–81.
Niwa, T., Kasuya, Y., & Kitahara, T. (2017). Anomaly
detection for openstack services with process-related