000923943 000__ 01556cam\a2200445Ia\4500 000923943 001__ 923943 000923943 005__ 20230306150958.0 000923943 006__ m\\\\\o\\d\\\\\\\\ 000923943 007__ cr\un\nnnunnun 000923943 008__ 191227s2020\\\\sz\\\\\\ob\\\\001\0\eng\d 000923943 019__ $$a1134074791 000923943 020__ $$a9783030336646$$q(electronic book) 000923943 020__ $$a3030336646$$q(electronic book) 000923943 020__ $$z3030336638 000923943 020__ $$z9783030336639 000923943 035__ $$aSP(OCoLC)on1133278943 000923943 035__ $$aSP(OCoLC)1133278943$$z(OCoLC)1134074791 000923943 040__ $$aYDX$$beng$$cYDX$$dGW5XE$$dEBLCP 000923943 049__ $$aISEA 000923943 050_4 $$aTK5105.543 000923943 08204 $$a004.6/65$$223 000923943 1001_ $$aJin, Shi. 000923943 24510 $$aAnomaly-detection and health-analysis techniques for core router systems /$$cShi Jin, Zhaobo Zhang, Krishnendu Chakrabarty, Xinli Gu. 000923943 260__ $$aCham :$$bSpringer,$$c2020. 000923943 300__ $$a1 online resource :$$billustrations 000923943 336__ $$atext$$btxt$$2rdacontent 000923943 337__ $$acomputer$$bc$$2rdamedia 000923943 338__ $$aonline resource$$bcr$$2rdacarrier 000923943 504__ $$aIncludes bibliographical references and index. 000923943 506__ $$aAccess limited to authorized users. 000923943 650_0 $$aRouting (Computer network management) 000923943 650_0 $$aTime-series analysis. 000923943 7001_ $$aZhang, Zhaobo. 000923943 7001_ $$aChakrabarty, Krishnendu. 000923943 7001_ $$aGu, Xinli. 000923943 77608 $$iPrint version: $$z3030336638$$z9783030336639$$w(OCoLC)1120693762 000923943 852__ $$bebk 000923943 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-33664-6$$zOnline Access$$91397441.1 000923943 909CO $$ooai:library.usi.edu:923943$$pGLOBAL_SET 000923943 980__ $$aEBOOK 000923943 980__ $$aBIB 000923943 982__ $$aEbook 000923943 983__ $$aOnline 000923943 994__ $$a92$$bISE