H. S. Gunawi, What Bugs Live in the Cloud?: A Study of 3000+ Issues in Cloud Systems, Proceedings of the ACM Symposium on Cloud Computing, pp.1-14, 2014.

S. Hagen, M. Seibold, and A. Kemper, Efficient verification of IT change operations or: How we could have prevented Amazon's cloud outage," presented at the Network Operations and Management Symposium (NOMS), IEEE, pp.368-376, 2012.

T. Dumitra? and P. Narasimhan, Why do upgrades fail and what can we do about it?: toward dependable, online upgrades in enterprise system, Proceedings of the 10th ACM/IFIP/USENIX International Conference on Middleware, p.18, 2009.

S. Pertet and P. Narasimhan, Causes of failure in web applications, Parallel Data Lab, p.48, 2005.

D. Oppenheimer, A. Ganapathi, and D. A. Patterson, Why Do Internet Services Fail, and What Can Be Done About It?, Proceedings of the 4th Conference on USENIX Symposium on Internet Technologies and Systems, vol.4, pp.1-1, 2003.

D. Scott, Making smart investments to reduce unplanned downtime, Tactical Guidel. Res, 1999.

, Online Detection Of Operator Errors In Cloud Computing

S. Elliot, DevOps and the cost of downtime: Fortune 1000 best practice metrics quantified, Int. Data Corp. IDC, 2014.

A. Vetter, Detecting Operator Errors in Cloud Maintenance Operations, 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), pp.639-644, 2016.
DOI : 10.1109/cloudcom.2016.0110

K. Nagaraja, F. Oliveira, R. Bianchini, R. P. Martin, and T. D. Nguyen, Understanding and Dealing with Operator Mistakes in Internet Services, OSDI '04: 6th Symposium on Operating Systems Design and Implementation, 2004.
DOI : 10.1145/1095810.1118587

Z. Yin, X. Ma, J. Zheng, Y. Zhou, L. N. Bairavasundaram et al., An empirical study on configuration errors in commercial and open source systems, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, pp.159-172, 2011.
DOI : 10.1145/2043556.2043572

J. L. Peterson, Petri net theory and the modeling of systems, 1981.

E. Gamma, R. Helm, R. Johnson, and J. Vlissides, Design patterns: elements of reusable object-oriented software, 1994.

W. M. Van-der-aalst, A. H. Hofstede, B. Kiepuszewski, and A. P. Barros, Workflow patterns, Distrib. Parallel Databases, vol.14, issue.1, pp.5-51, 2003.

N. Russell, A. H. Hofstede, D. Edmond, and W. M. Van-der-aalst, Workflow data patterns, QUT Technical report, 2004.

N. Russell, A. H. Hofstede, D. Edmond, and W. M. Van-der-aalst, Workflow resource patterns, 2005.

D. Riehle and H. Zllighoven, Understanding and using patterns in software development, TAPOS, vol.2, issue.1, pp.3-13, 1996.
DOI : 10.1002/(sici)1096-9942(1996)2:1<3::aid-tapo1>3.0.co;2-#

M. B. Dwyer, G. S. Avrunin, and J. C. Corbett, Property specification patterns for finite-state verification, Proceedings of the second workshop on Formal methods in software practice, pp.7-15, 1998.
DOI : 10.1145/298595.298598

URL : http://laser.cs.umass.edu/techreports/97-49.pdf

W. Van-der and . Aalst, Process mining: discovery, conformance and enhancement of business processes, 2011.

M. Weidlich, J. Mendling, and M. Weske, Computation of behavioural profiles of process models, Bus. Process Technol. Hasso Plattner Inst. IT-Syst. Eng, 2009.

X. Xu, L. Zhu, I. Weber, and L. Bass, POD-diagnosis: Error diagnosis of sporadic operations on cloud applications, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp.252-263, 2014.

T. Xu and Y. Zhou, Systems Approaches to Tackling Configuration Errors: A Survey, 2014.

M. Farshchi, J. Schneider, I. Weber, and J. Grundy, Metric selection and anomaly detection for cloud operations using log and metric correlation analysis, J. Syst. Softw, 2017.

D. Powers, Evaluation: From precision, recall and f-measure to roc., informedness, markedness correlation, J. Mach. Learn. Technol, vol.2, issue.1, pp.37-63, 2011.

O. Kopp, T. Binz, U. Breitenbcher, and F. Leymann, BPMN4TOSCA: A DomainSpecific Language to Model Management Plans for Composite Applications, Business Process Model and Notation, pp.38-52, 2012.

M. Becker and S. Klingner, A Criteria Catalogue for Evaluating Business Process Pattern Approaches" in Enterprise, Business-Process and Information Systems Modeling, pp.257-271, 2014.

A. Awad, A. Barnawi, A. Elgammal, R. Elshawi, A. Almalaise et al., Runtime Detection of Business Process Compliance Violations: An Approach Based on Anti Patterns, 2015.