{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T17:19:08Z","timestamp":1778001548555,"version":"3.51.4"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1109\/cnsm.2015.7367331","type":"proceedings-article","created":{"date-parts":[[2016,1,4]],"date-time":"2016-01-04T21:34:58Z","timestamp":1451943298000},"page":"1-7","source":"Crossref","is-referenced-by-count":206,"title":["LogCluster - A data clustering and pattern mining algorithm for event logs"],"prefix":"10.1109","author":[{"given":"Risto","family":"Vaarandi","sequence":"first","affiliation":[]},{"given":"Mauno","family":"Pihelgas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1255","article-title":"Clustering Event Logs using Iterative Partitioning","author":"adetokunbo","year":"0","journal-title":"Proc ACM SIGKDD Conf Knowledge Disc Data Mining 2009"},{"key":"ref11","author":"makanju","year":"2012","journal-title":"Exploring Event Log Analysis With Minimum Apriori Information"},{"key":"ref12","author":"klemettinen","year":"1999","journal-title":"A knowledge discovery methodology for telecommunication network alarm databases"},{"key":"ref13","first-page":"405","article-title":"Intelligent Search of Correlated Alarms from Database Containing Noise Data","author":"zheng","year":"0","journal-title":"Proc 2002 IEEE Network Operations and Management Symposium"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2001.914829"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/11856214_1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2000.904991"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTR.2004.1392628"},{"key":"ref18","first-page":"99","article-title":"LogView: Visualizing Event Log Clusters","author":"adetokunbo","year":"2008","journal-title":"Proceedings - 6th Annual Conference on Privacy Security and Trust"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644897"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2008.4575281"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30179-0_27"},{"key":"ref6","first-page":"187","article-title":"Identifying Symptoms of Recurrent Faults in Log Files of Distributed Information Systems","author":"thomas","year":"0","journal-title":"IEEE Proceedings of Network Operations and Management Symposium 2010"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2010.5691262"},{"key":"ref8","author":"reidemeister","year":"2012","journal-title":"Fault Diagnosis in Enterprise Software Systems Using Discrete Monitoring Data"},{"key":"ref7","first-page":"377","article-title":"Mining Unstructured Log Files for Recurrent Fault Diagnosis","author":"thomas","year":"0","journal-title":"Proceedings of the 2011 IEEE\/IFIP International Symposium on Integrated Network Management"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IPOM.2003.1251233"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2014.53"},{"key":"ref9","article-title":"Mining Console Logs for Large-Scale System Problem Detection","author":"xu","year":"2008","journal-title":"Proceedings of the 3rd Workshop on Tackling Computer Systems Problems with Machine Learning Techniques"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-013-0282-8"}],"event":{"name":"2015 11th International Conference on Network and Service Management (CNSM)","location":"Barcelona, Spain","start":{"date-parts":[[2015,11,9]]},"end":{"date-parts":[[2015,11,13]]}},"container-title":["2015 11th International Conference on Network and Service Management (CNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7360263\/7367318\/07367331.pdf?arnumber=7367331","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T04:00:56Z","timestamp":1490414456000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7367331\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/cnsm.2015.7367331","relation":{},"subject":[],"published":{"date-parts":[[2015,11]]}}}