{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:31:51Z","timestamp":1759091511819,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"EU","award":["833456"],"award-info":[{"award-number":["833456"]}]},{"name":"FFG","award":["873980","868306"],"award-info":[{"award-number":["873980","868306"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,5]]},"DOI":"10.1145\/3320269.3384722","type":"proceedings-article","created":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T16:33:23Z","timestamp":1601915603000},"page":"141-152","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Creating Character-based Templates for Log Data to Enable Security Event Classification"],"prefix":"10.1145","author":[{"given":"Markus","family":"Wurzenberger","sequence":"first","affiliation":[{"name":"AIT - Austrian Institute of Technology, Vienna, Austria"}]},{"given":"Georg","family":"H\u00f6ld","sequence":"additional","affiliation":[{"name":"AIT - Austrian Institute of Technology, Vienna, Austria"}]},{"given":"Max","family":"Landauer","sequence":"additional","affiliation":[{"name":"AIT - Austrian Institute of Technology, Vienna, Austria"}]},{"given":"Florian","family":"Skopik","sequence":"additional","affiliation":[{"name":"AIT - Austrian Institute of Technology, Vienna, Austria"}]},{"given":"Wolfgang","family":"Kastner","sequence":"additional","affiliation":[{"name":"Vienna University of Technology, Vienna, Austria"}]}],"member":"320","published-online":{"date-parts":[[2020,10,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5120\/11638-7118"},{"volume-title":"An Evaluation Study on Log Parsing and Its Use in Log Mining. In DSN'16: Proc. of the 46th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks.","author":"He P.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.13"},{"key":"e_1_3_2_1_4_1","unstructured":"D. Jurafsky and J.H. Martin. 2009. Speech and Language Processing: An Introduction to Natural Language Processing Computational Linguistics and Speech Recognition. Prentice Hall.  D. Jurafsky and J.H. Martin. 2009. Speech and Language Processing: An Introduction to Natural Language Processing Computational Linguistics and Speech Recognition. Prentice Hall."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101739"},{"volume-title":"Dynamic log file analysis: an unsupervised cluster evolution approach for anomaly detection. computers & security 79","year":"2018","author":"Landauer Max","key":"e_1_3_2_1_6_1"},{"volume-title":"Retrieved","year":"2019","author":"PAI.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557154"},{"volume-title":"Recent evolutions of multiple sequence alignment algorithms. PLoS computational biology 3, 8","year":"2007","author":"Notredame C\u00e9dric","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPOM.2003.1251233"},{"volume-title":"AECID-PG: A Tree-Based Log Parser Generator To Enable Log Analysis. In 2019 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM). IEEE, 7--12","year":"2019","author":"Wurzenberger Markus","key":"e_1_3_2_1_11_1"},{"volume-title":"Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, 31","year":"2017","author":"Skopik Florian","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"}],"event":{"name":"ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"ASIA CCS '20"},"container-title":["Proceedings of the 15th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384722","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320269.3384722","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:27Z","timestamp":1750200087000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384722"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":13,"alternative-id":["10.1145\/3320269.3384722","10.1145\/3320269"],"URL":"https:\/\/doi.org\/10.1145\/3320269.3384722","relation":{},"subject":[],"published":{"date-parts":[[2020,10,5]]},"assertion":[{"value":"2020-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}