{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:29:10Z","timestamp":1740137350375,"version":"3.37.3"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,4,11]],"date-time":"2021-04-11T00:00:00Z","timestamp":1618099200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,11]],"date-time":"2021-04-11T00:00:00Z","timestamp":1618099200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s10207-021-00547-6","type":"journal-article","created":{"date-parts":[[2021,4,11]],"date-time":"2021-04-11T09:02:42Z","timestamp":1618131762000},"page":"161-177","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A semantic-aware log generation method for network activities"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5977-7912","authenticated-orcid":false,"given":"Aun","family":"Yichiet","sequence":"first","affiliation":[]},{"given":"Yen-Min Jasmina","family":"Khaw","sequence":"additional","affiliation":[]},{"given":"Ming-Lee","family":"Gan","sequence":"additional","affiliation":[]},{"given":"Vasaki","family":"Ponnusamy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,11]]},"reference":[{"key":"547_CR1","doi-asserted-by":"crossref","unstructured":"Jia, Z., Shen, C., Yi, X., Chen, Y., Yu, T. and Guan, X. \"Big-data analysis of multi-source logs for anomaly detection on network-based system.\" in 13th IEEE Conference on Automation Science and Engineering (CASE), Xi'an, China, 2017.","DOI":"10.1109\/COASE.2017.8256257"},{"key":"547_CR2","unstructured":"Shi, S., Shen, X., Zhao J. and Ma, X. \"Research on system logs collection and analysis model of the network and information security system by using multi-agent technology.\" in Multimedia Information Networking and Security (MINES), 2012 Fourth International Conference on, 2012."},{"key":"547_CR3","doi-asserted-by":"crossref","unstructured":"Ikebe, M. and Yoshida, K. \"An integrated distributed log management system with metadata for network operation.\" in Seventh International Conference on Complex, Intelligent, and Software Intensive Systems, 2013.","DOI":"10.1109\/CISIS.2013.134"},{"key":"547_CR4","doi-asserted-by":"crossref","unstructured":"Shafiq, O. and Alhajj, R.R.J.G. \"Handling incomplete data using semantic logging based social network analysis hexagon for effective application monitoring and management.\" in IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014), 2014.","DOI":"10.1109\/ASONAM.2014.6921652"},{"key":"547_CR5","volume-title":"automation for everyone: Modernize your network with Red Hat Ansible Network Automation","author":"N HatRed","year":"2018","unstructured":"HatRed, N.: automation for everyone: Modernize your network with Red Hat Ansible Network Automation. Red Hat Inc, United States (2018)"},{"key":"547_CR6","unstructured":"ExtraHop, Better together: An executive\u2019s guide to integrating SecOps and NetOps, ExtraHop networks, Inc, 2019."},{"key":"547_CR7","doi-asserted-by":"crossref","unstructured":"Yang, Y., Huang C. and Qin, Z. \"A network misuse detection mechanism based on traffic log.\" in International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009.","DOI":"10.1109\/NSWCTC.2009.237"},{"key":"547_CR8","unstructured":"AWS, \"CloudTrail concepts,\" Amazon Web Services, Inc., 2021. [Online]. Available: https:\/\/docs.aws.amazon.com\/awscloudtrail\/latest\/userguide\/cloudtrail-concepts.html. [Accessed 2021 January 14]."},{"key":"547_CR9","unstructured":"Quittek, J. \"Artificial intelligence in network operations and management,\" NEC Corporation, Europe, 2018."},{"key":"547_CR10","doi-asserted-by":"crossref","unstructured":"Yan, D., Feng, .R., Huang, J. and Yang, F. \"Host scurity event track for complex network, enviranments based on the analysis of log.\" in Proceedings of IEEE CCIS2012, 2012.","DOI":"10.1109\/CCIS.2012.6664287"},{"key":"547_CR11","doi-asserted-by":"crossref","unstructured":"Wei, J. Zhao, Y., Jiang, K., Xie, R. and Jin, Y. \"Analysis farm: A cloud-based scalable aggregation and query platform for network log analysis,\" in International Conference on Cloud and Service Computing, 2011.","DOI":"10.1109\/CSC.2011.6138547"},{"key":"547_CR12","doi-asserted-by":"crossref","unstructured":"Guo-Feng. R. and Zhu-Mei, T. \"Application of self-organizing competitive network in lithologic identification of the logging data.\" in International Conference on Computing, Measurement, Control and Sensor Network, 2012.","DOI":"10.1109\/CMCSN.2012.38"},{"key":"547_CR13","doi-asserted-by":"crossref","unstructured":"Wu, J., Lv, R., Liu, Y-H. and Cao, G.X. \"A method of network traffic analysis based on multiple-combination model.\" in Fifth International Joint Conference on INC, IMS and IDC, 2009.","DOI":"10.1109\/NCM.2009.47"},{"key":"547_CR14","doi-asserted-by":"crossref","unstructured":"Kimura, T., Ishibashi. K., Mori, T. and Sawada, H., Toyono, T. \"Spatio-temporal factorization of log data for understanding network events.\" in IEEE Conference on Computer Communications (IEEE INFOCOM 2014), 2014.","DOI":"10.1109\/INFOCOM.2014.6847986"},{"key":"547_CR15","doi-asserted-by":"crossref","unstructured":"Zhu, H., Chen, E., Yu, K. H. Cao, H. Xiong and J. Tian, \"Mining personal context-aware preferences for mobile users.\" in IEEE 12th International Conference on Data Mining, 2012.","DOI":"10.1109\/ICDM.2012.31"},{"key":"547_CR16","unstructured":"Zhang, D.Y., Hu, M.Z., Zhang, H.L. and Kang, T.B. \"A network traffic model based on measurement.\" in Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, Guangzhou, 2005."},{"key":"547_CR17","doi-asserted-by":"crossref","unstructured":"Tavassoli, S. and Zweig, K.A. \"Analyzing the activity of a person in a chat by combining network analysis and fuzzy logic,\" in IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015.","DOI":"10.1145\/2808797.2809335"},{"key":"547_CR18","unstructured":"CISCO, \"Cisco DNA Center Solution Overview,\" Cisco Systems, Inc., 5 January 2021. [Online]. Available: https:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/cloud-systems-management\/dna-center\/nb-06-dna-center-so-cte-en.html. [Accessed 14 January 2021]."},{"key":"547_CR19","unstructured":"Veiga, A.P. \"Applications of artificial intelligence to network security,\" in ArXiv, United States Join institution, 2018."},{"key":"547_CR20","doi-asserted-by":"crossref","unstructured":"Sun, Z., Sheng, H., Wei, M., Yang, J., Zhang, H. and Wang, L. \"Application of web log mining in local area network security.\" in International Conference on Electronic & Mechanical Engineering and Information Technology, 2011.","DOI":"10.1109\/EMEIT.2011.6023097"},{"key":"547_CR21","doi-asserted-by":"crossref","unstructured":"Sato, T., Himura, Y. and Yasuda, Y. \"Evidence-based context-aware log data management for integrated monitoring system.\" in IEICE Transactions on Communications, 2019.","DOI":"10.1587\/transcom.2017EBP3396"},{"key":"547_CR22","doi-asserted-by":"crossref","unstructured":"Ma, H., Wu, Y., Ma, Y., and Wang, Z. \"Optimization scheme of CGN logs.\" in Proceedings of IEEE CCIS2012, 2012.","DOI":"10.1109\/CCIS.2012.6664289"},{"key":"547_CR23","doi-asserted-by":"crossref","unstructured":"Kimura, T., Watanabe, A., Toyono, T. and Ishibashi, K. \"Proactive failure detection learning generation patterns of large-scale network logs.\" in 11th International Conference on Network and Service Management (CNSM), 2015.","DOI":"10.1109\/CNSM.2015.7367332"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-021-00547-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-021-00547-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-021-00547-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,21]],"date-time":"2022-03-21T08:05:13Z","timestamp":1647849913000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-021-00547-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,11]]},"references-count":23,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["547"],"URL":"https:\/\/doi.org\/10.1007\/s10207-021-00547-6","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2021,4,11]]},"assertion":[{"value":"13 March 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}