{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:40:28Z","timestamp":1730259628144,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,3]],"date-time":"2021-12-03T00:00:00Z","timestamp":1638489600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,3]],"date-time":"2021-12-03T00:00:00Z","timestamp":1638489600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,3]],"date-time":"2021-12-03T00:00:00Z","timestamp":1638489600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,3]]},"DOI":"10.1109\/ict-dm52643.2021.9664097","type":"proceedings-article","created":{"date-parts":[[2022,1,10]],"date-time":"2022-01-10T21:07:19Z","timestamp":1641848839000},"page":"72-79","source":"Crossref","is-referenced-by-count":0,"title":["Distributed Systems Anomaly Detection Based on Log"],"prefix":"10.1109","author":[{"given":"Fenggang","family":"Lai","sequence":"first","affiliation":[]},{"given":"Pan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ruiying","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Xu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00037"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/3217871.3217872"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1016\/0146-664X(80)90054-4","article-title":"Euclidean distance mapping","volume":"14","author":"danielsson","year":"1980","journal-title":"Computer Graphics and Image Processing"},{"key":"ref6","article-title":"word2vec explained: deriving mikolov et al's negative-sampling word-embedding method","volume":"3722","author":"goldberg","year":"2014","journal-title":"ArXiv Preprint"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/ICDM.2009.30"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/ICAwST.2019.8923357"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/2619287.2619290"},{"key":"ref7","article-title":"Attention is all you need","author":"vaswani","year":"2017","journal-title":"ArXiv Preprint"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/3133956.3134015"},{"key":"ref9","article-title":"Bert: Pretraining of deep bidirectional transformers for language understanding","author":"devlin","year":"2018","journal-title":"ArXiv Preprint"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/ICAICE51518.2020.00073"}],"event":{"name":"2021 International Conference on Information and Communication Technologies for Disaster Management (ICT-DM)","start":{"date-parts":[[2021,12,3]]},"location":"Hangzhou, China","end":{"date-parts":[[2021,12,5]]}},"container-title":["2021 International Conference on Information and Communication Technologies for Disaster Management (ICT-DM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9664013\/9664016\/09664097.pdf?arnumber=9664097","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:56:58Z","timestamp":1652201818000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9664097\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,3]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/ict-dm52643.2021.9664097","relation":{},"subject":[],"published":{"date-parts":[[2021,12,3]]}}}