{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T03:25:07Z","timestamp":1740108307593,"version":"3.37.3"},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2018,9,22]],"date-time":"2018-09-22T00:00:00Z","timestamp":1537574400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s00607-018-0662-1","type":"journal-article","created":{"date-parts":[[2018,9,22]],"date-time":"2018-09-22T03:15:03Z","timestamp":1537586103000},"page":"819-830","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Detect and correlate information system events through verbose logging messages analysis"],"prefix":"10.1007","volume":"101","author":[{"given":"Flora","family":"Amato","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4794-6023","authenticated-orcid":false,"given":"Giovanni","family":"Cozzolino","sequence":"additional","affiliation":[]},{"given":"Antonino","family":"Mazzeo","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Moscato","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,22]]},"reference":[{"issue":"4","key":"662_CR1","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1504\/IJGUC.2016.081011","volume":"7","author":"A Alicante","year":"2016","unstructured":"Alicante A, Benerecetti M, Corazza A, Silvestri S (2016) A distributed architecture to integrate ontological knowledge into information extraction. Int J Grid Util Comput 7(4):245\u2013256. \n                    https:\/\/doi.org\/10.1504\/IJGUC.2016.081011","journal-title":"Int J Grid Util Comput"},{"issue":"3","key":"662_CR2","first-page":"273","volume":"8","author":"F Amato","year":"2015","unstructured":"Amato F, Moscato F (2015) A model driven approach to data privacy verification in e-health systems. Trans Data Priv 8(3):273\u2013296","journal-title":"Trans Data Priv"},{"key":"662_CR3","doi-asserted-by":"publisher","first-page":"842","DOI":"10.1016\/j.compeleceng.2016.08.006","volume":"56","author":"F Amato","year":"2016","unstructured":"Amato F, Moscato F (2016) Pattern-based orchestration and automatic verification of composite cloud services. Comput Electr Eng 56:842\u2013853","journal-title":"Comput Electr Eng"},{"key":"662_CR4","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.future.2016.06.035","volume":"67","author":"F Amato","year":"2017","unstructured":"Amato F, Moscato F (2017) Exploiting cloud and workflow patterns for the analysis of composite cloud services. Future Gener Comput Syst 67:255\u2013265","journal-title":"Future Gener Comput Syst"},{"issue":"4","key":"662_CR5","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1504\/IJGUC.2017.088255","volume":"8","author":"N Chergui","year":"2017","unstructured":"Chergui N, Chikhi S, Kechadi T (2017) Semantic grid resource discovery based on skos ontology. Int J Grid Utility Comput (IJGUC) 8(4):269","journal-title":"Int J Grid Utility Comput (IJGUC)"},{"key":"662_CR6","doi-asserted-by":"publisher","unstructured":"Leemans M, van der Aalst WMP, van\u00a0den Brand MGJ (2018a) Recursion aware modeling and discovery for hierarchical software event log analysis. In: 2018 IEEE 25th international conference on software analysis, evolution and reengineering (SANER), pp 185\u2013196. \n                    https:\/\/doi.org\/10.1109\/SANER.2018.8330208","DOI":"10.1109\/SANER.2018.8330208"},{"key":"662_CR7","doi-asserted-by":"publisher","unstructured":"Leemans M, van der Aalst WMP, van\u00a0den Brand MGJ (2018b) The statechart workbench: Enabling scalable software event log analysis using process mining. In: 2018 IEEE 25th international conference on software analysis, evolution and reengineering (SANER), pp 502\u2013506. \n                    https:\/\/doi.org\/10.1109\/SANER.2018.8330248","DOI":"10.1109\/SANER.2018.8330248"},{"key":"662_CR8","doi-asserted-by":"publisher","unstructured":"Li T, Jiang Y, Zeng C, Xia B, Liu Z, Zhou W, Zhu X, Wang W, Zhang L, Wu J, Xue L, Bao D (2017) Flap: An end-to-end event log analysis platform for system management. In: Proceedings of the 23rd ACM SIGKDD international conference on knowledge discovery and data mining. ACM, New York, NY, USA, KDD \u201917, pp 1547\u20131556. \n                    https:\/\/doi.org\/10.1145\/3097983.3098022","DOI":"10.1145\/3097983.3098022"},{"issue":"1","key":"662_CR9","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s11416-016-0273-3","volume":"13","author":"R Luh","year":"2017","unstructured":"Luh R, Marschalek S, Kaiser M, Janicke H, Schrittwieser S (2017) Semantics-aware detection of targeted attacks: a survey. J Comput Virol Hacking Tech 13(1):47\u201385","journal-title":"J Comput Virol Hacking Tech"},{"key":"662_CR10","doi-asserted-by":"crossref","unstructured":"Manning C, Surdeanu M, Bauer J, Finkel J, Bethard S, McClosky D (2014) The stanford corenlp natural language processing toolkit. In: Proceedings of 52nd annual meeting of the association for computational linguistics: system demonstrations, pp 55\u201360","DOI":"10.3115\/v1\/P14-5010"},{"issue":"4","key":"662_CR11","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1504\/IJGUC.2017.10009369","volume":"8","author":"G Sanges","year":"2017","unstructured":"Sanges G, Aversa R, Tasquier L (2017) An autonomic monitoring framework for iaas cloud applications. Int J Grid Utility Comput (IJGUC) 8(4):330","journal-title":"Int J Grid Utility Comput (IJGUC)"},{"issue":"2","key":"662_CR12","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1504\/IJGUC.2018.091723","volume":"9","author":"H Xu","year":"2018","unstructured":"Xu H, Ding J, Li P, Sgandurra D, Wang R (2018) An improved smurf scheme for cleaning rfid data. Int J Grid Util Comput 9(2):170\u2013178","journal-title":"Int J Grid Util Comput"},{"issue":"2\u20133","key":"662_CR13","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1504\/IJGUC.2013.056254","volume":"4","author":"J Zhang","year":"2013","unstructured":"Zhang J, Huang ML, Hoang D (2013) Visual analytics for intrusion detection in spam emails. Int J Grid Util Comput 4(2\u20133):178\u2013186","journal-title":"Int J Grid Util Comput"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-018-0662-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-018-0662-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-018-0662-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,21]],"date-time":"2019-09-21T19:13:37Z","timestamp":1569093217000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-018-0662-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,22]]},"references-count":13,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["662"],"URL":"https:\/\/doi.org\/10.1007\/s00607-018-0662-1","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"type":"print","value":"0010-485X"},{"type":"electronic","value":"1436-5057"}],"subject":[],"published":{"date-parts":[[2018,9,22]]},"assertion":[{"value":"30 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 September 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 September 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}