{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T20:56:59Z","timestamp":1758056219506,"version":"3.44.0"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032051752","type":"print"},{"value":"9783032051769","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T00:00:00Z","timestamp":1757894400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T00:00:00Z","timestamp":1757894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-05176-9_25","type":"book-chapter","created":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T13:40:47Z","timestamp":1757943647000},"page":"324-334","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Large Language Model Framework for Log Sequence Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Jo\u00e3o","family":"Reis","sequence":"first","affiliation":[]},{"given":"Miguel","family":"Areias","sequence":"additional","affiliation":[]},{"given":"Jorge","family":"G. Barbosa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,15]]},"reference":[{"key":"25_CR1","doi-asserted-by":"publisher","unstructured":"Du, M., Li, F., Zheng, G., Srikumar, V.: DeepLog: anomaly detection and diagnosis from system logs through deep learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1285\u20131298. Association for Computing Machinery, New York (2017). https:\/\/doi.org\/10.1145\/3133956.3134015","DOI":"10.1145\/3133956.3134015"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Meng, W., et al.: Loganomaly: unsupervised detection of sequential and quantitative anomalies in unstructured logs. In: Proceedings of the 28th International Joint Conference on Artificial Intelligence, pp. 4739\u20134745. AAAI Press, Macao, China (2019)","DOI":"10.24963\/ijcai.2019\/658"},{"key":"25_CR3","doi-asserted-by":"publisher","unstructured":"Han, X., Yuan, S., Trabelsi, M.: LogGPT: log anomaly detection via GPT. In: 2023 IEEE International Conference on Big Data (BigData), pp. 1117\u20131122. IEEE, Piscataway, NJ, USA (2023). https:\/\/doi.org\/10.1109\/BigData59044.2023.10386543","DOI":"10.1109\/BigData59044.2023.10386543"},{"key":"25_CR4","doi-asserted-by":"publisher","unstructured":"Xu, W., Huang, L., Fox, A., Patterson, D., Jordan, M.I.: Detecting large-scale system problems by mining console logs. In: Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, pp. 117\u2013132. Association for Computing Machinery, New York (2009). https:\/\/doi.org\/10.1145\/1629575.1629587","DOI":"10.1145\/1629575.1629587"},{"key":"25_CR5","doi-asserted-by":"publisher","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation forest. In: 2008 Eighth IEEE International Conference on Data Mining, pp. 413\u2013422. IEEE, Piscataway, NJ, USA (2008). https:\/\/doi.org\/10.1109\/ICDM.2008.17","DOI":"10.1109\/ICDM.2008.17"},{"key":"25_CR6","doi-asserted-by":"publisher","unstructured":"Wang, Y., Wong, J., Miner, A.: Anomaly intrusion detection using one class SVM. In: Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004., pp. 358\u2013364. IEEE, Piscataway, NJ, USA (2004). https:\/\/doi.org\/10.1109\/IAW.2004.1437839","DOI":"10.1109\/IAW.2004.1437839"},{"key":"25_CR7","doi-asserted-by":"publisher","unstructured":"Guo, H., Yuan, S., Wu, X.: LogBERT: Log Anomaly Detection via BERT. In: 2021 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20138. IEEE, Piscataway, NJ, USA (2021). https:\/\/doi.org\/10.1109\/IJCNN52387.2021.9534113","DOI":"10.1109\/IJCNN52387.2021.9534113"},{"key":"25_CR8","unstructured":"Radford, A., Wu, J., Child, R., Luan, D., Amodei, D., Sutskever, I.: Language Models are Unsupervised Multitask Learners. OpenAI Technical Report (2019). https:\/\/openai.com\/research\/language-models-are-unsupervised-multitask-learners"},{"key":"25_CR9","doi-asserted-by":"publisher","unstructured":"He, P., Zhu, J., Zheng, Z., Lyu, M.R.: Drain: an online log parsing approach with fixed depth tree. In: 2017 IEEE International Conference on Web Services (ICWS), pp. 33\u201340. IEEE, Piscataway, NJ, USA (2017). https:\/\/doi.org\/10.1109\/ICWS.2017.13","DOI":"10.1109\/ICWS.2017.13"},{"key":"25_CR10","unstructured":"Han, D., Han, M., Unsloth team: Unsloth. (2023). http:\/\/github.com\/unslothai\/unsloth Accessed 22 May 2025"},{"key":"25_CR11","unstructured":"Yang, Z., Harris, I.G.: LogLLaMA: Transformer-based log anomaly detection with LLaMA. arXiv preprint arXiv:2503.14849 (2025). https:\/\/arxiv.org\/abs\/2503.14849"},{"key":"25_CR12","doi-asserted-by":"publisher","unstructured":"Landauer, M., Skopik, F., Wurzenberger, M.: A critical review of common log data sets used for evaluation of sequence-based anomaly detection techniques. Proc. ACM Softw. Eng. 1(FSE), Article 61 (2024). https:\/\/doi.org\/10.1145\/3660768","DOI":"10.1145\/3660768"},{"key":"25_CR13","doi-asserted-by":"publisher","unstructured":"Xu, W., Huang, L., Fox, A., Patterson, D., Jordan, M.I.: Detecting large-scale system problems by mining console logs. In: Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, pp. 117\u2013132. Association for Computing Machinery, New York, (2009). https:\/\/doi.org\/10.1145\/1629575.1629587","DOI":"10.1145\/1629575.1629587"},{"key":"25_CR14","doi-asserted-by":"publisher","unstructured":"Oliner, A., Stearley, J.: What supercomputers say: a study of five system logs. In: Proceedings of the 37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, pp. 575\u2013584. IEEE Computer Society, USA (2007). https:\/\/doi.org\/10.1109\/DSN.2007.103","DOI":"10.1109\/DSN.2007.103"},{"key":"25_CR15","unstructured":"Qwen, Team.: Qwen2.5: A Party of Foundation Models. (2024). https:\/\/qwenlm.github.io\/blog\/qwen2.5\/Accessed 25 May 2025"},{"key":"25_CR16","unstructured":"Gemma, Team.: Gemma 3. Kaggle (2025). https:\/\/goo.gle\/Gemma3Report, last accessed 2025\/05\/25"},{"key":"25_CR17","unstructured":"AI@Meta: Llama 3 Model Card. (2024). https:\/\/github.com\/meta-llama\/llama3\/blob\/main\/MODEL_CARD.md Accessed 25 May 2025"},{"key":"25_CR18","doi-asserted-by":"publisher","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Proceedings of the 31st International Conference on Neural Information Processing Systems, pp. 6000\u20136010. Curran Associates Inc., Red Hook, NY, USA (2017). https:\/\/doi.org\/10.5555\/3295222.3295349","DOI":"10.5555\/3295222.3295349"},{"key":"25_CR19","unstructured":"Devlin, J., Chang, M.-W., Lee, K., Toutanova, K.: BERT: Pre-training of deep bidirectional transformers for language understanding. In: Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers), pp. 4171\u20134186. Association for Computational Linguistics, Minneapolis, MN, USA (2019)"},{"key":"25_CR20","unstructured":"Li, A., et al.: Anomaly detection of tabular data using LLMs. arXiv preprint arXiv:2406.16308 (2024). https:\/\/arxiv.org\/abs\/2406.16308"},{"key":"25_CR21","doi-asserted-by":"publisher","first-page":"7712","DOI":"10.1109\/TASE.2024.3468464","volume":"22","author":"Y Zhang","year":"2025","unstructured":"Zhang, Y., Cao, Y., Xu, X., Shen, W.: LogiCode: an LLM-Driven framework for logical anomaly detection. IEEE Trans. Autom. Sci. Eng. 22, 7712\u20137723 (2025). https:\/\/doi.org\/10.1109\/TASE.2024.3468464","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"25_CR22","unstructured":"Pospieszny, P., Mormul, W., Szyndler, K., Kumar, S.: ADALog: Adaptive Unsupervised Anomaly detection in Logs with Self-attention Masked Language Model. arXiv preprint arXiv:2505.13496 (2025). https:\/\/arxiv.org\/abs\/2505.13496"},{"key":"25_CR23","doi-asserted-by":"publisher","unstructured":"Benabderrahmane, S., Valtchev, P., Cheney, J., Rahwan, T.: APT-LLM: embedding-based anomaly detection of cyber advanced persistent threats using large language models. In: 2025 13th International Symposium on Digital Forensics and Security (ISDFS), pp. 1\u20136. IEEE, Piscataway, NJ, USA (2025). https:\/\/doi.org\/10.1109\/ISDFS65363.2025.11011912","DOI":"10.1109\/ISDFS65363.2025.11011912"}],"container-title":["Lecture Notes in Computer Science","Progress in Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-05176-9_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T13:40:59Z","timestamp":1757943659000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-05176-9_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,15]]},"ISBN":["9783032051752","9783032051769"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-05176-9_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,15]]},"assertion":[{"value":"15 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"EPIA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"EPIA Conference on Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Faro","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"epia2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/epia2025.ualg.pt\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}