{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T08:50:55Z","timestamp":1771231855354,"version":"3.50.1"},"publisher-location":"Cham","reference-count":47,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031281235","type":"print"},{"value":"9783031281242","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-28124-2_2","type":"book-chapter","created":{"date-parts":[[2023,3,30]],"date-time":"2023-03-30T10:20:17Z","timestamp":1680171617000},"page":"11-22","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["GenGLAD: A Generated Graph Based Log Anomaly Detection Framework"],"prefix":"10.1007","author":[{"given":"Haolei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chun","family":"Gan","sequence":"additional","affiliation":[]},{"given":"Yinxian","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,31]]},"reference":[{"key":"2_CR1","unstructured":"Bai, S., Kolter, J.Z., Koltun, V.: An empirical evaluation of generic convolutional and recurrent networks for sequence modeling. CoRR abs\/1803.01271 (2018)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Bornet, P., Barkin, I., Wirtz, J.: Intelligent Automation: Welcome to the World of Hyperautomation - Learn How to Harness Artificial Intelligence to Boost Business & Make Our World More Human. WorldScientific (2021)","DOI":"10.1142\/12239"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Du, M., Li, F., Zheng, G., Srikumar, V.: DeepLog: anomaly detection and diagnosis from system logs through deep learning. In: ACM SIGSAC Conference on Computer and Communication Security, pp. 1285\u20131298 (2017)","DOI":"10.1145\/3133956.3134015"},{"issue":"1","key":"2_CR4","doi-asserted-by":"publisher","first-page":"135","DOI":"10.32604\/csse.2021.014030","volume":"37","author":"X Duan","year":"2021","unstructured":"Duan, X., Ying, S., Yuan, W., Cheng, H., Yin, X.: A generative adversarial networks for log anomaly detection. Comput. Syst. Sci. Eng. 37(1), 135\u2013148 (2021)","journal-title":"Comput. Syst. Sci. Eng."},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Gai, K., Du, Z., et al.: Efficiency-aware workload optimizations of heterogeneous cloud computing for capacity planning in financial industry. In: IEEE 2nd CSCloud (2015)","DOI":"10.1109\/CSCloud.2015.73"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Gai, K., Qiu, M., Elnagdy, S.: A novel secure big data cyber incident analytics framework for cloud-based cybersecurity insurance. In: IEEE BigData Security Conference (2016)","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.65"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Gai, K., Zhang, Y., et al.: Blockchain-enabled service optimizations in supply chain digital twin. In: IEEE TSC (2022)","DOI":"10.1109\/TSC.2022.3192166"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Gai, K., et al.: Electronic health record error prevention approach using ontology in big data. In: IEEE 17th HPCC (2015)","DOI":"10.1109\/HPCC-CSS-ICESS.2015.168"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Gao, X., Qiu, M.: Energy-based learning for preventing backdoor attack. In: KSEM (3), pp. 706\u2013721 (2022)","DOI":"10.1007\/978-3-031-10989-8_56"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Han, X., Pasquier, T.F.J., Bates, A., Mickens, J., Seltzer, M.I.: Unicorn: runtime provenance-based detector for advanced persistent threats. In: 27th Network and Distributed System Security Symposium, NDSS 2020 (2020)","DOI":"10.14722\/ndss.2020.24046"},{"issue":"4","key":"2_CR11","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1109\/TITB.2009.2023116","volume":"13","author":"F Hu","year":"2009","unstructured":"Hu, F., Lakdawala, S., et al.: Low-power, intelligent sensor hardware interface for medical data preprocessing. IEEE Trans. Inform. Tech. Biomed. 13(4), 656\u2013663 (2009)","journal-title":"IEEE Trans. Inform. Tech. Biomed."},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Kent, A.: Cyber security data sources for dynamic network research. In: Dynamic Networks and Cyber-Security, pp. 37\u201365 (05 2016)","DOI":"10.1142\/9781786340757_0002"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Kulyadi, S.P., Mohandas, P., et al.: Anomaly detection using generative adversarial networks on firewall log message data. In: 13th IEEE Conference on Electronics, Computers and Artificial Intelligence ECAI, pp. 1\u20136 (2021)","DOI":"10.1109\/ECAI52376.2021.9515086"},{"issue":"9","key":"2_CR14","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1016\/j.sysarc.2011.03.005","volume":"57","author":"J Li","year":"2011","unstructured":"Li, J., Ming, Z., et al.: Resource allocation robustness in multi-core embedded systems with inaccurate information. J. Sys. Arch. 57(9), 840\u2013849 (2011)","journal-title":"J. Sys. Arch."},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Li, Y., Gai, K., et al.: Intercrossed access controls for secure financial services on multimedia big data in cloud systems. In: ACM TMCCA (2016)","DOI":"10.1145\/2978575"},{"key":"2_CR16","unstructured":"Lindauer, B.: Insider threat test dataset (2020). https:\/\/kilthub.cmu.edu\/articles\/dataset\/Insider_Threat_Test_Dataset\/12841247"},{"key":"2_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2021.103498","volume":"131","author":"B Lindemann","year":"2021","unstructured":"Lindemann, B., Maschler, B., Sahlab, N., Weyrich, M.: A survey on anomaly detection for technical systems using LSTM networks. Comput. Ind. 131, 103498 (2021)","journal-title":"Comput. Ind."},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Liu, F., Wen, Y., et al.: Log2vec: a heterogeneous graph embedding based approach for detecting cyber threats within enterprise. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 1777\u20131794 (2019)","DOI":"10.1145\/3319535.3363224"},{"key":"2_CR19","unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. In: Bengio, Y., LeCun, Y. (eds.) 1st International Conference on Learning Representations, ICLR 2013, Workshop Track Proceedings (2013)"},{"key":"2_CR20","unstructured":"Mikolov, T., Sutskever, I., et al.: Distributed representations of words and phrases and their compositionality. In: Advances in Neural Information Processing Systems, vol. 26. Curran Associates, Inc. (2013)"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Moon, G.E., Newman-Griffis, D., et al.: Parallel data-local training for optimizing word2vec embeddings for word and graph embeddings. In: IEEE\/ACM Workshop on Machine Learning in High Performance Computing Environment, MLHPC@SC, 2019, pp. 44\u201355 (2019)","DOI":"10.1109\/MLHPC49564.2019.00010"},{"key":"2_CR22","first-page":"55","volume":"17","author":"DJ Nehinbe","year":"2018","unstructured":"Nehinbe, D.J.: A review of technical issues on ids and alerts. Global J. Comput. Sci. Technol. 17, 55\u201362 (2018)","journal-title":"Global J. Comput. Sci. Technol."},{"key":"2_CR23","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/978-3-030-30149-1_24","volume-title":"Industrial Networks and Intelligent Systems","author":"T-B-T Nguyen","year":"2019","unstructured":"Nguyen, T.-B.-T., Liao, T.-L., Vu, T.-A.: Anomaly detection using one-class SVM for logs of juniper router devices. In: Duong, T.Q., Vo, N.-S., Nguyen, L.K., Vien, Q.-T., Nguyen, V.-D. (eds.) INISCOM 2019. LNICST, vol. 293, pp. 302\u2013312. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30149-1_24"},{"issue":"12","key":"2_CR24","first-page":"1565","volume":"72","author":"J Niu","year":"2012","unstructured":"Niu, J., Gao, Y., et al.: Selecting proper wireless network interfaces for user experience enhancement with guaranteed probability. JPDC 72(12), 1565\u20131575 (2012)","journal-title":"JPDC"},{"key":"2_CR25","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1016\/j.neucom.2022.06.002","volume":"500","author":"M Pawlicki","year":"2022","unstructured":"Pawlicki, M., Kozik, R., Choras, M.: A survey on neural networks for (cyber-) security and (cyber-) security of neural networks. Neurocomputing 500, 1075\u20131087 (2022)","journal-title":"Neurocomputing"},{"issue":"13","key":"2_CR26","first-page":"10327","volume":"8","author":"H Qiu","year":"2020","unstructured":"Qiu, H., Dong, T., et al.: Adversarial attacks against network intrusion detection in IoT systems. IEEE IoT J. 8(13), 10327\u201310335 (2020)","journal-title":"IEEE IoT J."},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Qiu, H., Zheng, Q., et al.: Topological graph convolutional network-based urban traffic flow and density prediction. IEEE Trans. ITS (2020)","DOI":"10.1109\/TITS.2020.3032882"},{"issue":"2","key":"2_CR28","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1109\/JSYST.2014.2345733","volume":"11","author":"M Qiu","year":"2014","unstructured":"Qiu, M., Chen, Z., et al.: Energy-aware data allocation with hybrid memory for mobile cloud systems. IEEE Sys. J. 11(2), 813\u2013822 (2014)","journal-title":"IEEE Sys. J."},{"key":"2_CR29","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1016\/j.future.2017.08.004","volume":"87","author":"M Qiu","year":"2018","unstructured":"Qiu, M., Gai, K., Xiong, Z.: Privacy-preserving wireless communications using bipartite matching in social big data. FGCS 87, 772\u2013781 (2018)","journal-title":"FGCS"},{"key":"2_CR30","first-page":"55","volume":"46","author":"M Qiu","year":"2007","unstructured":"Qiu, M., Jia, Z., et al.: Voltage assignment with guaranteed probability satisfying timing constraint for real-time multiproceesor DSP. J. Signal Proc. Sys. 46, 55\u201373 (2007)","journal-title":"J. Signal Proc. Sys."},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Qiu, M., Li, H., Sha, E.: Heterogeneous real-time embedded software optimization considering hardware platform. In: ACM Symposium on Applied Computing, pp. 1637\u20131641 (2009)","DOI":"10.1145\/1529282.1529651"},{"key":"2_CR32","doi-asserted-by":"crossref","unstructured":"Qiu, M., Qiu, H.: Review on image processing based adversarial example defenses in computer vision. In: IEEE 6th International Conference on BigData Security, pp. 94\u201399 (2020)","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00027"},{"key":"2_CR33","doi-asserted-by":"crossref","unstructured":"Qiu, M., Qiu, H., et al.: Secure data sharing through untrusted clouds with blockchain-enabled key management. In: 3rd SmartBlock Conference, pp. 11\u201316 (2020)","DOI":"10.1109\/SmartBlock52591.2020.00010"},{"issue":"4","key":"2_CR34","first-page":"443","volume":"68","author":"M Qiu","year":"2008","unstructured":"Qiu, M., Sha, E., et al.: Energy minimization with loop fusion and multi-functional-unit scheduling for multidimensional DSP. JPDC 68(4), 443\u2013455 (2008)","journal-title":"JPDC"},{"key":"2_CR35","doi-asserted-by":"crossref","unstructured":"Qiu, M., Xue, C., Shao, Z., et al.: Efficient algorithm of energy minimization for heterogeneous wireless sensor network. In: IEEE EUC Conference, pp. 25\u201334 (2006)","DOI":"10.1007\/11802167_5"},{"key":"2_CR36","doi-asserted-by":"crossref","unstructured":"Qiu, M., Xue, C., et al.: Energy minimization with soft real-time and DVS for uniprocessor and multiprocessor embedded systems. In: IEEE DATE Conference, pp. 1\u20136 (2007)","DOI":"10.1109\/DATE.2007.364537"},{"issue":"3","key":"2_CR37","first-page":"501","volume":"18","author":"M Qiu","year":"2009","unstructured":"Qiu, M., Yang, L., Shao, Z., Sha, E.: Dynamic and leakage energy minimization with soft real-time loop scheduling and voltage assignment. IEEE TVLSI 18(3), 501\u2013504 (2009)","journal-title":"IEEE TVLSI"},{"issue":"5","key":"2_CR38","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1016\/j.jcss.2012.11.002","volume":"79","author":"M Qiu","year":"2013","unstructured":"Qiu, M., Zhang, L., Ming, Z., Chen, Z., Qin, X., Yang, L.T.: Security-aware optimization for ubiquitous computing systems with SEAT graph approach. J. Comput. Syst. Sci. 79(5), 518\u2013529 (2013)","journal-title":"J. Comput. Syst. Sci."},{"issue":"5","key":"2_CR39","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1109\/TCSII.2007.892215","volume":"54","author":"Z Shao","year":"2007","unstructured":"Shao, Z., Wang, M., et al.: Real-time dynamic voltage loop scheduling for multi-core embedded systems. IEEE Trans. Circuits Syst. II 54(5), 445\u2013449 (2007)","journal-title":"IEEE Trans. Circuits Syst. II"},{"key":"2_CR40","doi-asserted-by":"publisher","first-page":"152379","DOI":"10.1109\/ACCESS.2021.3126834","volume":"9","author":"S Wang","year":"2021","unstructured":"Wang, S., Balarezo, J.F., Kandeepan, S., Al-Hourani, A., Chavez, K.G., Rubinstein, B.: Machine learning in network anomaly detection: a survey. IEEE Access 9, 152379\u2013152396 (2021)","journal-title":"IEEE Access"},{"key":"2_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108616","volume":"203","author":"Z Wang","year":"2022","unstructured":"Wang, Z., Tian, J., Fang, H., Chen, L., Qin, J.: Lightlog: a lightweight temporal convolutional network for log anomaly detection on the edge. Comput. Netw. 203, 108616 (2022)","journal-title":"Comput. Netw."},{"issue":"8","key":"2_CR42","doi-asserted-by":"publisher","first-page":"1916","DOI":"10.1587\/transinf.2020EDL8016","volume":"103D","author":"Y Xie","year":"2020","unstructured":"Xie, Y., Ji, L., Cheng, X.: An attention-based GRU network for anomaly detection from system logs. IEICE Trans. Inf. Syst. 103D(8), 1916\u20131919 (2020)","journal-title":"IEICE Trans. Inf. Syst."},{"issue":"17","key":"2_CR43","doi-asserted-by":"publisher","first-page":"4804","DOI":"10.1002\/sec.1677","volume":"9","author":"L Zeng","year":"2016","unstructured":"Zeng, L., Xiao, Y., Chen, H., Sun, B., Han, W.: Computer operating system logging and security issues: a survey. Secur. Commun. Netw. 9(17), 4804\u20134821 (2016)","journal-title":"Secur. Commun. Netw."},{"issue":"4","key":"2_CR44","doi-asserted-by":"publisher","first-page":"4119","DOI":"10.1109\/TNSM.2021.3125967","volume":"18","author":"C Zhang","year":"2021","unstructured":"Zhang, C., Wang, X., Zhang, H., Zhang, H., Han, P.: Log sequence anomaly detection based on local information extraction and globally sparse transformer model. IEEE Trans. Netw. Serv. Manag. 18(4), 4119\u20134133 (2021)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"2_CR45","doi-asserted-by":"crossref","unstructured":"Zhang, H., Duan, D., Zhang, Q.: RWREL: a fast training framework for random walk-based knowledge graph embedding. In: ACAI 2021: 4th International Conference on Algorithms, Computing and Artificial Intelligence, pp. 67:1\u201367:6. ACM (2021)","DOI":"10.1145\/3508546.3508613"},{"issue":"2","key":"2_CR46","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s11265-009-0362-3","volume":"58","author":"L Zhang","year":"2018","unstructured":"Zhang, L., Qiu, M., Tseng, W., Sha, E.: Variable partitioning and scheduling for MPSOC with virtually shared scratch pad memory. J. Signal Proc. Sys. 58(2), 247\u2013265 (2018)","journal-title":"J. Signal Proc. Sys."},{"key":"2_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-030-74717-6_11","volume-title":"Smart Computing and Communication","author":"F Zhou","year":"2021","unstructured":"Zhou, F., Qu, H.: A GMM-based anomaly IP detection model from security logs. In: Qiu, M. (ed.) SmartCom 2020. LNCS, vol. 12608, pp. 97\u2013105. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-74717-6_11"}],"container-title":["Lecture Notes in Computer Science","Smart Computing and Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-28124-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,30]],"date-time":"2023-03-30T10:36:32Z","timestamp":1680172592000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-28124-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031281235","9783031281242"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-28124-2_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"31 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SmartCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"smartc2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cloud-conf.net\/smartcom\/2022\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"312","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"64","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}