{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T20:35:07Z","timestamp":1769114107294,"version":"3.49.0"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T00:00:00Z","timestamp":1738195200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T00:00:00Z","timestamp":1738195200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Key Laboratory Project of Enterprise Informatization and IoT Measurement and Control Technology for Universities in Sichuan Province","award":["2024WYJ06"],"award-info":[{"award-number":["2024WYJ06"]}]},{"name":"Sichuan Local technological development Program","award":["2024ZYD0266"],"award-info":[{"award-number":["2024ZYD0266"]}]},{"name":"Tibet Science and Technology Program","award":["XZ202401YD0023"],"award-info":[{"award-number":["XZ202401YD0023"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"DOI":"10.1007\/s11227-025-06926-3","type":"journal-article","created":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T19:54:37Z","timestamp":1738266877000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["LogCTBL: a hybrid deep learning model for log-based anomaly detection"],"prefix":"10.1007","volume":"81","author":[{"given":"Hong","family":"Huang","sequence":"first","affiliation":[]},{"given":"Wengang","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Yunfei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yinghang","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Weitao","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,30]]},"reference":[{"key":"6926_CR1","first-page":"257","volume-title":"Future intent-based networking: on the QoS robust and energy efficient heterogeneous software defined networks","author":"V Susukailo","year":"2021","unstructured":"Susukailo V, Opirsky I, Yaremko O (2021) Methodology of isms establishment against modern cybersecurity threats. Future intent-based networking: on the QoS robust and energy efficient heterogeneous software defined networks. Springer, Berlin, pp 257\u2013271"},{"key":"6926_CR2","doi-asserted-by":"crossref","unstructured":"Oprea A, Li Z, Yen T-F, Chin SH, Alrwais S (2015) Detection of early-stage enterprise infection by mining large-scale log data. In: 2015 45th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks. IEEE, pp 45\u201356","DOI":"10.1109\/DSN.2015.14"},{"key":"6926_CR3","doi-asserted-by":"crossref","unstructured":"Harada Y, Yamagata Y, Mizuno O, Choi E-H (2017) Log-based anomaly detection of cps using a statistical method. In: 2017 8th International Workshop on Empirical Software Engineering in Practice (IWESEP). IEEE, pp 1\u20136","DOI":"10.1109\/IWESEP.2017.12"},{"issue":"17","key":"6926_CR4","doi-asserted-by":"publisher","first-page":"3580","DOI":"10.3390\/electronics12173580","volume":"12","author":"C Hu","year":"2023","unstructured":"Hu C, Sun X, Dai H, Zhang H, Liu H (2023) Research on log anomaly detection based on sentence-BERT. Electronics 12(17):3580","journal-title":"Electronics"},{"key":"6926_CR5","doi-asserted-by":"crossref","unstructured":"He P, Zhu J, Zheng Z, Lyu MR (2017) Drain: An online log parsing approach with fixed depth tree. In: 2017 IEEE International Conference on Web Services (ICWS). IEEE, pp 33\u201340","DOI":"10.1109\/ICWS.2017.13"},{"issue":"8","key":"6926_CR6","first-page":"8596","volume":"35","author":"T Zhang","year":"2023","unstructured":"Zhang T, Qiu H, Castellano G, Rifai M, Chen CS, Pianese F (2023) System log parsing: a survey. IEEE Trans Knowl Data Eng 35(8):8596\u20138614","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"5","key":"6926_CR7","doi-asserted-by":"publisher","first-page":"3224","DOI":"10.1109\/TSC.2023.3270566","volume":"16","author":"S Yu","year":"2023","unstructured":"Yu S, He P, Chen N, Wu Y (2023) Brain: Log parsing with bidirectional parallel tree. IEEE Trans Serv Comput 16(5):3224\u20133237","journal-title":"IEEE Trans Serv Comput"},{"key":"6926_CR8","doi-asserted-by":"crossref","unstructured":"Vaarandi R, Pihelgas M (2015) Logcluster-a data clustering and pattern mining algorithm for event logs. In: 2015 11th International Conference on Network and Service Management (CNSM). IEEE, pp 1\u20137","DOI":"10.1109\/CNSM.2015.7367331"},{"issue":"3","key":"6926_CR9","first-page":"879","volume":"48","author":"H Dai","year":"2020","unstructured":"Dai H, Li H, Chen C-S, Shang W, Chen T-H (2020) Logram: Efficient log parsing using $$n$$ n-gram dictionaries. IEEE Trans Software Eng 48(3):879\u2013892","journal-title":"IEEE Trans Software Eng"},{"key":"6926_CR10","doi-asserted-by":"publisher","first-page":"111646","DOI":"10.1016\/j.jss.2023.111646","volume":"200","author":"S Yu","year":"2023","unstructured":"Yu S, Chen N, Wu Y, Dou W (2023) Self-supervised log parsing using semantic contribution difference. J Syst Softw 200:111646","journal-title":"J Syst Softw"},{"issue":"11","key":"6926_CR11","doi-asserted-by":"publisher","first-page":"2213","DOI":"10.1109\/TKDE.2018.2875442","volume":"31","author":"M Du","year":"2018","unstructured":"Du M, Li F (2018) Spell: Online streaming parsing of large unstructured system logs. IEEE Trans Knowl Data Eng 31(11):2213\u20132227","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"4","key":"6926_CR12","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/3543146.3543168","volume":"49","author":"S Tao","year":"2022","unstructured":"Tao S, Meng W, Cheng Y, Zhu Y, Liu Y, Du C, Han T, Zhao Y, Wang X, Yang H (2022) Logstamp: Automatic online log parsing based on sequence labelling. ACM SIGMETRICS Perform Eval Rev 49(4):93\u201398","journal-title":"ACM SIGMETRICS Perform Eval Rev"},{"key":"6926_CR13","doi-asserted-by":"publisher","first-page":"103808","DOI":"10.1016\/j.cose.2024.103808","volume":"140","author":"Z Yin","year":"2024","unstructured":"Yin Z, Kong X, Yin C (2024) Semi-supervised log anomaly detection based on bidirectional temporal convolution network. Comput Secur 140:103808","journal-title":"Comput Secur"},{"key":"6926_CR14","doi-asserted-by":"publisher","first-page":"108616","DOI":"10.1016\/j.comnet.2021.108616","volume":"203","author":"Z Wang","year":"2022","unstructured":"Wang Z, Tian J, Fang H, Chen L, Qin J (2022) Lightlog: A lightweight temporal convolutional network for log anomaly detection on the edge. Comput Netw 203:108616","journal-title":"Comput Netw"},{"key":"6926_CR15","doi-asserted-by":"crossref","unstructured":"Du M, Li F, Zheng G, Srikumar V (2017) Deeplog: Anomaly detection and diagnosis from system logs through deep learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp 1285\u20131298","DOI":"10.1145\/3133956.3134015"},{"key":"6926_CR16","doi-asserted-by":"crossref","unstructured":"Zhang X, Xu Y, Lin Q, Qiao B, Zhang H, Dang Y, Xie C, Yang X, Cheng Q, Li Z., et\u00a0al (2019) Robust log-based anomaly detection on unstable log data. In: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. pp 807\u2013817","DOI":"10.1145\/3338906.3338931"},{"key":"6926_CR17","first-page":"1","volume":"18","author":"P Tang","year":"2024","unstructured":"Tang P, Guan Y (2024) Log anomaly detection based on BERT. Sig Image Video Process 18:1\u201311","journal-title":"Sig Image Video Process"},{"key":"6926_CR18","doi-asserted-by":"publisher","first-page":"110689","DOI":"10.1016\/j.asoc.2023.110689","volume":"146","author":"Y Lee","year":"2023","unstructured":"Lee Y, Kim J, Kang P (2023) Lanobert: System log anomaly detection based on BERT masked language model. Appl Soft Comput 146:110689","journal-title":"Appl Soft Comput"},{"key":"6926_CR19","first-page":"11","volume-title":"International conference on smart computing and communication","author":"H Wang","year":"2022","unstructured":"Wang H, Chen Y, Zhang C, Li J, Gan C, Zhang Y, Chen X (2022) Genglad: A generated graph based log anomaly detection framework. International conference on smart computing and communication. Springer, Cham, pp 11\u201322"},{"key":"6926_CR20","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1016\/j.future.2021.05.024","volume":"124","author":"X Liu","year":"2021","unstructured":"Liu X, Liu W, Di X, Li J, Cai B, Ren W, Yang H (2021) Lognads: Network anomaly detection scheme based on log semantics representation. Futur Gener Comput Syst 124:390\u2013405","journal-title":"Futur Gener Comput Syst"},{"key":"6926_CR21","doi-asserted-by":"crossref","unstructured":"Xie Y, Yang K (2023) Log anomaly detection by adversarial autoencoders with graph feature fusion. IEEE Trans Reliab","DOI":"10.1109\/TR.2023.3305376"},{"issue":"16","key":"6926_CR22","doi-asserted-by":"publisher","first-page":"17491","DOI":"10.1007\/s11227-022-04508-1","volume":"78","author":"X Wang","year":"2022","unstructured":"Wang X, Cao Q, Wang Q, Cao Z, Zhang X, Wang P (2022) Robust log anomaly detection based on contrastive learning and multi-scale mass. J Supercomput 78(16):17491\u201317512","journal-title":"J Supercomput"},{"issue":"2","key":"6926_CR23","doi-asserted-by":"publisher","first-page":"1378","DOI":"10.1109\/TNSM.2023.3239522","volume":"20","author":"J Qi","year":"2023","unstructured":"Qi J, Luan Z, Huang S, Fung C, Yang H, Li H, Zhu D, Qian D (2023) Logencoder: Log-based contrastive representation learning for anomaly detection. IEEE Trans Netw Serv Manage 20(2):1378\u20131391","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"6926_CR24","doi-asserted-by":"crossref","unstructured":"Huang H, Zhang X, Lu Y, Li Z, Zhou S (2024) Bstfnet: An encrypted malicious traffic classification method integrating global semantic and spatiotemporal features. Comput Mater Continua 78(3)","DOI":"10.32604\/cmc.2024.047918"},{"issue":"3","key":"6926_CR25","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.32604\/csse.2022.022365","volume":"41","author":"J Wang","year":"2022","unstructured":"Wang J, Zhao C, He S, Gu Y, Alfarraj O, Abugabah A (2022) Loguad: Log unsupervised anomaly detection based on word2vec. Comput Syst Sci Eng 41(3):1207","journal-title":"Comput Syst Sci Eng"},{"issue":"5","key":"6926_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3434237","volume":"20","author":"U Naseem","year":"2021","unstructured":"Naseem U, Razzak I, Khan SK, Prasad M (2021) A comprehensive survey on word representation models: from classical to state-of-the-art word representation language models. Trans Asian Low-Resour Lang Inf Process 20(5):1\u201335","journal-title":"Trans Asian Low-Resour Lang Inf Process"},{"key":"6926_CR27","doi-asserted-by":"crossref","unstructured":"Wolf T, Debut L, Sanh V, Chaumond J, Delangue C, Moi A, Cistac P, Rault T, Louf R, Funtowicz M, et\u00a0al. (2020) Transformers: State-of-the-art natural language processing. In: Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing: System Demonstrations. pp 38\u201345","DOI":"10.18653\/v1\/2020.emnlp-demos.6"},{"issue":"6","key":"6926_CR28","doi-asserted-by":"publisher","first-page":"566","DOI":"10.3390\/jmse9060566","volume":"9","author":"L Wang","year":"2021","unstructured":"Wang L, Chen P, Chen L, Mou J (2021) Ship AIS trajectory clustering: an HDBSCAN-based approach. J Mar Sci Eng 9(6):566","journal-title":"J Mar Sci Eng"},{"issue":"4","key":"6926_CR29","first-page":"665","volume":"18","author":"D Susanto Stiawan","year":"2023","unstructured":"Susanto Stiawan D, Rini DP, Arifin MAS, Idris MY, Alsharif N, Budiarto R (2023) Dimensional reduction with fast ICA for IoT botnet detection. J Appl Secur Res 18(4):665\u2013688","journal-title":"J Appl Secur Res"},{"key":"6926_CR30","unstructured":"He S, Zhu J, He P, Lyu MR (2020) Loghub: A large collection of system log datasets towards automated log analytics. arXiv e-prints"},{"key":"6926_CR31","doi-asserted-by":"crossref","unstructured":"Xu W, Huang L, Fox A, Patterson D, Jordan MI (2009) Detecting large-scale system problems by mining console logs. In: Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles. pp 117\u2013132","DOI":"10.1145\/1629575.1629587"},{"key":"6926_CR32","unstructured":"Li K-L, Huang H-K, Tian S-F, Xu W (2003) Improving one-class svm for anomaly detection. In: Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No. 03EX693), vol 5. IEEE, pp 3077\u20133081"},{"key":"6926_CR33","doi-asserted-by":"crossref","unstructured":"Xu D, Wang Y, Meng Y, Zhang Z (2017) An improved data anomaly detection method based on isolation forest. In: 2017 10th International Symposium on Computational Intelligence and Design (ISCID), vol 2. IEEE, pp 287\u2013291","DOI":"10.1109\/ISCID.2017.202"},{"key":"6926_CR34","doi-asserted-by":"crossref","unstructured":"Meng W, Liu Y, Zhu Y, Zhang S, Pei D, Liu Y, Chen Y, Zhang R, Tao S, Sun P, et\u00a0al (2019) Loganomaly: Unsupervised detection of sequential and quantitative anomalies in unstructured logs. In: IJCAI, vol 19. pp 4739\u20134745","DOI":"10.24963\/ijcai.2019\/658"},{"key":"6926_CR35","doi-asserted-by":"crossref","unstructured":"Guo H, Yuan S, Wu X (2021) Logbert: Log anomaly detection via BERT. In: 2021 International Joint Conference on Neural Networks (IJCNN). IEEE, pp 1\u20138","DOI":"10.1109\/IJCNN52387.2021.9534113"},{"key":"6926_CR36","doi-asserted-by":"crossref","unstructured":"Nedelkoski S, Bogatinovski J, Acker A, Cardoso J, Kao O (2020) Self-attentive classification-based anomaly detection in unstructured logs. In: 2020 IEEE International Conference on Data Mining (ICDM). IEEE, pp 1196\u20131201","DOI":"10.1109\/ICDM50108.2020.00148"},{"key":"6926_CR37","doi-asserted-by":"crossref","unstructured":"Almodovar C, Sabrina F, Karimi S, Azad S.: Logfit (2024) Log anomaly detection using fine-tuned language models. IEEE Transactions on Network and Service Management","DOI":"10.36227\/techrxiv.22290982"},{"key":"6926_CR38","doi-asserted-by":"publisher","first-page":"110689","DOI":"10.1016\/j.asoc.2023.110689","volume":"146","author":"Y Lee","year":"2023","unstructured":"Lee Y, Kim J, Kang P (2023) Lanobert: System log anomaly detection based on BERT masked language model. Appl Soft Comput 146:110689","journal-title":"Appl Soft Comput"},{"key":"6926_CR39","doi-asserted-by":"crossref","unstructured":"He S, Zhu J, He P, Lyu M.R.: Experience report: System log analysis for anomaly detection. In: 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE). IEEE, pp 207\u2013218","DOI":"10.1109\/ISSRE.2016.21"},{"key":"6926_CR40","doi-asserted-by":"publisher","first-page":"111314","DOI":"10.1016\/j.asoc.2024.111314","volume":"153","author":"W Niu","year":"2024","unstructured":"Niu W, Liao X, Huang S, Li Y, Zhang X, Li B (2024) A robust wide & deep learning framework for log-based anomaly detection. Appl Soft Comput 153:111314","journal-title":"Appl Soft Comput"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-06926-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-025-06926-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-06926-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T19:54:57Z","timestamp":1738266897000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-025-06926-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,30]]},"references-count":40,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025,1]]}},"alternative-id":["6926"],"URL":"https:\/\/doi.org\/10.1007\/s11227-025-06926-3","relation":{},"ISSN":["1573-0484"],"issn-type":[{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,30]]},"assertion":[{"value":"7 January 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"448"}}