{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T19:19:03Z","timestamp":1761333543630,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032018229"},{"type":"electronic","value":"9783032018236"}],"license":[{"start":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T00:00:00Z","timestamp":1761350400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T00:00:00Z","timestamp":1761350400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-01823-6_5","type":"book-chapter","created":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T19:14:34Z","timestamp":1761333274000},"page":"70-88","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["United We Log, Divided We Identify: A Decentralized Approach for\u00a0Automated Log Analysis"],"prefix":"10.1007","author":[{"given":"Elnaz","family":"Rabieinejad","sequence":"first","affiliation":[]},{"given":"Ali","family":"Dehghantanha","sequence":"additional","affiliation":[]},{"given":"Fattane","family":"Zarrinkalam","sequence":"additional","affiliation":[]},{"given":"Jeff","family":"Schwartzentruber","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,25]]},"reference":[{"key":"5_CR1","unstructured":"ei, P., Li, Z., Wang, Z., Yu, X., Li, D., Jee, K.: Seal: storage-efficient causality analysis on enterprise logs with query-friendly compression. In: Proceedings of USENIX Security Symposium, pp. 2987\u20133004 (2021)"},{"key":"5_CR2","unstructured":"Li, B., Ma, S., Deng, R., Choo, K.K.R., Yang, J.: Federated learning for anomaly detection in large-scale network logs. IEEE Trans. Depen. Secur. Comput. (2022)"},{"key":"5_CR3","unstructured":"Lyons, A., et al.: Log: it\u2019s big, it\u2019s heavy, it\u2019s filled with personal data! Measuring the logging of sensitive information in the android ecosystem. In: Usenix Security Symposium (2023)"},{"key":"5_CR4","doi-asserted-by":"publisher","first-page":"3051","DOI":"10.1109\/TIFS.2022.3201379","volume":"17","author":"J Zhou","year":"2022","unstructured":"Zhou, J., Qian, Y., Zou, Q., Liu, P., Xiang, J.: DeepSyslog: deep anomaly detection on syslog using sentence embedding and metadata. IEEE Trans. Inf. Forensics Secur. 17, 3051\u20133061 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5_CR5","doi-asserted-by":"publisher","first-page":"2300","DOI":"10.1109\/TIFS.2021.3053371","volume":"16","author":"S Han","year":"2021","unstructured":"Han, S., et al.: Log-based anomaly detection with robust feature extraction and online learning. IEEE Trans. Inf. Forensics Secur. 16, 2300\u20132311 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Meng, W., et al.: A semantic-aware representation framework for online log analysis. In: Proceedings of the 29th International Conference on Computer Communications and Networks (ICCCN), pp. 1\u20137. IEEE (2020)","DOI":"10.1109\/ICCCN49398.2020.9209707"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Zeng, J., Chua, Z.L., Chen, Y., Ji, K., Liang, Z., Mao, J.: WATSON: abstracting behaviors from audit logs via aggregation of contextual semantics. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2021)","DOI":"10.14722\/ndss.2021.24549"},{"key":"5_CR8","doi-asserted-by":"publisher","first-page":"2059","DOI":"10.1109\/TIFS.2022.3176191","volume":"17","author":"J Zhao","year":"2022","unstructured":"Zhao, J., Zhu, H., Wang, F., Lu, R., Liu, Z., Li, H.: PVD-FL: a privacy-preserving and verifiable decentralized federated learning framework. IEEE Trans. Inf. Forensics Secur. 17, 2059\u20132073 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5_CR9","unstructured":"GDPR: General Data Protection Regulation. Regulation (EU), vol. 679 (2016)"},{"key":"5_CR10","doi-asserted-by":"publisher","first-page":"1912","DOI":"10.1109\/TIFS.2020.3044867","volume":"16","author":"Z Meng","year":"2020","unstructured":"Meng, Z., Xiong, Y., Huang, W., Miao, F., Huang, J.: AppAngio: revealing contextual information of android app behaviors by API-level audit logs. IEEE Trans. Inf. Forensics Secur. 16, 1912\u20131927 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5_CR11","unstructured":"DARPA-I2O: Transparent computing engagement 3 data release (2023). https:\/\/github.com\/darpa-i2o\/Transparent-Computing\/blob\/master\/README-E3.md"},{"issue":"2","key":"5_CR12","doi-asserted-by":"publisher","first-page":"1378","DOI":"10.1109\/TNSM.2023.3239522","volume":"20","author":"J Qi","year":"2023","unstructured":"Qi, J., et al.: LogEncoder: log-based contrastive representation learning for anomaly detection. IEEE Trans. Netw. Serv. Manage. 20(2), 1378\u20131391 (2023)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Zhang, X., et al.: Robust log-based anomaly detection on unstable log data. In: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 807\u2013817 (2019)","DOI":"10.1145\/3338906.3338931"},{"issue":"4","key":"5_CR14","doi-asserted-by":"publisher","first-page":"4750","DOI":"10.1109\/TNSM.2024.3400283","volume":"21","author":"R Xiao","year":"2024","unstructured":"Xiao, R., Li, W., Lu, J., Jin, S.: Contexlog: non-parsing log anomaly detection with all information preservation and enhanced contextual representation. IEEE Trans. Netw. Serv. Manage. 21(4), 4750\u20134762 (2024)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"2","key":"5_CR15","doi-asserted-by":"publisher","first-page":"1715","DOI":"10.1109\/TNSM.2024.3358730","volume":"21","author":"C Almodovar","year":"2024","unstructured":"Almodovar, C., Sabrina, F., Karimi, S., Azad, S.: LogFiT: log anomaly detection using fine-tuned language models. IEEE Trans. Netw. Serv. Manag. 21(2), 1715\u20131723 (2024)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Egersdoerfer, C., Zhang, D., Dai, D.: Clusterlog: clustering logs for effective log-based anomaly detection. In: 2022 IEEE\/ACM 12th Workshop on Fault Tolerance for HPC at eXtreme Scale (FTXS), pp. 1\u201310. IEEE (2022)","DOI":"10.1109\/FTXS56515.2022.00006"},{"issue":"6","key":"5_CR17","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1109\/TDSC.2017.2762673","volume":"15","author":"P He","year":"2017","unstructured":"He, P., Zhu, J., He, S., Li, J., Lyu, M.R.: Towards automated log parsing for large-scale log data analysis. IEEE Trans. Depen. Secur. Comput. 15(6), 931\u2013944 (2017)","journal-title":"IEEE Trans. Depen. Secur. Comput."},{"key":"5_CR18","doi-asserted-by":"publisher","first-page":"3972","DOI":"10.1109\/TIFS.2022.3208815","volume":"17","author":"S Wang","year":"2022","unstructured":"Wang, S., et al.: Threatrace: detecting and tracing host-based threats in node level through provenance graph learning. IEEE Trans. Inf. Forensics Secur. 17, 3972\u20133987 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5_CR19","doi-asserted-by":"publisher","first-page":"181152","DOI":"10.1109\/ACCESS.2019.2953981","volume":"7","author":"R Yang","year":"2019","unstructured":"Yang, R., Qu, D., Gao, Y., Qian, Y., Tang, Y.: NLSALog: an anomaly detection framework for log sequence in security management. IEEE Access 7, 181152\u2013181164 (2019)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-01823-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T19:14:36Z","timestamp":1761333276000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-01823-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,25]]},"ISBN":["9783032018229","9783032018236"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-01823-6_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,10,25]]},"assertion":[{"value":"25 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Munich","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/acns2025.fordaysec.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}