{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:26:54Z","timestamp":1740122814127,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2019,3,23]],"date-time":"2019-03-23T00:00:00Z","timestamp":1553299200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Shanghai University Youth Teacher Training Funding Scheme","award":["ZZslg16054"],"award-info":[{"award-number":["ZZslg16054"]}]},{"name":"Grant of Shandong Province Vocational Education Educational Reform Research Project","award":["2017209"],"award-info":[{"award-number":["2017209"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s11042-018-7020-3","type":"journal-article","created":{"date-parts":[[2019,3,23]],"date-time":"2019-03-23T15:02:27Z","timestamp":1553353347000},"page":"21521-21535","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Improving the system log analysis with language model and semi-supervised classifier"],"prefix":"10.1007","volume":"78","author":[{"given":"Guofu","family":"Li","sequence":"first","affiliation":[]},{"given":"Pengjia","family":"Zhu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6430-3586","authenticated-orcid":false,"given":"Ning","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Mei","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Zhiyi","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Guangsheng","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Hongjun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chenjing","family":"Gong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,23]]},"reference":[{"issue":"7","key":"7020_CR1","doi-asserted-by":"publisher","first-page":"7977","DOI":"10.1007\/s11042-017-4695-9","volume":"77","author":"J A\u00f1orga","year":"2018","unstructured":"A\u00f1orga J, Arrizabalaga S, Sedano B, Goya J, Alonso-Arce M, Mendizabal J (2018) Analysis of youtube\u2019s traffic adaptation to dynamic environments. Multimed Tools Appl 77(7):7977","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"7020_CR2","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1109\/TDSC.2015.2469655","volume":"14","author":"MZA Bhuiyan","year":"2017","unstructured":"Bhuiyan MZA, Wang G, Wu J, Cao J, Liu X, Wang T (2017) Dependable structural health monitoring using wireless sensor networks. IEEE Trans Depend Secure Comput 14(4):363","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"7020_CR3","first-page":"993","volume":"3","author":"DM Blei","year":"2003","unstructured":"Blei DM, Ng AY, Jordan MI (2003) Latent dirichlet allocation. J Mach Learn Res 3:993","journal-title":"J Mach Learn Res"},{"key":"7020_CR4","volume-title":"Statistical language learning","author":"E Charniak","year":"1996","unstructured":"Charniak E (1996) Statistical language learning. MIT, Cambridge"},{"issue":"1","key":"7020_CR5","first-page":"95","volume":"55","author":"R Cheng","year":"2018","unstructured":"Cheng R, Xu R, Tang X, Sheng VS, Cai C (2018) An abnormal network flow feature sequence prediction approach for ddos attacks detection in big data environment. Comput Mater Contin 55(1):95","journal-title":"Comput Mater Contin"},{"issue":"21","key":"7020_CR6","doi-asserted-by":"publisher","first-page":"22871","DOI":"10.1007\/s11042-016-4262-9","volume":"76","author":"D Datta","year":"2017","unstructured":"Datta D, Singh SK, Chowdary CR (2017) Bridging the gap: effect of text query reformulation in multimodal retrieval. Multimed Tools Appl 76(21):22871","journal-title":"Multimed Tools Appl"},{"key":"7020_CR7","doi-asserted-by":"crossref","unstructured":"Du M, Li F, Zheng G, Srikumar V (2017) .. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security. ACM, pp 1285\u20131298","DOI":"10.1145\/3133956.3134015"},{"issue":"2","key":"7020_CR8","doi-asserted-by":"publisher","first-page":"2423","DOI":"10.1007\/s11042-017-4398-2","volume":"77","author":"B Elayeb","year":"2018","unstructured":"Elayeb B, Romdhane WB, Saoud NBB (2018) Towards a new possibilistic query translation tool for cross-language information retrieval. Multimed Tools Appl 77(2):2423","journal-title":"Multimed Tools Appl"},{"issue":"9","key":"7020_CR9","doi-asserted-by":"publisher","first-page":"3537","DOI":"10.1007\/s00500-015-1710-9","volume":"20","author":"P He","year":"2016","unstructured":"He P, Deng Z, Wang H, Liu Z (2016) Model approach to grammatical evolution: theory and case study. Soft Comput 20(9):3537","journal-title":"Soft Comput"},{"issue":"18","key":"7020_CR10","doi-asserted-by":"publisher","first-page":"5413","DOI":"10.1007\/s00500-016-2130-1","volume":"21","author":"P He","year":"2017","unstructured":"He P, Deng Z, Gao C, Wang X, Li J (2017) Model approach to grammatical evolution: deep-structured analyzing of model and representation. Soft Comput 21(18):5413","journal-title":"Soft Comput"},{"issue":"1","key":"7020_CR11","first-page":"23","volume":"53","author":"J Kaur","year":"2017","unstructured":"Kaur J, Kaur K (2017) A fuzzy approach for an iot-based automated employee performance appraisal. Comput Mater Contin 53(1):23","journal-title":"Comput Mater Contin"},{"key":"7020_CR12","unstructured":"Kobayashi S, Fukuda K, Esaki H (2014). In: Proceedings of the ninth international conference on future internet technologies. ACM, p 11"},{"issue":"6","key":"7020_CR13","doi-asserted-by":"publisher","first-page":"1231","DOI":"10.1007\/s11390-017-1797-9","volume":"32","author":"Q Liu","year":"2017","unstructured":"Liu Q, Guo Y, Wu J, Wang G (2017) Effective query grouping strategy in clouds. J Comput Sci Technol 32(6):1231","journal-title":"J Comput Sci Technol"},{"issue":"7","key":"7020_CR14","doi-asserted-by":"publisher","first-page":"2257","DOI":"10.1007\/s00500-017-2487-9","volume":"22","author":"Y Liu","year":"2018","unstructured":"Liu Y, Ling J, Liu Z, Shen J, Gao C (2018) Finger vein secure biometric template generation based on deep learning. Soft Comput 22(7):2257","journal-title":"Soft Comput"},{"key":"7020_CR15","unstructured":"Ponte JM, Croft WB (1998). In: Proceedings of the 21st annual international ACM SIGIR conference on research and development in information retrieval. ACM, pp 275\u2013281"},{"key":"7020_CR16","doi-asserted-by":"crossref","unstructured":"Rumelhart DE, Hinton GE, Williams RJ (1985) Learning internal representations by error propagation. Tech. rep. California Univ San Diego La Jolla Inst for Cognitive Science","DOI":"10.21236\/ADA164453"},{"key":"7020_CR17","unstructured":"Salvetti F, Nicolov N (2006). In: Proceedings of the human language technology conference of the NAACL, companion volume: short papers. Association for Computational Linguistics, pp 137\u2013140"},{"key":"7020_CR18","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.jnca.2018.01.003","volume":"106","author":"J Shen","year":"2018","unstructured":"Shen J, Gui Z, Ji S, Shen J, Tan H, Tang Y (2018) Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J Netw Comput Appl 106:117\u2013123","journal-title":"J Netw Comput Appl"},{"key":"7020_CR19","unstructured":"Silverstein C, Marais H, Henzinger M, Moricz M (1999). In: ACm SIGIR forum, vol 33. ACM, pp 6\u201312"},{"issue":"1","key":"7020_CR20","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1504\/IJART.2017.083907","volume":"10","author":"S Sylaiou","year":"2017","unstructured":"Sylaiou S, Mania K, Paliokas I, Pujol-Tost L, Killintzis V, Liarokapis F (2017) Exploring the educational impact of diverse technologies in online virtual museums. Int J Arts Technol 10(1):58","journal-title":"Int J Arts Technol"},{"key":"7020_CR21","doi-asserted-by":"crossref","unstructured":"Veale T, Chen H, Li G (2017) I read the news today, oh boy, international conference on distributed, ambient, and pervasive interactions. In: International conference on distributed, ambient, and pervasive interactions. Springer, Cham, pp 696\u2013709","DOI":"10.1007\/978-3-319-58697-7_52"},{"issue":"21","key":"7020_CR22","doi-asserted-by":"publisher","first-page":"22599","DOI":"10.1007\/s11042-017-4732-8","volume":"76","author":"AN Venkitasubramanian","year":"2017","unstructured":"Venkitasubramanian AN, Tuytelaars T, Moens MF (2017) Entity linking across vision and language. Multimed Tools Appl 76(21):22599","journal-title":"Multimed Tools Appl"},{"key":"7020_CR23","unstructured":"\u0158eh\u016f\u0159ek R, Sojka P (2010) .. In: Proceedings of the LREC 2010 workshop on new challenges for NLP frameworks. ELRA, Malta, pp 45\u201350"},{"key":"7020_CR24","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.ins.2016.12.030","volume":"387","author":"Z Xia","year":"2017","unstructured":"Xia Z, Xiong NN, Vasilakos AV, Sun X (2017) Epcbir: an efficient and privacy-preserving content-based image retrieval scheme in cloud computing. Inf Sci 387:195","journal-title":"Inf Sci"},{"issue":"1","key":"7020_CR25","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1109\/TCC.2015.2491933","volume":"6","author":"Z Xia","year":"2018","unstructured":"Xia Z, Zhu Y, Sun X, Qin Z, Ren K (2018) Towards privacy-preserving content-based image retrieval in cloud computing. IEEE Trans Cloud Comput 6(1):276","journal-title":"IEEE Trans Cloud Comput"},{"key":"7020_CR26","doi-asserted-by":"crossref","unstructured":"Xu W, Huang L, Fox A, Patterson D, Jordan MI (2009) .. In: Proceedings of the ACM SIGOPS 22nd symposium on operating systems principles. ACM, pp 117\u2013132","DOI":"10.1145\/1629575.1629587"},{"key":"7020_CR27","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.jnca.2016.10.002","volume":"86","author":"W Yang","year":"2017","unstructured":"Yang W, Wang G, Bhuiyan MZA, Choo KKR (2017) Hypergraph partitioning for social networks based on information entropy modularity. J Netw Comput Appl 86:59","journal-title":"J Netw Comput Appl"},{"key":"7020_CR28","doi-asserted-by":"crossref","unstructured":"Yen TF, Oprea A, Onarlioglu K, Leetham T, Robertson W, Juels A, Kirda E (2013) Beehive: Large-scale log analysis for detecting suspicious activity in enterprise networks. In: Proceedings of the 29th annual computer security applications conference. ACM, pp 199\u2013208","DOI":"10.1145\/2523649.2523670"},{"key":"7020_CR29","unstructured":"Yuan D, Mai H, Xiong W, Tan L, Zhou Y, Pasupathy S (2010) Sherlog: error diagnosis by connecting clues from run-time logs, architectural support for programming languages and operating systems. 38(1):143"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-7020-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-7020-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-7020-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,22]],"date-time":"2020-03-22T00:14:37Z","timestamp":1584836077000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-7020-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,23]]},"references-count":29,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["7020"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-7020-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2019,3,23]]},"assertion":[{"value":"12 July 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 November 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 December 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 March 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}