{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:18:33Z","timestamp":1743095913959,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811557873"},{"type":"electronic","value":"9789811557880"}],"license":[{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-15-5788-0_42","type":"book-chapter","created":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T08:02:45Z","timestamp":1599552165000},"page":"429-441","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Self-Learning and Self-Organizing Log Files by Generating Recursive Associations"],"prefix":"10.1007","author":[{"given":"K. Indra","family":"Gandhi","sequence":"first","affiliation":[]},{"given":"A.","family":"Balaji","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,9]]},"reference":[{"key":"42_CR1","doi-asserted-by":"publisher","unstructured":"Fu, X., Ren, R., McKee, S.A., Zhan, J., Sun, N.: Digging deeper into cluster system logs for failure prediction and root cause diagnosis. In: 2014 IEEE International Conference on Cluster Computing (CLUSTER), Madrid, pp. 103\u2013112 (2014). \nhttps:\/\/doi.org\/10.1109\/cluster.2014.6968768","DOI":"10.1109\/cluster.2014.6968768"},{"key":"42_CR2","unstructured":"Salfner, F., Tschirpke, S.: Error log processing for accurate failure prediction. In: USENIX conference on Analysis of system logs (WASL\u201908). USENIX Association, USA, p. 4 (2008)"},{"key":"42_CR3","doi-asserted-by":"publisher","unstructured":"Chuah, E., et al.: Diagnosing the root-causes of failures from cluster log files. In: 2010 International Conference on High Performance Computing, Dona Paula, pp. 1\u201310 (2010). \nhttps:\/\/doi.org\/10.1109\/hipc.2010.5713159","DOI":"10.1109\/hipc.2010.5713159"},{"key":"42_CR4","doi-asserted-by":"publisher","unstructured":"Zou, D., Qin, H., Jin, H., Qiang, W., Han, Z., et al.: Improving log-based fault diagnosis by log classification. In: 11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan, pp. 446\u2013458 (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-662-44917-2_37.hal-01403114","DOI":"10.1007\/978-3-662-44917-2_37.hal-01403114"},{"key":"42_CR5","unstructured":"V\u00e1squez, V., Giancarlo, E.: Classification of Logs Using Machine Learning Technique. M.S. Thesis. Norwegian University of Science & Technology (2018)"},{"key":"42_CR6","doi-asserted-by":"publisher","unstructured":"Ren, R., et al.: Deep convolutional neural networks for log event classification on distributed cluster systems. In: 2018 IEEE International Conference on Big Data (Big Data), Seattle, WA, USA, pp. 1639\u20131646 (2018). \nhttps:\/\/doi.org\/10.1109\/bigdata.2018.862261","DOI":"10.1109\/bigdata.2018.862261"},{"key":"42_CR7","doi-asserted-by":"publisher","unstructured":"Kahles, J., T\u00f6rr\u00f6nen, J., Huuhtanen, T., Jung, A.: Automating root cause analysis via machine learning in agile software testing environments. In: 2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST), Xi\u2019an, China, pp. 379\u2013390 (2019). \nhttps:\/\/doi.org\/10.1109\/icst.2019.00047","DOI":"10.1109\/icst.2019.00047"},{"key":"42_CR8","doi-asserted-by":"publisher","unstructured":"Du, M., Li, F., Zheng, G., Srikumar, V.: DeepLog: anomaly detection and diagnosis from system logs through deep learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS \u201817), pp. 1285\u20131298. ACM, New York, NY, USA (2017). \nhttps:\/\/doi.org\/10.1145\/3133956.3134015","DOI":"10.1145\/3133956.3134015"},{"key":"42_CR9","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1186\/s13174-018-0087-2","volume":"9","author":"R Boutaba","year":"2018","unstructured":"Boutaba, R., Salahuddin, M.A., Limam, N., et al.: A comprehensive survey on machine learning for networking: evolution, applications and research opportunities. J. Internet Serv. Appl. 9, 16 (2018). \nhttps:\/\/doi.org\/10.1186\/s13174-018-0087-2","journal-title":"J. Internet Serv. Appl."},{"key":"42_CR10","unstructured":"Breier, J., Brani\u0161ov\u00e1, J.: Anomaly detection from log files using data mining techniques. Inf. Sci. Appl. 339, 449\u2013457 (2015)"},{"key":"42_CR11","doi-asserted-by":"publisher","unstructured":"Breier, J., Brani\u0161ov\u00e1, J.: A dynamic rule creation based anomaly detection method for identifying security breaches in log records. J. Wirel. Pers. Commun. 94, 497 (2017). \nhttps:\/\/doi.org\/10.1007\/s11277-015-3128-1","DOI":"10.1007\/s11277-015-3128-1"},{"key":"42_CR12","unstructured":"Nagaraj, K., Killian, C., Neville, J.: Structured comparative analysis of systems logs to diagnose performance problems. In: Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI\u201912). USENIX Association, Berkeley, CA, USA, p. 26 (2012)"},{"key":"42_CR13","doi-asserted-by":"publisher","unstructured":"Landauer, M., Wurzenberger, M., Skopik, F., Settanni, G., Filzmoser, P.: Dynamic log file analysis: an unsupervised cluster evolution approach for anomaly detection. Comput. Sec. 79, 94\u2013116 (2018). ISSN 0167-4048. \nhttps:\/\/doi.org\/10.1016\/j.cose.2018.08.009","DOI":"10.1016\/j.cose.2018.08.009"},{"key":"42_CR14","unstructured":"Seyyar, M.B., \u00c7atak, F.O., G\u00fcl, E.: Detection of attack-targeted scans from the Apache HTTP server access logs. Appl. Comput. Inform. 14(1), 28\u201336 (2018). ISSN 2210-8327"},{"key":"42_CR15","unstructured":"Fageeri, S.O., Ahmad, R.: An efficient log file analysis algorithm using binary-based data structure. Procedia Soc. Behav. Sci. 129, 518\u2013526 (2014). ISSN 1877-0428"}],"container-title":["Advances in Intelligent Systems and Computing","Evolution in Computational Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-5788-0_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T08:10:27Z","timestamp":1599552627000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-5788-0_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,9]]},"ISBN":["9789811557873","9789811557880"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-5788-0_42","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,9,9]]},"assertion":[{"value":"9 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}