{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:41:12Z","timestamp":1740123672694,"version":"3.37.3"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,1,14]],"date-time":"2020-01-14T00:00:00Z","timestamp":1578960000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,14]],"date-time":"2020-01-14T00:00:00Z","timestamp":1578960000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61872202"],"award-info":[{"award-number":["61872202"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61872200"],"award-info":[{"award-number":["61872200"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["11801284"],"award-info":[{"award-number":["11801284"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National Key Research and Development Program of China","award":["2016YFC0400709"],"award-info":[{"award-number":["2016YFC0400709"]}]},{"name":"National Key Research and Development Program of China","award":["2018YFB1003405"],"award-info":[{"award-number":["2018YFB1003405"]}]},{"name":"National Key Research and Development Program of China","award":["18YFYZCG00060"],"award-info":[{"award-number":["18YFYZCG00060"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s11036-019-01501-6","type":"journal-article","created":{"date-parts":[[2020,1,14]],"date-time":"2020-01-14T19:02:39Z","timestamp":1579028559000},"page":"1638-1649","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Confidence-Guided Evaluation for Log Parsers Inner Quality"],"prefix":"10.1007","volume":"26","author":[{"given":"Xueshuo","family":"Xie","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3252-9254","authenticated-orcid":false,"given":"Zhi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xuhang","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Ye","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Shenwei","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,14]]},"reference":[{"key":"1501_CR1","doi-asserted-by":"crossref","unstructured":"Zhu J, He P, Fu Q, Zhang H, Lyu MR, Zhang D (2015) Learning to log: helping developers make informed logging decisions. In: Proceedings of the 37th international conference on software engineering, vol 1. IEEE Press, pp 415\u2013425","DOI":"10.1109\/ICSE.2015.60"},{"key":"1501_CR2","doi-asserted-by":"crossref","unstructured":"Yuan D, Park S, Zhou Y (2012) Characterizing logging practices in open-source software. In: Proceedings of the 34th international conference on software engineering. IEEE Press, pp 102\u2013112","DOI":"10.1109\/ICSE.2012.6227202"},{"issue":"6","key":"1501_CR3","doi-asserted-by":"publisher","first-page":"1245","DOI":"10.1109\/TPDS.2013.21","volume":"24","author":"H Mi","year":"2013","unstructured":"Mi H, Wang H, Zhou Y, Lyu MR-T, Cai H (2013) Toward fine-grained, unsupervised, scalable performance diagnosis for production cloud computing systems. IEEE Trans Parallel Distrib Syst 24(6):1245\u20131255","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"2","key":"1501_CR4","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1145\/2076450.2076466","volume":"55","author":"A Oliner","year":"2012","unstructured":"Oliner A, Ganapathi A, Xu W (2012) Advances and challenges in log analysis. Commun ACM 55 (2):55\u201361","journal-title":"Commun ACM"},{"key":"1501_CR5","doi-asserted-by":"crossref","unstructured":"Xu W, Huang L, Fox A, Patterson D, Jordan MI (2009) Detecting large-scale system problems by mining console logs. In: Proceedings of the ACM SIGOPS 22nd symposium on operating systems principles. ACM, pp 117\u2013132","DOI":"10.1145\/1629575.1629587"},{"key":"1501_CR6","doi-asserted-by":"crossref","unstructured":"Oprea A, Li Z, Yen T-F, Chin SH, Alrwais S (2015) Detection of early-stage enterprise infection by mining large-scale log data. In: 2015 45th Annual IEEE\/IFIP international conference on dependable systems and networks (DSN). IEEE, pp 45\u201356","DOI":"10.1109\/DSN.2015.14"},{"key":"1501_CR7","doi-asserted-by":"crossref","unstructured":"Makanju A, Zincir-Heywood AN, Milios EE (2010) Fast entropy based alert detection in super computer logs. In: 2010 International conference on dependable systems and networks workshops (DSN-W). IEEE, pp 52\u201358","DOI":"10.1109\/DSNW.2010.5542621"},{"key":"1501_CR8","doi-asserted-by":"crossref","unstructured":"Sangaiah AK, Medhane DV, Han T, Hossain MS, Muhammad G (2019) Enforcing position-based confidentiality with machine learning paradigm through mobile edge computing in real-time industrial informatics. IEEE Transactions on Industrial Informatics","DOI":"10.1109\/TII.2019.2898174"},{"issue":"12","key":"1501_CR9","doi-asserted-by":"publisher","first-page":"1771","DOI":"10.14778\/2367502.2367516","volume":"5","author":"G Lee","year":"2012","unstructured":"Lee G, Lin J, Liu C, Lorek A, Ryaboy D (2012) The unified logging infrastructure for data analytics at twitter. Proce VLDB Endowm 5(12):1771\u20131780","journal-title":"Proce VLDB Endowm"},{"key":"1501_CR10","doi-asserted-by":"crossref","unstructured":"He S, Zhu J, He P, Lyu MR (2016) Experience report: system log analysis for anomaly detection. In: 2016 IEEE 27th International symposium on software reliability engineering (ISSRE). IEEE, pp 207\u2013218","DOI":"10.1109\/ISSRE.2016.21"},{"key":"1501_CR11","doi-asserted-by":"crossref","unstructured":"Bertero C, Roy M, Sauvanaud C, Tr\u00e9dan G (2017) Experience report: log mining using natural language processing and application to anomaly detection. In: 2017 IEEE 28th International symposium on software reliability engineering (ISSRE). IEEE, pp 351\u2013360","DOI":"10.1109\/ISSRE.2017.43"},{"key":"1501_CR12","doi-asserted-by":"crossref","unstructured":"Fu Q, Lou J-G, Wang Y, Li J (2009) Execution anomaly detection in distributed systems through unstructured log analysis. In: Ninth IEEE International conference on data mining, 2009. ICDM\u201909. IEEE, pp 149\u2013158","DOI":"10.1109\/ICDM.2009.60"},{"key":"1501_CR13","unstructured":"Chow M, Meisner D, Flinn J, Peek D, Wenisch TF (2014) The mystery machine: end-to-end performance analysis of large-scale internet services. In: OSDI, pp 217\u2013231"},{"key":"1501_CR14","unstructured":"Nagaraj K, Killian C, Neville J (2012) Structured comparative analysis of systems logs to diagnose performance problems. In: Proceedings of the 9th USENIX conference on networked systems design and implementation. USENIX Association, pp 26\u201326"},{"key":"1501_CR15","doi-asserted-by":"crossref","unstructured":"Yuan D, Mai H, Xiong W, Tan L, Zhou Y, Pasupathy S (2010) Sherlog: error diagnosis by connecting clues from run-time logs. In: ACM SIGARCH computer architecture news, vol 38, no. 1. ACM, pp 143\u2013154","DOI":"10.1145\/1735970.1736038"},{"key":"1501_CR16","doi-asserted-by":"crossref","unstructured":"Xu X, Zhu L, Weber I, Bass L, Sun D (2014) Pod-diagnosis: error diagnosis of sporadic operations on cloud applications. In: 2014 44th Annual IEEE\/IFIP international conference on dependable systems and networks (DSN). IEEE, pp 252\u2013263","DOI":"10.1109\/DSN.2014.94"},{"issue":"1","key":"1501_CR17","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1109\/TR.2011.2172031","volume":"61","author":"WE Wong","year":"2012","unstructured":"Wong WE, Debroy V, Golden R, Xu X, Thuraisingham B (2012) Effective software fault localization using an rbf neural network. IEEE Trans Reliab 61(1):149\u2013169","journal-title":"IEEE Trans Reliab"},{"key":"1501_CR18","doi-asserted-by":"crossref","unstructured":"Lin Q, Zhang H, Lou J-G, Zhang Y, Chen X (2016) Log clustering based problem identification for online service systems. In: Proceedings of the 38th international conference on software engineering companion. ACM, pp 102\u2013111","DOI":"10.1145\/2889160.2889232"},{"key":"1501_CR19","doi-asserted-by":"crossref","unstructured":"Du M, Li F, Zheng G, Srikumar V (2017) Deeplog: anomaly detection and diagnosis from system logs through deep learning. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security. ACM, pp 1285\u2013 1298","DOI":"10.1145\/3133956.3134015"},{"key":"1501_CR20","doi-asserted-by":"crossref","unstructured":"Vaarandi R (2003) A data clustering algorithm for mining patterns from event logs. In: 3rd IEEE Workshop on IP operations & management, 2003.(IPOM 2003). IEEE, pp 119\u2013126","DOI":"10.1109\/IPOM.2003.1251233"},{"key":"1501_CR21","doi-asserted-by":"crossref","unstructured":"Nagappan M, Vouk MA (2010) Abstracting log lines to log event types for mining software system logs. In: 2010 7th IEEE Working conference on mining software repositories (MSR). IEEE, pp 114\u2013117","DOI":"10.1109\/MSR.2010.5463281"},{"key":"1501_CR22","doi-asserted-by":"crossref","unstructured":"Vaarandi R, Pihelgas M (2015) Logcluster-a data clustering and pattern mining algorithm for event logs. In: 2015 11th International conference on network and service management (CNSM). IEEE, pp 1\u20137","DOI":"10.1109\/CNSM.2015.7367331"},{"key":"1501_CR23","doi-asserted-by":"crossref","unstructured":"Tang L, Li T, Perng C-S (2011) Logsig: generating system events from raw textual logs. In: Proceedings of the 20th ACM international conference on information and knowledge management. ACM, pp 785\u2013794","DOI":"10.1145\/2063576.2063690"},{"key":"1501_CR24","doi-asserted-by":"crossref","unstructured":"Hamooni H, Debnath B, Xu J, Zhang H, Jiang G, Mueen A (2016) Logmine: fast pattern recognition for log analytics. In: Proceedings of the 25th ACM international on conference on information and knowledge management. ACM, pp 1573\u2013 1582","DOI":"10.1145\/2983323.2983358"},{"key":"1501_CR25","doi-asserted-by":"crossref","unstructured":"Mizutani M (2013) Incremental mining of system log format. In: 2013 IEEE International conference on services computing (SCC). IEEE, pp 595\u2013602","DOI":"10.1109\/SCC.2013.73"},{"key":"1501_CR26","unstructured":"Shima K (2016) Length matters: clustering system log messages using length of words. arXiv:1611.03213"},{"key":"1501_CR27","doi-asserted-by":"crossref","unstructured":"Jiang ZM, Hassan AE, Flora P, Hamann G (2008) Abstracting execution logs to execution events for enterprise applications (short paper). In: The Eighth international conference on quality software, 2008. QSIC\u201908. IEEE, pp 181\u2013186","DOI":"10.1109\/QSIC.2008.50"},{"issue":"4","key":"1501_CR28","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1002\/smr.374","volume":"20","author":"ZM Jiang","year":"2008","unstructured":"Jiang ZM, Hassan AE, Hamann G, Flora P (2008) An automated approach for abstracting execution logs to execution events. J Softw Maint Evol Res Pract 20(4):249\u2013267","journal-title":"J Softw Maint Evol Res Pract"},{"issue":"11","key":"1501_CR29","doi-asserted-by":"publisher","first-page":"1921","DOI":"10.1109\/TKDE.2011.138","volume":"24","author":"A Makanju","year":"2012","unstructured":"Makanju A, Zincir-Heywood AN, Milios EE (2012) A lightweight algorithm for message type extraction in system application logs. IEEE Trans Knowl Data Eng 24(11):1921\u20131936","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1501_CR30","unstructured":"Min D, Li F (2017) Spell: streaming parsing of system event logs. In: IEEE International conference on data mining"},{"key":"1501_CR31","doi-asserted-by":"crossref","unstructured":"He P, Zhu J, Zheng Z, Lyu MR (2017) Drain: An online log parsing approach with fixed depth tree. In: 2017 IEEE International conference on web services (ICWS). IEEE, pp 33\u201340","DOI":"10.1109\/ICWS.2017.13"},{"key":"1501_CR32","unstructured":"He P, Zhu J, Xu P, Zheng Z, Lyu MR (2018) A directed acyclic graph approach to online log parsing. arXiv:1806.04356"},{"issue":"6","key":"1501_CR33","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1109\/TDSC.2017.2762673","volume":"15","author":"P He","year":"2018","unstructured":"He P, Zhu J, He S, Li J, Lyu MR (2018) Towards automated log parsing for large-scale log data analysis. IEEE Trans Depend Secur Comput 15(6):931\u2013944","journal-title":"IEEE Trans Depend Secur Comput"},{"key":"1501_CR34","doi-asserted-by":"crossref","unstructured":"Messaoudi S, Panichella A, Bianculli D, Briand L, Sasnauskas R (2018) A search-based approach for accurate identification of log message formats. In: Proceedings of the 26th IEEE\/ACM international conference on program comprehension (ICPC\u201918). ACM","DOI":"10.1145\/3196321.3196340"},{"key":"1501_CR35","doi-asserted-by":"crossref","unstructured":"He P, Zhu J, He S, Li J, Lyu MR (2016) An evaluation study on log parsing and its use in log mining. In: 2016 46th Annual IEEE\/IFIP international conference on dependable systems and networks (DSN). IEEE, pp 654\u2013661","DOI":"10.1109\/DSN.2016.66"},{"key":"1501_CR36","doi-asserted-by":"crossref","unstructured":"Zhu J, He S, Liu J, He P, Xie Q, Zheng Z, Lyu MR (2018) Tools and benchmarks for automated log parsing, arXiv:1811.03509","DOI":"10.1109\/ICSE-SEIP.2019.00021"},{"key":"1501_CR37","first-page":"371","volume":"9","author":"G Shafer","year":"2008","unstructured":"Shafer G, Vovk V (2008) A tutorial on conformal prediction. J Mach Learn Res 9:371\u2013421","journal-title":"J Mach Learn Res"},{"key":"1501_CR38","doi-asserted-by":"publisher","unstructured":"Papadopoulos H, Vovk V, Gammermam A (2007) Conformal prediction with neural networks. In: Proceedings of the 19th IEEE international conference on tools with artificial intelligence - volume 02, ser. ICTAI \u201907. [Online]. Available: https:\/\/doi.org\/10.1109\/ICTAI.2007.77. IEEE Computer Society, Washington, DC, pp 388\u2013395","DOI":"10.1109\/ICTAI.2007.77"},{"key":"1501_CR39","doi-asserted-by":"crossref","unstructured":"Papadopoulos H (2008) ch. Inductive conformal prediction: theory and application to neural networks","DOI":"10.5772\/6078"},{"key":"1501_CR40","unstructured":"Jordaney R, Sharad K, Dash SK, Wang Z, Papini D, Nouretdinov I, Cavallaro L (2017) Transcend: Detecting concept drift in malware classification models. In: proceedings OF the 26th USENIX security symposium (USENIX SECURITY\u201917). USENIX Association, pp 625\u2013642"},{"key":"1501_CR41","unstructured":"Pendlebury F, Pierazzi F, Jordaney R, Kinder J, Cavallaro L (2019) Tesseract: eliminating experimental bias in malware classification across space and time. In: Proceedings of the USENIX security symposium USENIX"},{"key":"1501_CR42","first-page":"2579","volume":"9","author":"Lvd Maaten","year":"2008","unstructured":"Maaten Lvd, Hinton G (2008) Visualizing data using t-sne. J Mach Learn Res 9:2579\u20132605","journal-title":"J Mach Learn Res"},{"key":"1501_CR43","unstructured":"He P, Zhu J, He S, Li J (2015) Log parser. https:\/\/github.com\/logpai\/logp-arser\/tree\/dev"},{"key":"1501_CR44","unstructured":"Fedorova V, Gammerman A, Nouretdinov I, Vovk V (2012) Plug-in martingales for testing exchangeability on-line. arXiv:1204.3251"},{"key":"1501_CR45","doi-asserted-by":"crossref","unstructured":"Ho S-S (2005) A martingale framework for concept change detection in time-varying data streams. In: Proceedings of the 22nd international conference on machine learning. ACM, pp 321\u2013327","DOI":"10.1145\/1102351.1102392"},{"key":"1501_CR46","doi-asserted-by":"crossref","unstructured":"He P (2017) An end-to-end log management framework for distributed systems. In: 2017 IEEE 36th symposium on reliable distributed systems (SRDS). IEEE, pp 266\u2013267","DOI":"10.1109\/SRDS.2017.41"},{"key":"1501_CR47","doi-asserted-by":"crossref","unstructured":"Beschastnikh I, Brun Y, Schneider S, Sloan M, Ernst MD (2011) Leveraging existing instrumentation to automatically infer invariant-constrained models. In: Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on foundations of software engineering. ACM, pp 267\u2013277","DOI":"10.1145\/2025113.2025151"},{"key":"1501_CR48","doi-asserted-by":"crossref","unstructured":"Shang W, Jiang ZM, Hemmati H, Adams B, Hassan AE, Martin P (2013) Assisting developers of big data analytics applications when deploying on hadoop clouds. In: 2013 35th International conference on software engineering (ICSE). IEEE, pp 402\u2013411","DOI":"10.1109\/ICSE.2013.6606586"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01501-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-019-01501-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01501-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,27]],"date-time":"2021-10-27T03:41:27Z","timestamp":1635306087000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-019-01501-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,14]]},"references-count":48,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["1501"],"URL":"https:\/\/doi.org\/10.1007\/s11036-019-01501-6","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2020,1,14]]},"assertion":[{"value":"14 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}