{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:38Z","timestamp":1750220858109,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T00:00:00Z","timestamp":1569974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,2]]},"DOI":"10.1145\/3368756.3369069","type":"proceedings-article","created":{"date-parts":[[2019,12,18]],"date-time":"2019-12-18T13:21:21Z","timestamp":1576675281000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Incident prediction through logging management and machine learning"],"prefix":"10.1145","author":[{"given":"J. El","family":"Abdelkhalki","sequence":"first","affiliation":[{"name":"LSIT, Tanger, Morocco"}]},{"given":"M. Ben","family":"Ahmed","sequence":"additional","affiliation":[{"name":"LSIT, Tanger, Morocco"}]},{"given":"A.","family":"Slimani","sequence":"additional","affiliation":[{"name":"LSIT, Tanger, Morocco"}]}],"member":"320","published-online":{"date-parts":[[2019,10,2]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","volume-title":"Proceedings of the 2nd International Conference on Computing and Wireless Communication Systems - ICCWCS'17","author":"J. El","year":"2017","unstructured":"J. El abdelkhalki, M. Ben ahmed, et B. H. Anouar , \u00ab Classification and exploration of TSM log file based on datamining Algorithms \u00bb , in Proceedings of the 2nd International Conference on Computing and Wireless Communication Systems - ICCWCS'17 , Larache, Morocco , 2017 , p. 1 -- 7 . J. El abdelkhalki, M. Ben ahmed, et B. H. Anouar, \u00ab Classification and exploration of TSM log file based on datamining Algorithms \u00bb, in Proceedings of the 2nd International Conference on Computing and Wireless Communication Systems - ICCWCS'17, Larache, Morocco, 2017, p. 1--7."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","first-page":"4613","DOI":"10.1109\/IECON.2016.7793774","volume-title":"IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society","author":"H\u00e4m\u00e4l\u00e4inen E. Heikkinen","year":"2016","unstructured":"E. Heikkinen et T. D. H\u00e4m\u00e4l\u00e4inen , \u00ab Behavior Mining Language for mining expected behavior from log files \u00bb , in IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society , 2016 , p. 4613 -- 4618 . E. Heikkinen et T. D. H\u00e4m\u00e4l\u00e4inen, \u00ab Behavior Mining Language for mining expected behavior from log files \u00bb, in IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society, 2016, p. 4613--4618."},{"key":"e_1_3_2_1_3_1","unstructured":"\u00ab Advances and challenges in log analysis. \u00bb  \u00ab Advances and challenges in log analysis. \u00bb"},{"key":"e_1_3_2_1_4_1","unstructured":"\u00ab Extraction des connaissances \u00e0 partir des fichiers Logs d'une Plateforme E-learning (PDF Download Available) \u00bb ResearchGate. [En ligne]. Disponible sur: https:\/\/www.researchgate.net\/publication\/309419431_Extraction_des_connaissances_a_partir_des_fichiers_Logs_d'une_Plateforme_E-learning. [Consult\u00e9 le: 31-juill-2017].  \u00ab Extraction des connaissances \u00e0 partir des fichiers Logs d'une Plateforme E-learning (PDF Download Available) \u00bb ResearchGate. [En ligne]. Disponible sur: https:\/\/www.researchgate.net\/publication\/309419431_Extraction_des_connaissances_a_partir_des_fichiers_Logs_d'une_Plateforme_E-learning. [Consult\u00e9 le: 31-juill-2017]."},{"key":"e_1_3_2_1_5_1","unstructured":"J. T. Hereford P. J. Cogan P. A. Ferguson T. Rutowski et C. Boothman \u00ab System method and computer program for identifying significant records \u00bb US10140345B1 27-nov-2018.  J. T. Hereford P. J. Cogan P. A. Ferguson T. Rutowski et C. Boothman \u00ab System method and computer program for identifying significant records \u00bb US10140345B1 27-nov-2018."},{"key":"e_1_3_2_1_6_1","first-page":"5","volume":"31","author":"Zou D.-Q.","unstructured":"D.-Q. Zou , H. Qin , et H. Jin , \u00ab UiLog: Improving Log-Based Fault Diagnosis by Log Analysis \u00bb , J. Comput. Sci. Technol. , vol. 31 , n\u00b0 5 , p. 1038--1052, sept. 2016. D.-Q. Zou, H. Qin, et H. Jin, \u00ab UiLog: Improving Log-Based Fault Diagnosis by Log Analysis \u00bb, J. Comput. Sci. Technol., vol. 31, n\u00b0 5, p. 1038--1052, sept. 2016.","journal-title":"J. Comput. Sci. Technol."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1177\/1748301818791503"},{"key":"e_1_3_2_1_8_1","unstructured":"\u00ab What is Log Analysis? - Definition from Techopedia \u00bb Techopedia.com. [En ligne]. Disponible sur: https:\/\/www.techopedia.com\/definition\/31756\/log-analysis. [Consult\u00e9 le: 20-ao\u00fbt-2017].  \u00ab What is Log Analysis? - Definition from Techopedia \u00bb Techopedia.com. [En ligne]. Disponible sur: https:\/\/www.techopedia.com\/definition\/31756\/log-analysis. [Consult\u00e9 le: 20-ao\u00fbt-2017]."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2016.7860492"},{"key":"e_1_3_2_1_10_1","unstructured":"K. Saurabh C. F. Beedgen et B. Kurtic \u00ab Log data analysis \u00bb US9262519B1 16-f\u00e9vr-2016.  K. Saurabh C. F. Beedgen et B. Kurtic \u00ab Log data analysis \u00bb US9262519B1 16-f\u00e9vr-2016."},{"key":"e_1_3_2_1_11_1","first-page":"41","volume-title":"International Journal of UbiComp","volume":"4","author":"Baraskar S. Narkhede","year":"2013","unstructured":"S. Narkhede et T. Baraskar , \u00ab HMR Log Analyzer : Analyze Web Application Logs Over Hadoop MapReduce \u00bb , International Journal of UbiComp , vol. 4 , n\u00b0 3, p. 41 -- 51 , juill. 2013 . S. Narkhede et T. Baraskar, \u00ab HMR Log Analyzer: Analyze Web Application Logs Over Hadoop MapReduce \u00bb, International Journal of UbiComp, vol. 4, n\u00b0 3, p. 41--51, juill. 2013."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2228298.2228334"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.04.253"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.32614\/RJ-2017-039"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.07.019"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.10.011"},{"key":"e_1_3_2_1_18_1","first-page":"22","volume-title":"International Conference on Web Services Computing (ICWSC)","author":"Maniya H.","year":"2011","unstructured":"H. Maniya , M. Hasan , et K. P. Patel , \u00ab Comparative study of na\u00efve Bayes classifier and KNN for tuberculosis \u00bb , in International Conference on Web Services Computing (ICWSC) , 2011 , p. 22 -- 26 . H. Maniya, M. Hasan, et K. P. Patel, \u00ab Comparative study of na\u00efve Bayes classifier and KNN for tuberculosis \u00bb, in International Conference on Web Services Computing (ICWSC), 2011, p. 22--26."},{"key":"e_1_3_2_1_19_1","first-page":"1916","volume-title":"International Journal of Advanced Research in Computer and Communication Engineering","volume":"2","author":"Khamar K.","year":"2013","unstructured":"K. Khamar , \u00ab Short text classification using kNN based on distance function \u00bb , International Journal of Advanced Research in Computer and Communication Engineering , vol. 2 , n\u00b0 4, p. 1916 -- 1919 , 2013 . K. Khamar, \u00ab Short text classification using kNN based on distance function \u00bb, International Journal of Advanced Research in Computer and Communication Engineering, vol. 2, n\u00b0 4, p. 1916--1919, 2013."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/KST.2016.7440483"},{"key":"e_1_3_2_1_21_1","first-page":"9","volume-title":"\u00ab Classification rules comparison into data mining concept \u00bb","author":"Jhalak S. R.","unstructured":"S. R. Mehedy et A. Jhalak , \u00ab Classification rules comparison into data mining concept \u00bb , p. 9 . S. R. Mehedy et A. Jhalak, \u00ab Classification rules comparison into data mining concept \u00bb, p. 9."},{"key":"e_1_3_2_1_22_1","volume-title":"International Journal of Advanced Computer Science and Applications","volume":"1","author":"A. H, Q. A., M. N.","year":"2011","unstructured":"A. H, Q. A., M. N. , et E. M., \u00ab A Comparison Study between Data Mining Tools over some Classification Methods \u00bb , International Journal of Advanced Computer Science and Applications , vol. 1 , n\u00b0 3, 2011 . A. H, Q. A., M. N., et E. M., \u00ab A Comparison Study between Data Mining Tools over some Classification Methods \u00bb, International Journal of Advanced Computer Science and Applications, vol. 1, n\u00b0 3, 2011."},{"key":"e_1_3_2_1_23_1","first-page":"503","volume":"2","author":"Nair S. Joshi","year":"2015","unstructured":"S. Joshi et M. K. Nair , \u00ab Prediction of Heart Disease Using Classification Based Data Mining Techniques \u00bb, in Computational Intelligence in Data Mining - Volume 2 , 2015 , p. 503 -- 511 . S. Joshi et M. K. Nair, \u00ab Prediction of Heart Disease Using Classification Based Data Mining Techniques \u00bb, in Computational Intelligence in Data Mining - Volume 2, 2015, p. 503--511.","journal-title":"Computational Intelligence in Data Mining -"},{"key":"e_1_3_2_1_24_1","volume-title":"et C. J. Pal","author":"Witten I. H.","year":"2016","unstructured":"I. H. Witten , E. Frank , M. A. Hall , et C. J. Pal , Data Mining : Practical Machine Learning Tools and Techniques. Morgan Kaufmann , 2016 . I. H. Witten, E. Frank, M. A. Hall, et C. J. Pal, Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann, 2016."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1201\/b10867"},{"key":"e_1_3_2_1_26_1","unstructured":"\u00ab Classification \u00bb Wikipedia. 05-f\u00e9vr-2019.  \u00ab Classification \u00bb Wikipedia. 05-f\u00e9vr-2019."},{"key":"e_1_3_2_1_27_1","unstructured":"\u00ab IBM Knowledgecenter - Tivoli Storage Manager server and client messages format \u00bb. [En ligne]. Disponible sur: https:\/\/www.ibm.com\/support\/knowledgecenter\/en\/SSGSG7_7.1.4\/msgs.tsm\/msgs_msgsformat.html. [Consult\u00e9 le: 28-juill-2017].  \u00ab IBM Knowledgecenter - Tivoli Storage Manager server and client messages format \u00bb. [En ligne]. Disponible sur: https:\/\/www.ibm.com\/support\/knowledgecenter\/en\/SSGSG7_7.1.4\/msgs.tsm\/msgs_msgsformat.html. [Consult\u00e9 le: 28-juill-2017]."},{"key":"e_1_3_2_1_28_1","unstructured":"Y. Benzaki \u00ab Introduction \u00e0 l'algorithme k Nearest Neighbors (KNN) \u00bb Mr. Mint: Apprendre le Machine Learning de A \u00e0 Z 02-oct-2018..  Y. Benzaki \u00ab Introduction \u00e0 l'algorithme k Nearest Neighbors (KNN) \u00bb Mr. Mint: Apprendre le Machine Learning de A \u00e0 Z 02-oct-2018.."},{"key":"e_1_3_2_1_29_1","unstructured":"D. Team \u00ab Data Mining Algorithms - 13 Algorithms Used in Data Mining \u00bb DataFlair 14-f\u00e9vr-2018. [En ligne]. Disponible sur: https:\/\/data-flair.training\/blogs\/datamining-algorithms\/. [Consult\u00e9 le: 15-juin-2019].  D. Team \u00ab Data Mining Algorithms - 13 Algorithms Used in Data Mining \u00bb DataFlair 14-f\u00e9vr-2018. [En ligne]. Disponible sur: https:\/\/data-flair.training\/blogs\/datamining-algorithms\/. [Consult\u00e9 le: 15-juin-2019]."},{"key":"e_1_3_2_1_30_1","volume-title":"Indian Journal of Science and Technology","author":"Arunesh V. Rajeswari","year":"2016","unstructured":"V. Rajeswari et K. Arunesh , \u00ab Analysing Soil Data using Data Mining Classification Techniques \u00bb , Indian Journal of Science and Technology , vol. 9 , n\u00b0 19, mai 2016 . V. Rajeswari et K. Arunesh, \u00ab Analysing Soil Data using Data Mining Classification Techniques \u00bb, Indian Journal of Science and Technology, vol. 9, n\u00b0 19, mai 2016."},{"key":"e_1_3_2_1_31_1","unstructured":"\u00ab Weka 3 - Data Mining with Open Source Machine Learning Software in Java \u00bb. [En ligne]. Disponible sur: http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/. [Consult\u00e9 le: 20-ao\u00fbt-2017].  \u00ab Weka 3 - Data Mining with Open Source Machine Learning Software in Java \u00bb. [En ligne]. Disponible sur: http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/. [Consult\u00e9 le: 20-ao\u00fbt-2017]."}],"event":{"name":"SCA2019: The Fourth International Conference on Smart City Applications","acronym":"SCA2019","location":"Casablanca Morocco"},"container-title":["Proceedings of the 4th International Conference on Smart City Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368756.3369069","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368756.3369069","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:28Z","timestamp":1750202608000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368756.3369069"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,2]]},"references-count":31,"alternative-id":["10.1145\/3368756.3369069","10.1145\/3368756"],"URL":"https:\/\/doi.org\/10.1145\/3368756.3369069","relation":{},"subject":[],"published":{"date-parts":[[2019,10,2]]},"assertion":[{"value":"2019-10-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}