{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T12:49:03Z","timestamp":1770295743006,"version":"3.49.0"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T00:00:00Z","timestamp":1757203200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T00:00:00Z","timestamp":1757203200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,7]]},"DOI":"10.1109\/icsme64153.2025.00101","type":"proceedings-article","created":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T17:08:56Z","timestamp":1761930536000},"page":"890-894","source":"Crossref","is-referenced-by-count":2,"title":["DevSecLogs: AI-Powered, Tamper-Evident Log Intelligence for Secure CI\/CD Pipelines"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9944-2615","authenticated-orcid":false,"given":"Sabbir M.","family":"Saleh","sequence":"first","affiliation":[{"name":"University of Western Ontario,Department of Computer Science,London,ON,Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.06.063"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2016.67"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.028382"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5220\/0013018500003825"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3193102"},{"key":"ref6","article-title":"Enhancing Cloud Security through Topic Modelling","volume-title":"28th ACIS International Winter Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD 2024-Winter), December 04\u201306, 2024. IEEE IEEE. arXiv preprint","author":"Saleh","year":"2025"},{"key":"ref7","article-title":"Understanding log analytics at scale","author":"Gillespie","year":"2021","journal-title":"O\u2019Reilly Media, Incorporated"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3689938.3694779"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SCECS65243.2025.11065638"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3460345"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CIoT63799.2024.10757084"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.5220\/0013298200003928"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3474369.3486868"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref15","volume-title":"Elastic security overview"},{"key":"ref16","article-title":"Cloud Engineering | MLOps | DevOps (2021) How to analyse Jenkins build logs with Elasticsearch","volume-title":"Logstash and Kibana (elk stack)?","author":"Soni"},{"key":"ref17","volume-title":"Elastic Cloud on Kubernetes: Deploy and orchestrate Elasticsearch on Kubernetes"},{"key":"ref18","volume-title":"Kibana: Explore, visualize, Discover"},{"key":"ref19","volume-title":"What is machine learning? A Comprehensive ML Guide: Elastic"},{"key":"ref20","volume-title":"Elastic Cloud: Hosted Elasticsearch"},{"key":"ref21","volume-title":"Splunk Documentation"},{"key":"ref22","volume-title":"CI\/CD pipeline monitoring: An introduction Splunk"},{"key":"ref23","volume-title":"Splunk Cloud Platform Splunk"},{"key":"ref24","volume-title":"Splunk docs Splunk Docs"},{"key":"ref25","volume-title":"About the Machine Learning Toolkit - Splunk Documentation"},{"key":"ref26","volume-title":"Splunk Enterprise"},{"key":"ref27","volume-title":"Graylog Resource Library","year":"2025"},{"key":"ref28","volume-title":"Jenkins and Graylog: Publish your jenkins build results, Medium","author":"Kara","year":"2023"},{"key":"ref29","volume-title":"Graylog and Docker (no date) Containerized Deployment"},{"key":"ref30","volume-title":"Dashboards"},{"key":"ref31","volume-title":"Anomaly detection"},{"key":"ref32","volume-title":"GRAYLOG Cloud Platform","year":"2025"},{"key":"ref33","volume-title":"Datadog (2025) Cloud siem"},{"key":"ref34","volume-title":"Datadog (2025) CI pipeline"},{"key":"ref35","volume-title":"Datadog (2021) Kubernetes Monitoring"},{"key":"ref36","volume-title":"Datadog (no date) Dashboards, Datadog Infrastructure and Application Monitoring"},{"key":"ref37","volume-title":"Datadog (no date b) Datadog watchdogTM, Datadog Infrastructure and Application Monitoring"},{"key":"ref38","volume-title":"Infrastructure & Application Monitoring as a Service, Datadog","year":"2016"},{"key":"ref39","article-title":"Sumo Logic Cloud SIEM: Real-time detection","volume-title":"AI-powered response (2025) Sumo Logic"},{"key":"ref40","volume-title":"Continuous Integration - Definition & Overview (2025) Sumo Logic"},{"key":"ref41","volume-title":"Explore the world\u2019s most powerful log analytics platform (2025): Sumo Logic"},{"key":"ref42","volume-title":"Sumo Logic docs (2024) Sumo Logic Service Release Notes"},{"key":"ref43","volume-title":"LogReduce: Sumo Logic docs (2024) Sumo Logic Service Release Notes"},{"key":"ref44","volume-title":"The difference between IaaS, PaaS, and SAAS","year":"2025"}],"event":{"name":"2025 IEEE International Conference on Software Maintenance and Evolution (ICSME)","location":"Auckland, New Zealand","start":{"date-parts":[[2025,9,7]]},"end":{"date-parts":[[2025,9,12]]}},"container-title":["2025 IEEE International Conference on Software Maintenance and Evolution (ICSME)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11185055\/11185853\/11185946.pdf?arnumber=11185946","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T06:00:24Z","timestamp":1761976824000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11185946\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,7]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/icsme64153.2025.00101","relation":{},"subject":[],"published":{"date-parts":[[2025,9,7]]}}}