{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T18:55:25Z","timestamp":1769972125390,"version":"3.49.0"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2018A030313351"],"award-info":[{"award-number":["2018A030313351"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research and Development Program of Guangdong Province","award":["2019B010137001"],"award-info":[{"award-number":["2019B010137001"]}]},{"name":"Internet Innovation and Development Project in 2018","award":["MIZ1824020-2"],"award-info":[{"award-number":["MIZ1824020-2"]}]},{"name":"Key Laboratory of Information Network Security, Ministry of Public Security"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2953981","type":"journal-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T18:24:22Z","timestamp":1574706262000},"page":"181152-181164","source":"Crossref","is-referenced-by-count":48,"title":["nLSALog: An Anomaly Detection Framework for Log Sequence in Security Management"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7373-393X","authenticated-orcid":false,"given":"Ruipeng","family":"Yang","sequence":"first","affiliation":[]},{"given":"Dan","family":"Qu","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Yekui","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Yongwang","family":"Tang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"QANet: Combining local convolution with global self-attention for reading comprehension","author":"yu","year":"2018","journal-title":"arXiv 1804 09541"},{"key":"ref38","first-page":"5998","article-title":"Attention is all you need","author":"vaswani","year":"2017","journal-title":"Adv Neural Inf Process Syst"},{"key":"ref33","first-page":"441","article-title":"Attentive language models","volume":"1","author":"salton","year":"2017","journal-title":"Proc 8th Int Joint Conf Natural Lang Process"},{"key":"ref32","article-title":"Frustratingly short attention spans in neural language modeling","author":"daniluk","year":"2017","journal-title":"arXiv 1702 04521"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840733"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745472"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref36","first-page":"1","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2015","journal-title":"Proc Int Conf Learn Represent"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1430-4"},{"key":"ref34","first-page":"1","article-title":"Memory architectures in recurrent neural network language models","author":"yogatama","year":"2018","journal-title":"Proc Int Conf Learn Represent"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.jss.2018.05.016","article-title":"Execution anomaly detection in large-scale systems through console log analysis","volume":"143","author":"liang","year":"2018","journal-title":"J Syst Softw"},{"key":"ref40","first-page":"130","article-title":"N-reader: Machine reading comprehension model based on double layers of self-attention","volume":"32","author":"xiaobo","year":"2018","journal-title":"J Chin Inf Process"},{"key":"ref11","article-title":"Anomaly detection in log data using graph databases and machine learning to defend advanced persistent threats","author":"schindler","year":"2018","journal-title":"arXiv 1802 00259"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2897122"},{"key":"ref13","first-page":"43","article-title":"Understanding customer problem troubleshooting from storage system logs","volume":"9","author":"jiang","year":"2009","journal-title":"Proc Conf File Storage Technol"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1016\/j.proeng.2011.08.036","article-title":"Anomaly detection based on enhanced DBScan algorithm","volume":"15","author":"chen","year":"2011","journal-title":"Procedia Eng"},{"key":"ref15","first-page":"1","article-title":"Traffic anomaly detection using k-means clustering","author":"m\u00fcnz","year":"2007","journal-title":"Proc GI\/ITG Workshop MMBnet"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2843336"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523670"},{"key":"ref28","first-page":"171","article-title":"A Markov chain model of temporal behavior for anomaly detection","author":"ye","year":"2000","journal-title":"Proc IEEE Syst Man Soc Inf Assurance Workshop"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2395959"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2011.5990537"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2273359"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2868171"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1142\/9781786340757_0003"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2808201"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2786343"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2864782"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700728"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1145\/3217871.3217872","article-title":"Recurrent neural network attention mechanisms for interpretable system log anomaly detection","author":"brown","year":"2018","journal-title":"Proc 1st Workshop Mach Learn Comput Syst"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2882064"},{"key":"ref46","first-page":"2342","article-title":"An empirical exploration of recurrent network architectures","author":"jozefowicz","year":"2015","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.14"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1179"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2334305"},{"key":"ref47","first-page":"190","article-title":"Training and analysing deep recurrent neural networks","author":"hermans","year":"2013","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113365"},{"key":"ref42","article-title":"Hybrid self-attention network for machine translation","author":"song","year":"2018","journal-title":"arXiv 1811 00253"},{"key":"ref24","first-page":"165","article-title":"Vector space embedding of DNS query behaviors by deep learning","volume":"37","author":"zhou","year":"2016","journal-title":"J Commun"},{"key":"ref41","article-title":"Distance-based self-attention network for natural language inference","author":"im","year":"2017","journal-title":"arXiv 1712 02047"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2600176.2600205"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.103"},{"key":"ref26","first-page":"191","article-title":"Using correlated surprise to infer shared influence","author":"oliner","year":"2010","journal-title":"Proc IEEE\/IFIP Int Conf Dependable Syst Netw"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.21"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08903291.pdf?arnumber=8903291","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T02:07:51Z","timestamp":1643249271000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8903291\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2953981","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}