{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T07:56:43Z","timestamp":1764835003921,"version":"3.46.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T00:00:00Z","timestamp":1762128000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T00:00:00Z","timestamp":1762128000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,3]]},"DOI":"10.1109\/icumt67815.2025.11268672","type":"proceedings-article","created":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:40:02Z","timestamp":1764787202000},"page":"40-45","source":"Crossref","is-referenced-by-count":0,"title":["Augmenting Security Logs with Artificial Intelligence: Are Deep Models the Missing Piece?"],"prefix":"10.1109","author":[{"given":"Yehor","family":"Safonov","sequence":"first","affiliation":[{"name":"Brno University of Technology,Faculty of Electrical Engineering and Communication,Brno,Czechia"}]},{"given":"Ondrej","family":"Foltyn","sequence":"additional","affiliation":[{"name":"Brno University of Technology,Faculty of Electrical Engineering and Communication,Brno,Czechia"}]}],"member":"263","reference":[{"volume-title":"A closer look at q3 2024: 75% surge in cyber attacks worldwide","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-92"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.13164\/eeict.2023.217","article-title":"Enhancing security monitoring with ai-enabled log collection and nlp modules on a unified open source platform","author":"Safonov","year":"2023"},{"article-title":"Challenges of integrating various data sources in siem","year":"2022","author":"Omoseepi","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-021-00492-0"},{"article-title":"Application of natural language processing in network security log analysis","year":"2024","author":"Wu","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.33806\/ijaes.v25i1.682"},{"article-title":"Which word embedding model is right for you?","year":"2025","author":"Yadav","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/d14-1162"},{"article-title":"Introduction to doc2vec","year":"2019","author":"Shperber","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363224"},{"key":"ref12","article-title":"Attention is all you need","volume":"abs\/1706.03762","author":"Vaswani","year":"2017","journal-title":"CoRR"},{"article-title":"Bert: Pre-training of deep bidirectional transformers for language understanding","year":"2019","author":"Devlin","key":"ref13"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.18653\/v1\/2020.acl-main.195","article-title":"Mobilebert: a compact task-agnostic bert for resource-limited devices","author":"Sun","year":"2020"},{"article-title":"Roberta: A robustly optimized bert pretraining approach","year":"2019","author":"Liu","key":"ref15"},{"volume-title":"Natural Language Processing with Transformers","year":"2022","author":"Tunstall","key":"ref16"},{"article-title":"Brief review - electra: Pre-training text encoders as discriminators rather than generators","year":"2022","author":"Tsang","key":"ref17"},{"article-title":"Language models gpt","year":"2022","author":"Wolfe","key":"ref18"},{"article-title":"Public security log sharing","year":"2010","author":"Chuvakin","key":"ref19"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.1109\/ISSRE59848.2023.00071","article-title":"Loghub: A large collection of system log datasets for ai-driven log analytics","author":"Zhu","year":"2023"},{"article-title":"Security datasets windows","year":"2022","author":"Rodriguez","key":"ref21"},{"article-title":"Syslog-generator: Dataset collection for synthetic log generation","year":"2020","author":"Siklosi","key":"ref22"},{"article-title":"Llama 3.2 guide: How it works, use cases & more","year":"2024","author":"Olteanu","key":"ref23"},{"article-title":"Smollm2 released: The new series (0.1b, 0.3b, and 1.7b) of small language models for on-device applications and outperforms meta llama 3.2 1b","year":"2024","author":"Razzaq","key":"ref24"},{"article-title":"Deepseek r1 vs v3: A guide with examples","year":"2025","author":"Aubry","key":"ref25"},{"journal-title":"Deepseek-r1","article-title":"Hugging Face","year":"2025","key":"ref26"},{"article-title":"What is the difference between training loss validation loss and evaluation loss","year":"2023","author":"Vijay","key":"ref27"},{"article-title":"Speech and language processing","year":"2023","author":"Jurafsky","key":"ref28"},{"article-title":"Perplexity explained with simple probabilities","year":"2022","author":"Chiusano","key":"ref29"},{"key":"ref30","article-title":"Perplexity of fixed-length models"},{"article-title":"Bertscore: Evaluating text generation with bert","year":"2020","author":"Zhang","key":"ref31"},{"author":"Papineni","key":"ref32","article-title":"Bleu a hugging face space by evaluate-metric"}],"event":{"name":"2025 17th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","start":{"date-parts":[[2025,11,3]]},"location":"Florence, Italy","end":{"date-parts":[[2025,11,5]]}},"container-title":["2025 17th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11268479\/11268547\/11268672.pdf?arnumber=11268672","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T07:50:43Z","timestamp":1764834643000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11268672\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,3]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icumt67815.2025.11268672","relation":{},"subject":[],"published":{"date-parts":[[2025,11,3]]}}}