{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T21:34:02Z","timestamp":1753738442444,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031781650"},{"type":"electronic","value":"9783031781667"}],"license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-78166-7_23","type":"book-chapter","created":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T21:34:24Z","timestamp":1733088864000},"page":"351-365","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Optimizing Software Release Management with\u00a0GPT-Enabled Log Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Jahanggir Hossain","family":"Setu","sequence":"first","affiliation":[]},{"given":"Md. Shazzad","family":"Hossain","sequence":"additional","affiliation":[]},{"given":"Nabarun","family":"Halder","sequence":"additional","affiliation":[]},{"given":"Ashraful","family":"Islam","sequence":"additional","affiliation":[]},{"given":"M. Ashraful","family":"Amin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,2]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Le, V.-H., Zhang, H.: Log-based anomaly detection with deep learning: how far are we? In: Proceedings of the 44th International Conference on Software Engineering, pp. 1356\u20131367. IEEE (2022)","DOI":"10.1145\/3510003.3510155"},{"key":"23_CR2","doi-asserted-by":"publisher","first-page":"48231","DOI":"10.1109\/ACCESS.2018.2863036","volume":"6","author":"S Naseer","year":"2018","unstructured":"Naseer, S., et al.: Enhanced network anomaly detection based on deep neural networks. IEEE Access 6, 48231\u201348246 (2018)","journal-title":"IEEE Access"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Cao, Q., Qiao, Y., Lyu, Z.: Machine learning to detect anomalies in web log analysis. In: 2017 3rd IEEE international conference on computer and communications (ICCC), pp. 519\u2013523. IEEE (2017)","DOI":"10.1109\/CompComm.2017.8322600"},{"issue":"1","key":"23_CR4","first-page":"23","volume":"18","author":"T Tziolas","year":"2022","unstructured":"Tziolas, T., Papageorgiou, K., Theodosiou, T., Papageorgiou, E., Mastos, T., Papadopoulos, A.: Autoencoders for anomaly detection in an industrial multivariate time series dataset. Eng. Proc. 18(1), 23 (2022)","journal-title":"Eng. Proc."},{"key":"23_CR5","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems , vol. 30 (2017)"},{"key":"23_CR6","doi-asserted-by":"publisher","unstructured":"Zhao, Z., Niu, W., Zhang, X., Zhang, R., Yu, Z., Huang, C.: Trine: syslog anomaly detection with three transformer encoders in one generative adversarial network. Appl. Intell., 1\u201310 (2021). https:\/\/doi.org\/10.1007\/s10489-021-02863-9","DOI":"10.1007\/s10489-021-02863-9"},{"key":"23_CR7","doi-asserted-by":"publisher","first-page":"2656","DOI":"10.1109\/TC.2023.3257518","volume":"72","author":"S Huang","year":"2023","unstructured":"Huang, S., Liu, Y., Fung, C., Wang, H., Yang, H., Luan, Z.: Improving log-based anomaly detection by pre-training hierarchical transformers. IEEE Trans. Comput. 72, 2656\u20132667 (2023)","journal-title":"IEEE Trans. Comput."},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Santosa, I., Mulyana, R.: The IT services management architecture design for large and medium-sized companies based on ITIL 4 and TOGAF framework. JOIV: Int. J. Inform. Vis. 7(1), 30\u201336 (2023)","DOI":"10.30630\/joiv.7.1.1590"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Yu, G., et al: LogReducer: identify and reduce log hotspots in kernel on the fly. In: 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE), pp. 1763\u20131775. IEEE (2023)","DOI":"10.1109\/ICSE48619.2023.00151"},{"key":"23_CR10","doi-asserted-by":"publisher","unstructured":"Abbas, M., Hamayouni, A., Moghadam, M.H., Saadatmand, M., Strandberg, P.E.: Making Sense of Failure Logs in an Industrial DevOps Environment. In: Latifi, S. (eds.) International Conference on Information Technology-New Generations, pp. 217\u2013226. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-28332-1_25","DOI":"10.1007\/978-3-031-28332-1_25"},{"key":"23_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2022.102909","volume":"225","author":"S Kauffman","year":"2023","unstructured":"Kauffman, S.: Log analysis and system monitoring with NFER. Sci. Comput. Program. 225, 102909 (2023)","journal-title":"Sci. Comput. Program."},{"key":"23_CR12","volume-title":"Enterprise Log Managers: An Unsexy","author":"R Zanella","year":"2023","unstructured":"Zanella, R., Welch, B., Mendelsohn, M., Korte, B.: Enterprise Log Managers: An Unsexy. But Vital, Tool-Global Security Mag Online (2023)"},{"key":"23_CR13","doi-asserted-by":"publisher","first-page":"3803","DOI":"10.1109\/TNSM.2023.3236994","volume":"20","author":"W Meng","year":"2023","unstructured":"Meng, W., et al.: LogSummary: unstructured log summarization for software systems. IEEE Trans. Netw. Serv. Manag. 20, 3803\u20133815 (2023)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"4","key":"23_CR14","doi-asserted-by":"publisher","first-page":"2237","DOI":"10.3390\/app13042237","volume":"13","author":"M Li","year":"2023","unstructured":"Li, M., Sun, M., Li, G., Han, D., Zhou, M.: MDFULog: multi-feature deep fusion of unstable log anomaly detection model. Appl. Sci. 13(4), 2237 (2023)","journal-title":"Appl. Sci."},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Zhang, X., et al.: Robust log-based anomaly detection on unstable log data. In: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 807\u2013817 (2019)","DOI":"10.1145\/3338906.3338931"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Nedelkoski, S., Bogatinovski, J., Acker, A., Cardoso, J., Kao, O.: Self-attentive classification-based anomaly detection in unstructured logs. In: 2020 IEEE International Conference on Data Mining (ICDM), pp. 1196\u20131201. IEEE (2020)","DOI":"10.1109\/ICDM50108.2020.00148"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Guo, H., Yuan, S., Wu, X.: LogBERT: log anomaly detection via BERT. In: 2021 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20138. IEEE (2021)","DOI":"10.1109\/IJCNN52387.2021.9534113"},{"key":"23_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108616","volume":"203","author":"Z Wang","year":"2022","unstructured":"Wang, Z., Tian, J., Fang, H., Chen, L., Qin, J.: LightLog: a lightweight temporal convolutional network for log anomaly detection on the edge. Comput. Netw. 203, 108616 (2022)","journal-title":"Comput. Netw."},{"issue":"3","key":"23_CR19","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.32604\/csse.2022.022365","volume":"41","author":"J Wang","year":"2022","unstructured":"Wang, J., Zhao, C., He, S., Gu, Y., Alfarraj, O., Abugabah, A.: LogUAD: log unsupervised anomaly detection based on Word2Vec. Comput. Syst. Sci. Eng. 41(3), 1207 (2022)","journal-title":"Comput. Syst. Sci. Eng."},{"key":"23_CR20","unstructured":"Borders, T.L., Volkova, S.: An introduction to word embeddings and language models (No. INL\/EXT-21-61935-Rev000). Idaho National Lab.(INL), Idaho Falls, ID, United States (2021)"},{"issue":"3","key":"23_CR21","doi-asserted-by":"publisher","first-page":"165","DOI":"10.3390\/info15030165","volume":"15","author":"R Kusumaningrum","year":"2024","unstructured":"Kusumaningrum, R., Khoerunnisa, S.F., Khadijah, K., Syafrudin, M.: Exploring community awareness of mangrove ecosystem preservation through sentence-BERT and K-Means clustering. Information 15(3), 165 (2024)","journal-title":"Information"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Fan, J., Huang, L., Gong, C., You, Y., Gan, M., Wang, Z.: KMT-PLL: K-means cross-attention transformer for partial label learning. IEEE Trans. Neural Netw. Learn. Syst., 1\u20132 (2024)","DOI":"10.1109\/TNNLS.2023.3347792"},{"issue":"1","key":"23_CR23","first-page":"335","volume":"35","author":"A Tehseen","year":"2023","unstructured":"Tehseen, A., Ehsan, T., Liaqat, H.B., Ali, A., Al-Fuqaha, A.: Neural POS tagging of shahmukhi by using contextualized word representations. J. King Saud Univ. Comput. Inf. Sci. 35(1), 335\u2013356 (2023)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"23_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2022.109860","volume":"132","author":"C Zhang","year":"2023","unstructured":"Zhang, C., et al.: LayerLog: log sequence anomaly detection based on hierarchical semantics. Appl. Soft Comput. 132, 109860 (2023)","journal-title":"Appl. Soft Comput."},{"key":"23_CR25","doi-asserted-by":"crossref","unstructured":"Zhu, J., He, S., He, P., Liu, J., Lyu, M.R.: Loghub: a large collection of system log datasets for AI-driven log analytics. In 2023 IEEE 34th International Symposium on Software Reliability Engineering (ISSRE), pp. 355\u2013366. IEEE (2023)","DOI":"10.1109\/ISSRE59848.2023.00071"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-78166-7_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T23:38:03Z","timestamp":1733096283000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-78166-7_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"ISBN":["9783031781650","9783031781667"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-78166-7_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpr2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icpr2024.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}