{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T05:08:19Z","timestamp":1737176899210,"version":"3.33.0"},"reference-count":5,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,15]]},"DOI":"10.1109\/bigdata62323.2024.10825361","type":"proceedings-article","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T18:31:23Z","timestamp":1737052283000},"page":"8734-8736","source":"Crossref","is-referenced-by-count":0,"title":["Log Sculptor: Making Logs Great Again"],"prefix":"10.1109","author":[{"given":"Aditya","family":"Kulkarni","sequence":"first","affiliation":[{"name":"TCS Research,Mumbai,India"}]},{"given":"Prathit","family":"Mehta","sequence":"additional","affiliation":[{"name":"TCS Research,Mumbai,India"}]},{"given":"Ravi Kumar","family":"Singh","sequence":"additional","affiliation":[{"name":"TCS Research,Mumbai,India"}]},{"given":"Mayank","family":"Mishra","sequence":"additional","affiliation":[{"name":"TCS Research,Mumbai,India"}]},{"given":"Shruti","family":"Kunde","sequence":"additional","affiliation":[{"name":"TCS Research,Mumbai,India"}]},{"given":"Rekha","family":"Singhal","sequence":"additional","affiliation":[{"name":"TCS Research,Mumbai,India"}]},{"given":"Manoj","family":"Nambiar","sequence":"additional","affiliation":[{"name":"TCS Research,Mumbai,India"}]}],"member":"263","reference":[{"year":"2023","author":"Poldrack","article-title":"AI-assisted coding: Experiments with GPT-4","key":"ref1"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.20944\/preprints202305.1083.v1","article-title":"LogBD: A Log Anomaly Detection Method Based on Pre-trained Models and Domain Adaptation","author":"Deng","year":"2023"},{"volume-title":"USENIX Security Symposium","author":"Shen","article-title":"Improving logging to reduce permission over-granting mistakes","key":"ref3"},{"volume-title":"31st USENIX Security Symposium, Security 2022","author":"Mirsky","article-title":"VulChecker: Graph-based Vulnerability Localization in Source Code","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/ASE56229.2023.00136"}],"event":{"name":"2024 IEEE International Conference on Big Data (BigData)","start":{"date-parts":[[2024,12,15]]},"location":"Washington, DC, USA","end":{"date-parts":[[2024,12,18]]}},"container-title":["2024 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10824975\/10824942\/10825361.pdf?arnumber=10825361","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T08:27:47Z","timestamp":1737102467000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10825361\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"references-count":5,"URL":"https:\/\/doi.org\/10.1109\/bigdata62323.2024.10825361","relation":{},"subject":[],"published":{"date-parts":[[2024,12,15]]}}}