{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T01:41:51Z","timestamp":1772847711060,"version":"3.50.1"},"reference-count":154,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/tkde.2022.3222417","type":"journal-article","created":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T19:11:38Z","timestamp":1674587498000},"page":"1-20","source":"Crossref","is-referenced-by-count":61,"title":["System Log Parsing: A Survey"],"prefix":"10.1109","author":[{"given":"Tianzhu","family":"Zhang","sequence":"first","affiliation":[{"name":"Nokia Bell Labs, Nozay, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2678-8070","authenticated-orcid":false,"given":"Han","family":"Qiu","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace, BNRist, Zhongguancun Laboratory, Tsinghua University, Beijing, China"}]},{"given":"Gabriele","family":"Castellano","sequence":"additional","affiliation":[{"name":"Nokia Bell Labs, Nozay, France"}]},{"given":"Myriana","family":"Rifai","sequence":"additional","affiliation":[{"name":"Nokia Bell Labs, Nozay, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7702-2369","authenticated-orcid":false,"given":"Chung Shue","family":"Chen","sequence":"additional","affiliation":[{"name":"Nokia Bell Labs, Nozay, France"}]},{"given":"Fabio","family":"Pianese","sequence":"additional","affiliation":[{"name":"Nokia Bell Labs, Nozay, France"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Distributed and Cloud Computing: From Parallel Processing to the Internet of Things","author":"Hwang","year":"2013"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2008.50"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3164"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591175"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.21"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2014.53"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983358"},{"key":"ref19","article-title":"Syslog parser","author":"Braun","year":"2016"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/0305-0548(93)90050-s"},{"key":"ref21","article-title":"System problem detection by mining console logs","author":"Xu","year":"2010"},{"key":"ref22","article-title":"Analyzing cluster log files using logsurfer","volume-title":"Proc. 4th Annu. Conf. Linux Clusters","author":"Prewett"},{"key":"ref23","article-title":"Adaptive parsing and normalizing of logs at MSSP","author":"McLean","year":"2020"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.76"},{"issue":"3","key":"ref25","first-page":"45","article-title":"Process mining in web services: The websphere case","volume":"31","author":"van der Aalst","year":"2008","journal-title":"IEEE Data Eng. Bull."},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1147\/sj.444.0821"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3007554"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE51399.2021.00274"},{"issue":"3","key":"ref29","article-title":"LogStamp: Automatic online log parsing based on sequence labelling","volume":"19","author":"Tao","year":"2021","journal-title":"Interface"},{"key":"ref30","first-page":"6","article-title":"Salsa: Analyzing logs as state machines","volume-title":"Proc. 1st USENIX Workshop Anal. Syst. Logs","author":"Tan"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1147\/sj.413.0475"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281305"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025151"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081972"},{"key":"ref35","article-title":"The common log file format","author":"Luotonen","year":"1995"},{"key":"ref36","article-title":"Extended log file format: W3C working draft WD-logfile-960323","author":"Hallam-Baker","year":"1996"},{"key":"ref37","article-title":"Apache commons logging-overview","author":"Team","year":"2016"},{"issue":"1","key":"ref38","first-page":"157","article-title":"For improving security log Big Data analysis efficiency, a firewall log data standard format proposed","volume":"30","author":"Bae","year":"2020","journal-title":"J. Korea Inst. Inf. Secur. Cryptol."},{"key":"ref39","article-title":"Canonical situation data format: The common base event v1. 0.1","author":"Ogle","year":"2004"},{"key":"ref40","article-title":"Automating problem determination: A. first step toward self-healing computing systems","author":"Topol","year":"2003"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.60"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.132"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00018"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/658"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00013"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"ref47","first-page":"102","article-title":"Log clustering based problem identification for online service systems","volume-title":"Proc. IEEE\/ACM 38th Int. Conf. Softw. Eng. Companion","author":"Lin"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736038"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2017.2778096"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2017.7969130"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2007.35"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.2018EBP3103"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098022"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00105"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606586"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.138"},{"key":"ref57","article-title":"Summarizing unstructured logs in online services","author":"Meng","year":"2020"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM50824.2020.9269049"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00085"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.66"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101739"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3400286.3418261"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3460345"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3128283"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2021.3113275"},{"issue":"2","key":"ref66","first-page":"47","article-title":"A survey on event mining for ICT network infrastructure management","volume":"14","author":"Zheng","year":"2019","journal-title":"ZTE Commun."},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106276"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00021"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3465481.3470083"},{"key":"ref70","article-title":"Loghub: A large collection of system log datasets towards automated log analytics","author":"He","year":"2020"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9006593"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1108\/01435121111132365"},{"key":"ref73","volume-title":"Introduction to Data Mining","author":"Tan","year":"2016"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/34.682181"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00175"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1430-4"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS49710.2020.00018"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23400-2_6"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847986"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2015.7357664"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.aci.2019.05.002"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-016-1678-7"},{"key":"ref83","article-title":"HLAer: A system for heterogeneous log analysis","author":"Ning","year":"2014"},{"key":"ref84","article-title":"Length matters: Clustering system log messages using length of words","author":"Shima","year":"2016"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1056-0_47"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2018.00087"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04180-8_32"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1049\/el.2018.6079"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54903-8_38"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ICICT50521.2020.00045"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063690"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/3373017.3373018"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/IPOM.2003.1251233"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30179-0_27"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2015.7367331"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463281"},{"key":"ref97","first-page":"671","article-title":"Normalization of unstructured log data into streams of structured event objects","volume-title":"Proc. IEEE\/IFIP Symp. Integr. Netw. Service Manage.","author":"Tovar\u0148\u00e1k"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879202"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-017-2165-9"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2972691"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/2501221.2501228"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ICBK50248.2020.00081"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTR.2004.1392628"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0103"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9006218"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01950-1_19"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00211"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.3390\/app11115302"},{"key":"ref109","article-title":"A directed acyclic graph approach to online log parsing","author":"He","year":"2018"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1145\/3452940.3452951"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM51629.2021.00077"},{"key":"ref112","first-page":"7","article-title":"AECID-PG: A tree-based log parser generator to enable log analysis","volume-title":"Proc. IEEE\/IFIP Symp. Integr. Netw. Service Manage.","author":"Wurzenberger"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2013.73"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2018.00031"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/2619287.2619290"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-55130-8_19"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-67667-4_8"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN49398.2020.9209681"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS.2017.7916497"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-NIER52604.2021.00017"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2426"},{"key":"ref122","first-page":"848","article-title":"LogDTL: Network log template generation with deep transfer learning","volume-title":"Proc. IEEE\/IFIP Int. Symp. Integr. Netw. Manage.","author":"Nguyen"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3183746"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/HIPC.2010.5713159"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1145\/1740390.1740410"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1007\/s00450-011-0155-3"},{"key":"ref127","first-page":"167","article-title":"A search-based approach for accurate identification of log message formats","volume-title":"Proc. IEEE\/ACM 26th Conf. Prog. Comprehension","author":"Messaoudi"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-27615-7_5"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29611-7_10"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2762673"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110435"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2016.12"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2017.137"},{"key":"ref135","first-page":"629","article-title":"lprof: A non-intrusive request flow profiler for distributed systems","volume-title":"Proc. 11th USENIX Symp. Operating Syst. Des. Implementation","author":"Zhao"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1007\/s40745-015-0040-1"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.5555\/3001460.3001507"},{"key":"ref138","first-page":"993","article-title":"Latent dirichlet allocation","volume":"3","author":"Blei","year":"2003","journal-title":"J. Mach. Learn. Res."},{"issue":"8","key":"ref139","first-page":"707","article-title":"Binary codes capable of correcting deletions, insertions, and reversals","volume":"10","author":"Levenshtein","year":"1966","journal-title":"Sov. Phys. Doklady"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1145\/304181.304187"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2016.110"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056489"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.122653799"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-006-0059-1"},{"key":"ref145","first-page":"487","article-title":"Fast algorithms for mining association rules","volume-title":"Proc. 20th Int. Conf. Very Large Data Bases","author":"Agrawal"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1145\/322063.322075"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2875442"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.13"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.5220\/0006643003860397"},{"key":"ref150","first-page":"282","article-title":"Conditional random fields: Probabilistic models for segmenting and labeling sequence data","author":"Lafferty"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(88)90021-0"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71273-4_25"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557154"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1002\/smr.374"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1145\/3400286.3418262"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00081"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384722"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.103"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37352-8_8"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807273"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"ref167","article-title":"Spark: Cluster computing with working sets","volume-title":"Proc. 2nd USENIX Conf. Hot Topics Cloud Comput.","author":"Zaharia"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/CCET48361.2019.8989069"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/4358933\/10025560.pdf?arnumber=10025560","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T15:46:55Z","timestamp":1709394415000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10025560\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":154,"URL":"https:\/\/doi.org\/10.1109\/tkde.2022.3222417","relation":{},"ISSN":["1041-4347","1558-2191","2326-3865"],"issn-type":[{"value":"1041-4347","type":"print"},{"value":"1558-2191","type":"electronic"},{"value":"2326-3865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}