{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:52:53Z","timestamp":1772041973681,"version":"3.50.1"},"reference-count":96,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Research Ethics Committee of the Hong Kong Metropolitan University","award":["HE-SF2025\/19"],"award-info":[{"award-number":["HE-SF2025\/19"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1109\/tse.2025.3586700","type":"journal-article","created":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T13:38:14Z","timestamp":1751981894000},"page":"2455-2471","source":"Crossref","is-referenced-by-count":3,"title":["Practitioners\u2019 Expectations on Log Anomaly Detection"],"prefix":"10.1109","volume":"51","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5476-6074","authenticated-orcid":false,"given":"Xiaoxue","family":"Ma","sequence":"first","affiliation":[{"name":"Department of Electronic Engineering and Computer Science, Hong Kong Metropolitan University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4017-4294","authenticated-orcid":false,"given":"Yishu","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering and Computer Science, Hong Kong Metropolitan University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3803-9600","authenticated-orcid":false,"given":"Jacky","family":"Keung","sequence":"additional","affiliation":[{"name":"Department of Computer Science, City University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4473-3068","authenticated-orcid":false,"given":"Xiao","family":"Yu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2948-550X","authenticated-orcid":false,"given":"Huiqi","family":"Zou","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Johns Hopkins University, Baltimore, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0670-4538","authenticated-orcid":false,"given":"Zhen","family":"Yang","sequence":"additional","affiliation":[{"name":"Shandong University, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9146-442X","authenticated-orcid":false,"given":"Federica","family":"Sarro","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University College London, London, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0771-7891","authenticated-orcid":false,"given":"Earl T.","family":"Barr","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University College London, London, U.K."}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1137983.1138020"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00079"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678773"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/658"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00148"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3071473"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338961"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3623308"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510155"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2024.3513413"},{"key":"ref12","volume-title":"Research Design: Quantitative, Qualitative, Mixed Methods, Arts-Based, and Community-Based Participatory Research Approaches","author":"Leavy","year":"2022"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/32.799955"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-021-10072-8"},{"key":"ref15","volume-title":"Card Sorting: Designing Usable Categories","author":"Spencer","year":"2009"},{"key":"ref16","article-title":"Google forms","year":"2024"},{"key":"ref17","article-title":"Survey form","year":"2024"},{"key":"ref18","article-title":"Wenjuanxing software","year":"2024"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3070692"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3071193"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534405"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2601248.2601268"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i1.27764"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3644386"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2020.06.003"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1145\/3377813.3381371","article-title":"Automatic abnormal log detection by analyzing log history for providing debugging insight","volume-title":"Proc. ACM\/IEEE 42nd Int. Conf. Softw. Eng.: Softw. Eng. Pract.","author":"Kim","year":"2020"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.103"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00148"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3055425"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639205"},{"key":"ref32","first-page":"35","article-title":"Interpretable online log analysis using large language models with prompt strategies","volume-title":"Proc. 32nd IEEE\/ACM Int. Conf. Program Comprehension","author":"Liu","year":"2024"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-024-00428-x"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3660800"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-022-00370-w"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00043"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00138"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2023.3280575"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2023.3289488"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00133"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE59848.2023.00046"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE59848.2023.00015"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-022-00365-7"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510180"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473933"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00130"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE52982.2021.00021"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00013"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00018"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338931"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467125"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539155"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.12"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS60048.2023.00062"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00069"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3564625.3567972"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3125967"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2025.3527856"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP66354.2025.00041"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3358730"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2023.3257518"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE62328.2024.00023"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE65448.2025.00331"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3428538"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE59848.2023.00038"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3239522"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW60847.2023.00156"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2024.3368208"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639219"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-FoSE59343.2023.00008"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS62655.2024.00159"},{"key":"ref72","article-title":"Adapting large language models to log analysis with interpretable domain knowledge","author":"Ji","year":"2024"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3660768"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-3020"},{"key":"ref75","article-title":"A unified approach to interpreting model predictions","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Lundberg","year":"2017"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11491"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.3390\/app11115088"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2024.102301"},{"key":"ref79","article-title":"Gpt-4 Technical Report","author":"Achiam","year":"2023"},{"key":"ref80","article-title":"Deepseek-v3 technical report","author":"Liu","year":"2024"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE59848.2023.00071"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616280"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115678"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2007.46"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840733"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2017.8125846"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00037"},{"key":"ref88","first-page":"102","article-title":"Log clustering based problem identification for online service systems","volume-title":"Proc. 38th Int. Conf. Softw. Eng. Companion","author":"Lin","year":"2016"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.110689"},{"key":"ref90","article-title":"Log-based anomaly detection based on EVT theory with feedback","author":"Liu","year":"2023"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591175"},{"key":"ref92","article-title":"Experience report: Deep learning-based system log analysis for anomaly detection","author":"Chen","year":"2021"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/3460345"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00136"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-022-10258-8"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00080"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/32\/11172729\/11072823.pdf?arnumber=11072823","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T04:40:19Z","timestamp":1758256819000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11072823\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":96,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tse.2025.3586700","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9]]}}}