{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T15:07:06Z","timestamp":1750691226630,"version":"3.37.3"},"reference-count":258,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000646","name":"Japan Society for the Promotion of Science (JSPS) KAKENHI Program","doi-asserted-by":"publisher","award":["21KK0179","23K18470"],"award-info":[{"award-number":["21KK0179","23K18470"]}],"id":[{"id":"10.13039\/501100000646","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001695","name":"Japan Science and Technology Agency (JST)-Mirai Program","doi-asserted-by":"publisher","award":["JPMJMI20B8"],"award-info":[{"award-number":["JPMJMI20B8"]}],"id":[{"id":"10.13039\/501100001695","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3387287","type":"journal-article","created":{"date-parts":[[2024,4,10]],"date-time":"2024-04-10T18:22:34Z","timestamp":1712773354000},"page":"78193-78218","source":"Crossref","is-referenced-by-count":1,"title":["Landscape and Taxonomy of Online Parser-Supported Log Anomaly Detection Methods"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1561-258X","authenticated-orcid":false,"given":"Scott","family":"Lupton","sequence":"first","affiliation":[{"name":"Department of Computer Science and Communications Engineering, Waseda University, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1417-9879","authenticated-orcid":false,"given":"Hironori","family":"Washizaki","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Communications Engineering, Waseda University, Tokyo, Japan"}]},{"given":"Nobukazu","family":"Yoshioka","sequence":"additional","affiliation":[{"name":"Research Institute for Science and Engineering, Waseda University, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0196-2108","authenticated-orcid":false,"given":"Yoshiaki","family":"Fukazawa","sequence":"additional","affiliation":[{"name":"Department of Environmental Science, University of Human Environments, Matsuyama, Japan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840733"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWS48432.2020.9292393"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1049\/icp.2021.2432"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3141161"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/GRID.2007.4354137"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICNIDC.2018.8525714"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-023-10364-1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557154"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.60"},{"key":"ref11","first-page":"167","article-title":"A search-based approach for accurate identification of log message formats","volume-title":"Proc. IEEE\/ACM 26th Int. Conf. Program Comprehension (ICPC)","author":"Messaoudi"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2013.73"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2875442"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.13"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE59848.2023.00019"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00021"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3222417"},{"key":"ref19","article-title":"Deep learning for anomaly detection in log data: A survey","volume":"12","author":"Landauer","year":"2023","journal-title":"Mach. Learn. With Appl."},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW53611.2021.00091"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC53868.2021.00068"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0103"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00018"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3162857"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2017.7969130"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2020.3007554"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2015.7367332"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.2018EBP3103"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110435"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2972691"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00211"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1430-4"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2020.101618"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1049\/el.2018.6079"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/app11115302"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICICT50521.2020.00045"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1056-0_47"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3452940.3452951"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01950-1_19"},{"key":"ref40","article-title":"Length matters: Clustering system log messages using length of words","author":"Shima","year":"2016","journal-title":"arXiv:1611.03213"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3128283"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2021.110175"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/DSIT55514.2022.9943901"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-022-00370-w"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME55016.2022.00050"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE52982.2021.00021"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW55395.2022.00056"},{"key":"ref48","first-page":"1","article-title":"LogBERT: Log anomaly detection via BERT","volume-title":"Proc. Int. Joint Conf. Neural Netw. (IJCNN)","author":"Guo"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.103002"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9533294"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86472-9_31"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468543"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CloudIntelligence52565.2021.00013"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75762-5_6"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid54584.2022.00044"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-34671-2_26"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-7019-3_6"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s40745-023-00471-7"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/5822124"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3603781.3604223"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3266990"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-76352-7_22"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.4018\/IJISP.285584"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-022-04508-1"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482209"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.18293\/seke2021-126"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/CCAI50917.2021.9447533"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473933"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3125967"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICSIP55141.2022.9886069"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2023.033124"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19214-2_41"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467125"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2022.2145642"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/IC-NIDC54101.2021.9660476"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/BigData52589.2021.9671642"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3150342"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/DSC55868.2022.00031"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-6847-3_76"},{"issue":"13","key":"ref80","doi-asserted-by":"crossref","first-page":"7668","DOI":"10.3390\/app13137668","article-title":"LTAnomaly: A transformer variant for syslog anomaly detection based on multi-scale representation and long sequence capture","volume":"13","author":"Han","year":"2023","journal-title":"Appl. Sci."},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-6886-2_44"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT56141.2022.10072770"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC57700.2023.00030"},{"issue":"4","key":"ref84","doi-asserted-by":"crossref","first-page":"52","DOI":"10.3390\/cryptography7040052","article-title":"SigML++: Supervised log anomaly with probabilistic polynomial approximation","volume":"7","author":"Trivedi","year":"2023","journal-title":"Cryptography"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/iccc57788.2023.10233555"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3239522"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3319438"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS57198.2023.10188759"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1111\/coin.12573"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2023.3289488"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3224974"},{"issue":"8","key":"ref92","doi-asserted-by":"crossref","first-page":"1877","DOI":"10.3390\/electronics12081877","article-title":"ETCNLog: A system log anomaly detection method based on efficient channel attention and temporal convolutional network","volume":"12","author":"Chang","year":"2023","journal-title":"Electronics"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE59848.2023.00038"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2023.3257518"},{"issue":"13","key":"ref95","doi-asserted-by":"crossref","first-page":"7739","DOI":"10.3390\/app13137739","article-title":"LogBD: A log anomaly detection method based on pretrained models and domain adaptation","volume":"13","author":"Liu","year":"2023","journal-title":"Appl. Sci."},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1155\/2023\/3777826"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-8664-4_4"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ICICS60529.2023.10330520"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON58879.2023.10322478"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN54540.2023.10191703"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00130"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ICSRS56243.2022.10067856"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/QRS57517.2022.00039"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ICDATE58146.2023.10248821"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/ICPECA56706.2023.10075876"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS60048.2023.00062"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00043"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ISPA-BDCloud-SocialCom-SustainCom57177.2022.00079"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS54207.2022.9789917"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1145\/3456727.3463827"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.3390\/app12105089"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIBD57115.2023.10206282"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1145\/3627377.3627414"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/SEAI55746.2022.9832400"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1155\/2023\/2803139"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2021.12.061"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.3390\/sym14030454"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIBD51990.2021.9459087"},{"key":"ref119","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2023.119576","article-title":"Discrete log anomaly detection: A novel time-aware graph-based link prediction approach","volume":"647","author":"Yan","year":"2023","journal-title":"Inf. Sci."},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1145\/3590777.3590789"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/AEEGE58828.2023.00023"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/UBMK59864.2023.10286630"},{"key":"ref123","first-page":"1","article-title":"Interpretable federated transformer log learning for cloud threat forensics","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp.","author":"De La Torre Parra"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/iccece58074.2023.10135232"},{"issue":"12","key":"ref125","doi-asserted-by":"crossref","first-page":"7297","DOI":"10.3390\/app13127297","article-title":"ADAL-NN: Anomaly detection and localization using deep relational learning in distributed systems","volume":"13","author":"Ahmed","year":"2023","journal-title":"Appl. Sci."},{"issue":"4","key":"ref126","doi-asserted-by":"crossref","first-page":"2237","DOI":"10.3390\/app13042237","article-title":"MDFULog: Multi-feature deep fusion of unstable log anomaly detection model","volume":"13","author":"Li","year":"2023","journal-title":"Appl. Sci."},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.05.024"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.32604\/csse.2021.014030"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2023.3280575"},{"issue":"23","key":"ref130","doi-asserted-by":"crossref","first-page":"4797","DOI":"10.3390\/math11234797","article-title":"Polo: Adaptive trie-based log parser for anomaly detection","volume":"11","author":"Zhou","year":"2023","journal-title":"Mathematics"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48987.2021.00037"},{"key":"ref132","first-page":"309","article-title":"Ensemble consensus: An unsupervised algorithm for anomaly detection in network security data","volume-title":"Proc. Italian Conf. Cybersecurity","author":"Dentamaro"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86960-1_36"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-2225-1_10"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9071164"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453098"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/3465332.3470873"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/iscc53001.2021.9631445"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/FTXS56515.2022.00006"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00149"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE59848.2023.00046"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS54959.2023.00028"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE59848.2023.00071"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3053371"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102540"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103515"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.3390\/su11226306"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/SERA57763.2023.10197797"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-020-10026-3"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107433"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108616"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-6554-7_95"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.116263"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91431-8_47"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogr.2021.10.001"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3143551"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3567972"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT54382.2022.10152197"},{"issue":"17","key":"ref159","doi-asserted-by":"crossref","first-page":"3580","DOI":"10.3390\/electronics12173580","article-title":"Research on log anomaly detection based on sentence-BERT","volume":"12","author":"Hu","year":"2023","journal-title":"Electronics"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN54540.2023.10191948"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.3390\/app13074495"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3055425"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.32604\/csse.2022.022365"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/WAIN52551.2021.00008"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-023-04674-6"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1002\/nem.2251"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/DSA56465.2022.00065"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678773"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-021-01644-4"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/CCAI50917.2021.9447458"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.3390\/s21186125"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-82153-1_19"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2022.109860"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1145\/3524059.3532374"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.32604\/cmes.2023.025774"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/ICSRS53853.2021.9660694"},{"issue":"11","key":"ref177","doi-asserted-by":"crossref","first-page":"5042","DOI":"10.3390\/s23115042","article-title":"CLDTLog: System log anomaly detection method based on contrastive learning and dual objective tasks","volume":"23","author":"Tian","year":"2023","journal-title":"Sensors"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE59848.2023.00015"},{"key":"ref179","first-page":"1376","article-title":"PULL: Reactive log anomaly detection based on iterative PU learning","volume-title":"Proc. Annu. Hawaii Int. Conf. Syst. Sci.","author":"Wittkopp"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-45275-8_45"},{"key":"ref181","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2023.110689","article-title":"LAnoBERT: System log anomaly detection based on BERT masked language model","volume":"146","author":"Lee","year":"2023","journal-title":"Appl. Soft Comput."},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3323252"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-023-05379-w"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM59352.2023.10327879"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE59848.2023.00018"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30678-5_36"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.24251\/hicss.2022.234"},{"key":"ref188","article-title":"Loghub: A large collection of system log datasets towards automated log analytics","author":"He","year":"2008","journal-title":"arXiv:2008.06448"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN54540.2023.10191155"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC52510.2021.9620904"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/issre59848.2023.00037"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2023.3270566"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00206"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-021-1691-3"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1145\/3476883.3520226"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3558947"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE55066.2022.9882710"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75762-5_27"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616260"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1145\/3427796.3427808"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616355"},{"key":"ref202","first-page":"848","article-title":"LogDTL: Network log template generation with deep transfer learning","volume-title":"Proc. IFIP\/IEEE Int. Symp. Integr. Netw. Manage. (IM)","author":"Nguyen"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00204"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.3390\/app112411974"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/ICIPCA59209.2023.10257676"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1145\/3543146.3543168"},{"issue":"1","key":"ref207","first-page":"1","article-title":"Log file template detection as a multi-objective optimization problem","volume":"13","author":"T","year":"2022","journal-title":"Int. J. Swarm Intell. Res."},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3293406"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-021-0730-4"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3239012"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR56361.2022.9956295"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00077"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE51399.2021.00274"},{"issue":"5","key":"ref214","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2023.103476","article-title":"PVE: A log parsing method based on VAE using embedding vectors","volume":"60","author":"Yuan","year":"2023","journal-title":"Inf. Process. Manage."},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom53373.2021.00148"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111646"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD57460.2023.10152745"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1145\/3641399.3644114"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/1559270"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME55016.2022.00009"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3511993"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM51629.2021.00077"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-023-01953-z"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00078"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-67667-4_8"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338931"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2021.100030"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1109\/DSA59317.2023.00066"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-SmartCity-DSS50907.2020.00055"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.103"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.66"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-022-10214-6"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1109\/IPOM.2003.1251233"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN55064.2022.9892726"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.3390\/app13084930"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00069"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2021.103649"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS51746.2020.00027"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33017314"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2020EDL8016"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1109\/ICAwST.2019.8923357"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013839"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3034647"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1145\/3446132.3446415"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-2767-8_35"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2011.47"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510155"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-49266-2_19"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363226"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1109\/DRCN57075.2023.10108105"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3558963"},{"key":"ref252","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-76352-7_20"},{"key":"ref253","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00013"},{"key":"ref254","first-page":"4393","article-title":"Deep one-class classification","volume-title":"Proc. ICML","author":"Ruff"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM50824.2020.9269069"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1109\/ECTI-CON51831.2021.9454924"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-021-01832-3"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1145\/3460345"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10496061.pdf?arnumber=10496061","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T20:48:31Z","timestamp":1719348511000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10496061\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":258,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3387287","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2024]]}}}