{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T12:52:09Z","timestamp":1726059129327},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030353322"},{"type":"electronic","value":"9783030353339"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-35333-9_38","type":"book-chapter","created":{"date-parts":[[2019,11,18]],"date-time":"2019-11-18T00:01:29Z","timestamp":1574035289000},"page":"545-553","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Deep Unsupervised System Log Monitoring"],"prefix":"10.1007","author":[{"given":"Hubert","family":"Nourtel","sequence":"first","affiliation":[]},{"given":"Christophe","family":"Cerisara","sequence":"additional","affiliation":[]},{"given":"Samuel","family":"Cruz-Lara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,18]]},"reference":[{"key":"38_CR1","first-page":"1","volume":"2","author":"J An","year":"2015","unstructured":"An, J., Cho, S.: Variational autoencoder based anomaly detection using reconstruction probability. Spec. Lect. IE 2, 1\u201318 (2015)","journal-title":"Spec. Lect. IE"},{"key":"38_CR2","doi-asserted-by":"crossref","unstructured":"Bengio, Y.: Practical recommendations for gradient-based training of deep architectures. arXiv:1206.5533 (2012)","DOI":"10.1007\/978-3-642-35289-8_26"},{"key":"38_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-319-48057-2_9","volume-title":"Future Data and Security Engineering","author":"L Bontemps","year":"2016","unstructured":"Bontemps, L., Cao, V.L., McDermott, J., Le-Khac, N.-A.: Collective anomaly detection based on long short-term memory recurrent neural networks. In: Dang, T.K., Wagner, R., K\u00fcng, J., Thoai, N., Takizawa, M., Neuhold, E. (eds.) FDSE 2016. LNCS, vol. 10018, pp. 141\u2013152. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-48057-2_9"},{"key":"38_CR4","doi-asserted-by":"crossref","unstructured":"Brown, A., Tuor, A., Hutchinson, B., Nichols, N.: Recurrent neural network attention mechanisms for interpretable system log anomaly detection. arXiv:1803.04967 (2018)","DOI":"10.1145\/3217871.3217872"},{"key":"38_CR5","unstructured":"Chalapathy, R., Menon, A.K., Chawla, S.: Anomaly detection using one-class neural networks. arXiv:1802.06360 (2018)"},{"key":"38_CR6","doi-asserted-by":"crossref","unstructured":"Chang, J., Wang, L., Meng, G., Xiang, S., Pan, C.: Deep adaptive image clustering. In: Proceedings of CVPR, Honolulu, Hawaii, pp. 5879\u20135887 (2017)","DOI":"10.1109\/ICCV.2017.626"},{"key":"38_CR7","unstructured":"Dilokthanakul, N., et al.: Deep unsupervised clustering with Gaussian mixture variational autoencoders. arXiv:1611.02648 (2016)"},{"issue":"4","key":"38_CR8","doi-asserted-by":"publisher","first-page":"e0152173","DOI":"10.1371\/journal.pone.0152173","volume":"11","author":"M Goldstein","year":"2016","unstructured":"Goldstein, M., Uchida, S.: A comparative evaluation of unsupervised anomaly detection algorithms for multivariate data. PloS One 11(4), e0152173 (2016)","journal-title":"PloS One"},{"key":"38_CR9","unstructured":"Golts, A., Freedman, D., Elad, M.: Deep energy: Using energy functions for unsupervised training of DNNs. arXiv:1805.12355 (2018)"},{"key":"38_CR10","unstructured":"Goodfellow, I., Bengio, Y., Courville, A.: Deep Learning. MIT Press, Cambridge (2016). http:\/\/www.deeplearningbook.org"},{"key":"38_CR11","unstructured":"Gutflaish, E., Kontorovich, A., Sabato, S., Biller, O., Sofer, O.: Temporal anomaly detection: calibrating the surprise. arXiv:1705.10085 (2017)"},{"key":"38_CR12","doi-asserted-by":"crossref","unstructured":"Harada, Y., Yamagata, Y., Mizuno, O., Choi, E.H.: Log-based anomaly detection of CPS using a statistical method. In: 2017 8th International Workshop on Empirical Software Engineering in Practice (IWESEP), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/IWESEP.2017.12"},{"key":"38_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1007\/978-3-642-35289-8_32","volume-title":"Neural Networks: Tricks of the Trade","author":"GE Hinton","year":"2012","unstructured":"Hinton, G.E.: A practical guide to training restricted Boltzmann machines. In: Montavon, G., Orr, G.B., M\u00fcller, K.-R. (eds.) Neural Networks: Tricks of the Trade. LNCS, vol. 7700, pp. 599\u2013619. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-35289-8_32"},{"issue":"7","key":"38_CR14","doi-asserted-by":"publisher","first-page":"1527","DOI":"10.1162\/neco.2006.18.7.1527","volume":"18","author":"GE Hinton","year":"2006","unstructured":"Hinton, G.E., Osindero, S., Teh, Y.W.: A fast learning algorithm for deep belief nets. Neural Comput. 18(7), 1527\u20131554 (2006)","journal-title":"Neural Comput."},{"key":"38_CR15","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1109\/TMM.2017.2745702","volume":"20","author":"CC Hsu","year":"2018","unstructured":"Hsu, C.C., Lin, C.W.: CNN-based joint clustering and representation learning with feature drift compensation for large-scale image data. IEEE Trans. Multimedia 20, 421\u2013429 (2018)","journal-title":"IEEE Trans. Multimedia"},{"key":"38_CR16","doi-asserted-by":"crossref","unstructured":"Huang, P., Huang, Y., Wang, W., Wang, L.: Deep embedding network for clustering. In: 22nd International Conference on Pattern Recognition, ICPR 2014, 24\u201328 August 2014, Stockholm, Sweden, pp. 1532\u20131537 (2014)","DOI":"10.1109\/ICPR.2014.272"},{"key":"38_CR17","doi-asserted-by":"crossref","unstructured":"Iyyer, M., Manjunatha, V., Boyd-Graber, J., Daum\u00e9 III, H.: Deep unordered composition rivals syntactic methods for text classification. In: Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing (Volume 1: Long Papers), vol. 1, pp. 1681\u20131691 (2015)","DOI":"10.3115\/v1\/P15-1162"},{"key":"38_CR18","doi-asserted-by":"crossref","unstructured":"Jiang, Z., Zheng, Y., Tan, H., Tang, B., Zhou, H.: Variational deep embedding: an unsupervised and generative approach to clustering. In: Proceedings of IJCAI, Melbourne, Australia , pp. 1965\u20131972, August 2017","DOI":"10.24963\/ijcai.2017\/273"},{"key":"38_CR19","unstructured":"Juan, D.C., Shah, N., Tang, M., Qian, Z., Marculescu, D., Faloutsos, C.: M3a: Model, metamodel, and anomaly detection in web searches. arXiv:1606.05978 (2016)"},{"key":"38_CR20","unstructured":"Kilinc, O., Uysal, I.: Learning latent representations in neural networks for clustering through pseudo supervision and graph-based activity regularization. In: Proceedings of ICLR (2018)"},{"key":"38_CR21","unstructured":"Kingma, D.P., Welling, M.: Auto-encoding variational Bayes. arXiv:1312.6114 (2013)"},{"key":"38_CR22","unstructured":"Lecun, Y.: Modeles connexionnistes de l\u2019apprentissage (connectionist learning models). Ph.D. thesis, Universite P. et M. Curie (Paris 6), Paris, France (1987)"},{"key":"38_CR23","unstructured":"Metz, L., Maheswaranathan, N., Cheung, B., Sohl-Dickstein, J.: Learning unsupervised learning rules. arXiv:1804.00222 (2018)"},{"key":"38_CR24","unstructured":"Mikolov, T., Sutskever, I., Chen, K., Corrado, G.S., Dean, J.: Distributed representations of words and phrases and their compositionality. In: Proceedings of NIPS, pp. 3111\u20133119 (2013)"},{"key":"38_CR25","doi-asserted-by":"publisher","first-page":"39501","DOI":"10.1109\/ACCESS.2018.2855437","volume":"6","author":"E Min","year":"2018","unstructured":"Min, E., Guo, X., Liu, Q., Zhang, G., Cui, J., Long, J.: A survey of clustering with deep learning: from the perspective of network architecture. IEEE Access 6, 39501\u201339514 (2018)","journal-title":"IEEE Access"},{"key":"38_CR26","doi-asserted-by":"crossref","unstructured":"Mukherjee, S., Asnani, H., Lin, E., Kannan, S.: Clustergan: Latent space clustering in generative adversarial networks. arXiv:1809.03627 , October 2018","DOI":"10.1609\/aaai.v33i01.33014610"},{"key":"38_CR27","doi-asserted-by":"crossref","unstructured":"Nguyen, Q.P., Lim, K.W., Divakaran, D.M., Low, K.H., Chan, M.C.: Gee: A gradient-based explainable variational autoencoder for network anomaly detection. arXiv:1903.06661 (2019)","DOI":"10.1109\/CNS.2019.8802833"},{"issue":"2","key":"38_CR28","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1109\/LSP.2018.2889273","volume":"26","author":"P Oza","year":"2018","unstructured":"Oza, P., Patel, V.M.: One-class convolutional neural network. IEEE Sig. Process. Lett. 26(2), 277\u2013281 (2018)","journal-title":"IEEE Sig. Process. Lett."},{"key":"38_CR29","unstructured":"Radford, A., Metz, L., Chintala, S.: Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv:1511.06434 (2015)"},{"key":"38_CR30","doi-asserted-by":"crossref","unstructured":"Ranzato, M.A., Poultney, C., Chopra, S., Cun, Y.L.: Efficient learning of sparse representations with an energy-based model. In: Sch\u00f6lkopf, B., Platt, J.C., Hoffman, T. (eds.) Advances in Neural Information Processing Systems 19, pp. 1137\u20131144. MIT Press (2007)","DOI":"10.7551\/mitpress\/7503.003.0147"},{"key":"38_CR31","unstructured":"Rifai, S., Vincent, P., Muller, X., Glorot, X., Bengio, Y.: Contracting auto-encoders: explicit invariance during feature extraction. In: Proceedings of ICML (2011)"},{"key":"38_CR32","unstructured":"Ruff, L., et al.: Deep one-class classification. In: International Conference on Machine Learning, pp. 4390\u20134399 (2018)"},{"key":"38_CR33","unstructured":"Salakhutdinov, R., Hinton, G.: Deep Boltzmann machines. In: van Dyk, D., Welling, M. (eds.) Proceedings of the Twelth International Conference on Artificial Intelligence and Statistics, vol. 5, pp. 448\u2013455. Clearwater Beach, Florida, April 2009"},{"issue":"7","key":"38_CR34","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1162\/089976601750264965","volume":"13","author":"B Sch\u00f6lkopf","year":"2001","unstructured":"Sch\u00f6lkopf, B., Platt, J.C., Shawe-Taylor, J., Smola, A.J., Williamson, R.C.: Estimating the support of a high-dimensional distribution. Neural Comput. 13(7), 1443\u20131471 (2001)","journal-title":"Neural Comput."},{"key":"38_CR35","unstructured":"Sun, L., Versteeg, S., Boztas, S., Rao, A.: Detecting anomalous user behavior using an extended isolation forest algorithm: an enterprise case study. arXiv:1609.06676 (2016)"},{"issue":"1","key":"38_CR36","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1023\/B:MACH.0000008084.60811.49","volume":"54","author":"DM Tax","year":"2004","unstructured":"Tax, D.M., Duin, R.P.: Support vector data description. Mach. Learn. 54(1), 45\u201366 (2004)","journal-title":"Mach. Learn."},{"key":"38_CR37","unstructured":"Tuor, A., Kaplan, S., Hutchinson, B., Nichols, N., Robinson, S.: Deep learning for unsupervised insider threat detection in structured cybersecurity data streams. In: Workshops at the Thirty-First AAAI Conference on Artificial Intelligence (2017)"},{"key":"38_CR38","doi-asserted-by":"crossref","unstructured":"Vincent, P., Larochelle, H., Bengio, Y., Manzagol, P.A.: Extracting and composing robust features with denoising autoencoders. In: Proceedings of ICML, pp. 1096\u20131103, January 2008","DOI":"10.1145\/1390156.1390294"},{"key":"38_CR39","unstructured":"Xie, J., Girshick, R., Farhadi, A.: Unsupervised deep embedding for clustering analysis. In: Proceedings of ICML, New York, pp. 478\u2013487 (2016)"},{"key":"38_CR40","unstructured":"Yang, B., Fu, X., Sidiropoulos, N.D., Hong, M.: Towards k-means-friendly spaces: simultaneous deep learning and clustering. In: Proceedings of ICML, Sydney, Australia, pp. 3861\u20133870, August 2017"},{"key":"38_CR41","doi-asserted-by":"crossref","unstructured":"Yang, J., Parikh, D., Batra, D.: Joint unsupervised learning of deep representations and image clusters. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, 27\u201330 June 2016, Las Vegas, NV, USA, pp. 5147\u20135156 (2016)","DOI":"10.1109\/CVPR.2016.556"},{"key":"38_CR42","unstructured":"Yang, T., Arvanitidis, G., Fu, D., Li, X., Hauberg, S.: Geodesic clustering in deep generative models. arXiv:1809.04747 , September 2018"}],"container-title":["Lecture Notes in Computer Science","Product-Focused Software Process Improvement"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-35333-9_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,23]],"date-time":"2023-09-23T01:57:26Z","timestamp":1695434246000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-35333-9_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030353322","9783030353339"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-35333-9_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"18 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PROFES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Product-Focused Software Process Improvement","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"profes2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/profes2019.upc.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"65","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The 11 short papers were selected from 30 submissions.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}