{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:46:26Z","timestamp":1755801986508,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,20]],"date-time":"2023-10-20T00:00:00Z","timestamp":1697760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Sichuan Science and Technology Program","award":["No.2022ZDZX0005"],"award-info":[{"award-number":["No.2022ZDZX0005"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,20]]},"DOI":"10.1145\/3650400.3650608","type":"proceedings-article","created":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T08:33:18Z","timestamp":1713342798000},"page":"1233-1238","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Multi-factor Acquisition of Global State based Log-anomaly Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-1222-8414","authenticated-orcid":false,"given":"Zhiyan","family":"Lu","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-1218-3881","authenticated-orcid":false,"given":"Xiaoyu","family":"Zeng","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, China"}]}],"member":"320","published-online":{"date-parts":[[2024,4,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Anomaly detection for industrial internet of things cyberattacks. Computer Systems Science &Engineering, 44(3)","author":"Alanazi Rehab","year":"2023","unstructured":"Rehab Alanazi and Ahamed Aljuhani. Anomaly detection for industrial internet of things cyberattacks. Computer Systems Science &Engineering, 44(3), 2023."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21196647"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-02354-5"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416624"},{"key":"e_1_3_2_1_5_1","first-page":"1","article-title":"Log file anomaly detection","author":"Yang Tian","year":"2016","unstructured":"Tian Yang and Vikas Agrawal. Log file anomaly detection. CS224d Fall, 2016:1\u20137, 2016.","journal-title":"CS224d"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"},{"key":"e_1_3_2_1_7_1","first-page":"1460","volume-title":"2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE)","author":"Yang Lin","unstructured":"Lin Yang, Junjie Chen, Zan Wang, Weijing Wang, Jiajun Jiang, Xuyuan Dong, and Wenbin Zhang. Semi-supervised log-based anomaly detection via probabilistic label estimation. In 2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE), pages 1448\u20131460. IEEE, 2021."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"e_1_3_2_1_9_1","volume-title":"Lanobert: System log anomaly detection based on bert masked language model. arXiv preprint arXiv:2111.09564","author":"Lee Yukyung","year":"2021","unstructured":"Yukyung Lee, Jina Kim, and Pilsung Kang. Lanobert: System log anomaly detection based on bert masked language model. arXiv preprint arXiv:2111.09564, 2021."},{"key":"e_1_3_2_1_10_1","volume-title":"Framework for automatic detection of anomalies in devops","author":"Fawzy Ahmed Hany","year":"2023","unstructured":"Ahmed Hany Fawzy, Khaled Wassif, and Hanan Moussa. Framework for automatic detection of anomalies in devops. 2023."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3549176"},{"key":"e_1_3_2_1_12_1","first-page":"4745","volume-title":"Pei Sun","author":"Meng Weibin","year":"2019","unstructured":"Weibin Meng, Ying Liu, Yichen Zhu, Shenglin Zhang, Dan Pei, Yuqing Liu, Yihao Chen, Ruizhi Zhang, Shimin Tao, Pei Sun, Loganomaly: Unsupervised detection of sequential and quantitative anomalies in unstructured logs. In IJCAI, volume 19, pages 4739\u20134745, 2019."},{"key":"e_1_3_2_1_13_1","volume-title":"A2log: attentive augmented log anomaly detection. arXiv preprint arXiv:2109.09537","author":"Wittkopp Thorsten","year":"2021","unstructured":"Thorsten Wittkopp, Alexander Acker, Sasho Nedelkoski, Jasmin Bo-gatinovski, Dominik Scheinert, Wu Fan, and Odej Kao. A2log: attentive augmented log anomaly detection. arXiv preprint arXiv:2109.09537, 2021."},{"key":"e_1_3_2_1_14_1","first-page":"504","volume-title":"2021 36th IEEE\/ACM International Con-ference on Automated Software Engineering (ASE)","author":"Le Van-Hoang","unstructured":"Van-Hoang Le and Hongyu Zhang. Log-based anomaly detection without log parsing. In 2021 36th IEEE\/ACM International Con-ference on Automated Software Engineering (ASE), pages 492\u2013504.IEEE, 2021."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510155"},{"key":"e_1_3_2_1_16_1","volume-title":"Well-read students learn better: On the importance of pre-training compact models. arXiv preprint arXiv:1908.08962v2","author":"Turc Iulia","year":"2019","unstructured":"Iulia Turc, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. Well-read students learn better: On the importance of pre-training compact models. arXiv preprint arXiv:1908.08962v2, 2019."},{"key":"e_1_3_2_1_17_1","volume-title":"Atten-tion is all you need","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N. Gomez, Lukasz Kaiser, and Illia Polosukhin. Atten-tion is all you need. 2017."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.03.091"},{"key":"e_1_3_2_1_19_1","volume-title":"Loghub: A large collection of system log datasets towards automated log analytics","author":"He Shilin","year":"2020","unstructured":"Shilin He, Jieming Zhu, Pinjia He, and Michael R. Lyu. Loghub: A large collection of system log datasets towards automated log analytics, 2020."}],"event":{"name":"EITCE 2023: 2023 7th International Conference on Electronic Information Technology and Computer Engineering","acronym":"EITCE 2023","location":"Xiamen China"},"container-title":["Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650400.3650608","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3650400.3650608","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T05:08:21Z","timestamp":1755752901000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650400.3650608"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,20]]},"references-count":19,"alternative-id":["10.1145\/3650400.3650608","10.1145\/3650400"],"URL":"https:\/\/doi.org\/10.1145\/3650400.3650608","relation":{},"subject":[],"published":{"date-parts":[[2023,10,20]]},"assertion":[{"value":"2024-04-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}