{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T12:20:22Z","timestamp":1775737222484,"version":"3.50.1"},"reference-count":46,"publisher":"Informa UK Limited","issue":"1","license":[{"start":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T00:00:00Z","timestamp":1668643200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"CDTU PHD FUND","award":["2020RC002"],"award-info":[{"award-number":["2020RC002"]}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Applied Artificial Intelligence"],"published-print":{"date-parts":[[2022,12,31]]},"DOI":"10.1080\/08839514.2022.2145642","type":"journal-article","created":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T09:07:05Z","timestamp":1668676025000},"update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":72,"title":["BERT-Log: Anomaly Detection for System Logs Based on Pre-trained Language Model"],"prefix":"10.1080","volume":"36","author":[{"given":"Song","family":"Chen","sequence":"first","affiliation":[{"name":"School of Computer Engineering, Chengdu Technological University, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2862-7863","authenticated-orcid":false,"given":"Hai","family":"Liao","sequence":"additional","affiliation":[{"name":"School of Software, Sichuan Vocational College of Information Technology, Guangyuan, China"}]}],"member":"301","published-online":{"date-parts":[[2022,11,17]]},"reference":[{"key":"cit0001","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2018.00031"},{"key":"cit0002","doi-asserted-by":"publisher","DOI":"10.1144\/10.44petgeo2016-022"},{"key":"cit0003","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-021-03075-x"},{"key":"cit0004","doi-asserted-by":"publisher","DOI":"10.1145\/1629087.1629089"},{"key":"cit0005","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3007554"},{"key":"cit0006","unstructured":"Devlin, J., M. W. Chang, K. Lee, and K. Toutanova. 2018. BERT: Pre-training of deep bidirectional transformers for language understanding. arXiv preprin arXiv:1810.04805, Oct 11."},{"key":"cit0007","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-021-02460-w"},{"key":"cit0008","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0103"},{"key":"cit0009","first-page":"1285","volume-title":"Proceedings of the 24th ACM-SIGSAC Conference on Computer and Communications Security","author":"Du M.","year":"2017"},{"key":"cit0010","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2582924"},{"key":"cit0011","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9534113"},{"key":"cit0012","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2762673"},{"key":"cit0013","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.21"},{"key":"cit0014","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.13"},{"key":"cit0015","doi-asserted-by":"publisher","DOI":"10.1049\/cit2.12078"},{"key":"cit0016","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3034647"},{"key":"cit0017","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2021.3130908"},{"key":"cit0018","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-97916-8_10"},{"key":"cit0019","doi-asserted-by":"publisher","DOI":"10.23919\/MIPRO.2019.8757056"},{"key":"cit0020","unstructured":"Lee, Y., J. Kim, and P. Kang. 2021. LAnoBERT : System log anomaly detection based on BERT masked language model. arXiv preprint arXiv:2111.09564, November 18."},{"key":"cit0021","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678773"},{"key":"cit0022","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8827185"},{"key":"cit0023","first-page":"231","volume-title":"Proceedings of the 2010 USENIX Annual Technical Conference","author":"Lou J. G.","year":"2010"},{"key":"cit0024","doi-asserted-by":"publisher","DOI":"10.3390\/s21186125"},{"key":"cit0025","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-020-00809-9"},{"key":"cit0026","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557154"},{"key":"cit0027","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-012-4747-8"},{"key":"cit0028","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.21"},{"key":"cit0029","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.103"},{"key":"cit0030","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-021-02724-5"},{"key":"cit0031","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8897244"},{"key":"cit0032","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3037903"},{"key":"cit0033","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063690"},{"key":"cit0034","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6559"},{"key":"cit0035","volume-title":"Proceedings of the 31st Annual Conference on Neural Information Processing Systems","author":"Vaswani A.","year":"2017"},{"key":"cit0036","doi-asserted-by":"publisher","DOI":"10.32604\/csse.2022.022365"},{"key":"cit0037","author":"Wittkopp T.","year":"2021","journal-title":"arXiv preprint arXiv:2109.09537, Sep 20"},{"key":"cit0038","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"},{"key":"cit0039","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523670"},{"key":"cit0040","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2008.4536397"},{"key":"cit0041","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29611-7_10"},{"key":"cit0042","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338931"},{"key":"cit0043","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-021-02863-9"},{"key":"cit0044","doi-asserted-by":"publisher","DOI":"10.1049\/el.2018.6079"},{"key":"cit0045","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00021"},{"key":"cit0046","unstructured":"Zhu, Y., W. B. Meng, Y. Liu, S. Zhang, T. Han, et al. 2021. UniLog: Deploy One Model and Specialize it for All Log Analysis Tasks. arXiv preprin arXiv:2112.03159, Dec 6."}],"container-title":["Applied Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08839514.2022.2145642","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T04:58:52Z","timestamp":1694667532000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08839514.2022.2145642"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,17]]},"references-count":46,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,12,31]]}},"alternative-id":["10.1080\/08839514.2022.2145642"],"URL":"https:\/\/doi.org\/10.1080\/08839514.2022.2145642","relation":{},"ISSN":["0883-9514","1087-6545"],"issn-type":[{"value":"0883-9514","type":"print"},{"value":"1087-6545","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,17]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uaai20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uaai20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-08-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-11-04","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-11-04","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-11-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"2145642"}}