{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:18:10Z","timestamp":1750220290225,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T00:00:00Z","timestamp":1649116800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Union?s Horizon 2020 research and innovation programme","award":["101017171 and 883335"],"award-info":[{"award-number":["101017171 and 883335"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,5]]},"DOI":"10.1145\/3517207.3526979","type":"proceedings-article","created":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T22:09:26Z","timestamp":1648591766000},"page":"64-71","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["syslrn"],"prefix":"10.1145","author":[{"given":"Davide","family":"Sanvito","sequence":"first","affiliation":[{"name":"NEC Laboratories Europe"}]},{"given":"Giuseppe","family":"Siracusano","sequence":"additional","affiliation":[{"name":"NEC Laboratories Europe"}]},{"given":"Sharan","family":"Santhanam","sequence":"additional","affiliation":[{"name":"NEC Laboratories Europe"}]},{"given":"Roberto","family":"Gonzalez","sequence":"additional","affiliation":[{"name":"NEC Laboratories Europe"}]},{"given":"Roberto","family":"Bifulco","sequence":"additional","affiliation":[{"name":"NEC Laboratories Europe"}]}],"member":"320","published-online":{"date-parts":[[2022,4,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2807452"},{"key":"e_1_3_2_1_2_1","volume-title":"Pietro Liguori, and Roberto Natella.","author":"Cotroneo Domenico","year":"2020","unstructured":"Domenico Cotroneo , Luigi De Simone , Pietro Liguori, and Roberto Natella. 2020 . Fault injection analytics: A novel approach to discover failure modes in cloud-computing systems. IEEE Transactions on Dependable and Secure Computing ( 2020). Domenico Cotroneo, Luigi De Simone, Pietro Liguori, and Roberto Natella. 2020. Fault injection analytics: A novel approach to discover failure modes in cloud-computing systems. IEEE Transactions on Dependable and Secure Computing (2020)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338916"},{"volume-title":"https:\/\/www.datadoghq.com\/product\/log-management\/. Online","year":"2022","key":"e_1_3_2_1_4_1","unstructured":"Datadog. 2022. https:\/\/www.datadoghq.com\/product\/log-management\/. Online ; accessed 16- February - 2022 . Datadog. 2022. https:\/\/www.datadoghq.com\/product\/log-management\/. Online; accessed 16-February-2022."},{"key":"e_1_3_2_1_5_1","volume-title":"https:\/\/github.com\/logpai\/loghub\/tree\/master\/OpenStack\/. Online","author":"OpenStack","year":"2022","unstructured":"OpenStack dataset. 2022. https:\/\/github.com\/logpai\/loghub\/tree\/master\/OpenStack\/. Online ; accessed 16- February - 2022 . OpenStack dataset. 2022. https:\/\/github.com\/logpai\/loghub\/tree\/master\/OpenStack\/. Online; accessed 16-February-2022."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"volume-title":"https:\/\/www.dynatrace.com\/platform\/observability\/. Online","year":"2022","key":"e_1_3_2_1_7_1","unstructured":"Dynatrace. 2022. https:\/\/www.dynatrace.com\/platform\/observability\/. Online ; accessed 16- February - 2022 . Dynatrace. 2022. https:\/\/www.dynatrace.com\/platform\/observability\/. Online; accessed 16-February-2022."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670979.2670986"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987550.2987583"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2523622"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41109-019-0195-3"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132763"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939712"},{"volume-title":"https:\/\/www.openstack.org\/. Online","year":"2022","key":"e_1_3_2_1_14_1","unstructured":"OpenStack. 2022. https:\/\/www.openstack.org\/. Online ; accessed 16- February - 2022 . OpenStack. 2022. https:\/\/www.openstack.org\/. Online; accessed 16-February-2022."},{"volume-title":"https:\/\/redis.io\/. Online","year":"2022","key":"e_1_3_2_1_15_1","unstructured":"Redis. 2022. https:\/\/redis.io\/. Online ; accessed 16- February - 2022 . Redis. 2022. https:\/\/redis.io\/. Online; accessed 16-February-2022."},{"key":"e_1_3_2_1_16_1","volume-title":"https:\/\/access.redhat.com\/articles\/4409591#audit-record-types-2. Online","author":"Audit System Reference RHEL","year":"2022","unstructured":"RHEL Audit System Reference . 2019. https:\/\/access.redhat.com\/articles\/4409591#audit-record-types-2. Online ; accessed 16- February - 2022 . RHEL Audit System Reference. 2019. https:\/\/access.redhat.com\/articles\/4409591#audit-record-types-2. Online; accessed 16-February-2022."},{"key":"e_1_3_2_1_17_1","volume-title":"Markus Hagenbuchner, and Gabriele Monfardini.","author":"Scarselli Franco","year":"2008","unstructured":"Franco Scarselli , Marco Gori , Ah Chung Tsoi , Markus Hagenbuchner, and Gabriele Monfardini. 2008 . The graph neural network model. IEEE transactions on neural networks 20, 1 (2008), 61--80. Franco Scarselli, Marco Gori, Ah Chung Tsoi, Markus Hagenbuchner, and Gabriele Monfardini. 2008. The graph neural network model. IEEE transactions on neural networks 20, 1 (2008), 61--80."},{"key":"e_1_3_2_1_18_1","unstructured":"syslrn dataset. 2022. https:\/\/github.com\/nec-research\/syslrn-EuroMLSys22. Online.  syslrn dataset. 2022. https:\/\/github.com\/nec-research\/syslrn-EuroMLSys22. Online."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510155"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2016.7919489"},{"key":"e_1_3_2_1_21_1","volume-title":"Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Junghwan Rhee, Zhengzhang Chen, Wei Cheng, Carl A Gunter, et al.","author":"Wang Qi","year":"2020","unstructured":"Qi Wang , Wajih Ul Hassan , Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Junghwan Rhee, Zhengzhang Chen, Wei Cheng, Carl A Gunter, et al. 2020 . You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.. In NDSS. Qi Wang, Wajih Ul Hassan, Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Junghwan Rhee, Zhengzhang Chen, Wei Cheng, Carl A Gunter, et al. 2020. You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.. In NDSS."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00015"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2980024.2872407"},{"key":"e_1_3_2_1_24_1","volume-title":"10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12)","author":"Yuan Ding","year":"2012","unstructured":"Ding Yuan , Soyeon Park , Peng Huang , Yang Liu , Michael M Lee , Xiaoming Tang , Yuanyuan Zhou , and Stefan Savage . 2012 . Be conservative: Enhancing failure diagnosis with proactive logging . In 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12) . 293--306. Ding Yuan, Soyeon Park, Peng Huang, Yang Liu, Michael M Lee, Xiaoming Tang, Yuanyuan Zhou, and Stefan Savage. 2012. Be conservative: Enhancing failure diagnosis with proactive logging. In 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12). 293--306."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227202"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338931"}],"event":{"name":"EuroSys '22: Seventeenth European Conference on Computer Systems","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Rennes France","acronym":"EuroSys '22"},"container-title":["Proceedings of the 2nd European Workshop on Machine Learning and Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517207.3526979","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3517207.3526979","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:29Z","timestamp":1750188689000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517207.3526979"}},"subtitle":["learning what to monitor for efficient anomaly detection"],"short-title":[],"issued":{"date-parts":[[2022,4,5]]},"references-count":26,"alternative-id":["10.1145\/3517207.3526979","10.1145\/3517207"],"URL":"https:\/\/doi.org\/10.1145\/3517207.3526979","relation":{},"subject":[],"published":{"date-parts":[[2022,4,5]]},"assertion":[{"value":"2022-04-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}