{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:29Z","timestamp":1750309589816,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,17]]},"DOI":"10.1145\/3723178.3723272","type":"proceedings-article","created":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T07:20:33Z","timestamp":1749194433000},"page":"713-718","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Improving Big Data Visualization and Association Rule Mining through Splunk Database Gap Analysis"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-7822-2423","authenticated-orcid":false,"given":"S.M Moshiuzzaman","family":"Shatil","sequence":"first","affiliation":[{"name":"Department of Computer Science, American International University-Bangladesh, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-5602-6114","authenticated-orcid":false,"given":"Ahsan","family":"Habib","sequence":"additional","affiliation":[{"name":"Department of Computer Science, American International University-Bangladesh, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0075-5699","authenticated-orcid":false,"given":"Tahmid Enam","family":"Shrestha","sequence":"additional","affiliation":[{"name":"Department of Computer Science, American International University-Bangladesh, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3908-5480","authenticated-orcid":false,"given":"Sadia","family":"Hossain","sequence":"additional","affiliation":[{"name":"Department of Computer Science, American International University-Bangladesh, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3023-8457","authenticated-orcid":false,"given":"Md Sadi Al","family":"Huda","sequence":"additional","affiliation":[{"name":"Artificial Intelligence Research &amp; Innovation Lab, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1592-2839","authenticated-orcid":false,"given":"Noor A Jannat","family":"Tania","sequence":"additional","affiliation":[{"name":"Artificial Intelligence Research &amp; Innovation Lab, Dhaka, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2025,6,6]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","unstructured":"2024. Mine-first association rule mining: An integration of independent frequent patterns in distributed environments. Decision Analytics Journal 10 (2024) 100434. 10.1016\/j.dajour.2024.100434","DOI":"10.1016\/j.dajour.2024.100434"},{"key":"e_1_3_3_1_3_2","unstructured":"Accessed 11 Jan 2019. Canalys 2018. https:\/\/www.canalys.com\/newsroom\/cloud-market-share-q4-2018-and-full-year-2018"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-33-6400-4_6"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1767\/1\/012008"},{"key":"e_1_3_3_1_6_2","unstructured":"L. Cao L. Xu F. Yang and P.F. Jia. 2021. Influencing factors analysis of pavement damage based on mining association rules. Computer Systems and Applications 30 1 (2021) 186\u2013193."},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.5555\/2424220"},{"key":"e_1_3_3_1_8_2","unstructured":"Splunk Documentation. Accessed 30 August 2020. Securing the Splunk Platform. https:\/\/docs.splunk.com\/Documentation\/Splunk\/8.0.5\/Security\/WhatyoucansecurewithSplunk"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-6680-1_2"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Jiawei Hu and Athanasios\u00a0V Vasilakos. 2016. Energy big data analytics and security: challenges and opportunities. IEEE Transactions on Smart Grid 7 5 (2016) 2423\u20132436.","DOI":"10.1109\/TSG.2016.2563461"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"crossref","unstructured":"Ali\u00a0Ahmed Hussein. 2020. Using hadoop technology to overcome big data problems by choosing proposed cost-efficient scheduler algorithm for heterogeneous hadoop system (BD3). Journal of Scientific Research and Reports 26 9 (2020) 58\u201384.","DOI":"10.9734\/jsrr\/2020\/v26i930310"},{"key":"e_1_3_3_1_12_2","unstructured":"Intellipaat. Accessed 28 August 2020. What is Splunk. https:\/\/intellipaat.com\/blog\/what-is-splunk"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","unstructured":"N. Khan I. Yaqoob I.\u00a0A.\u00a0T. Hashem Z. Inayat W.\u00a0K.\u00a0M. Ali M. Alam and A. Gani. 2014. Big data: survey technologies opportunities and challenges. The Scientific World Journal 2014 (2014) 1\u201318. 10.1155\/2014\/712826","DOI":"10.1155\/2014\/712826"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Tim Loughran and Bill McDonald. 2020. Textual analysis in finance. Annual Review of Financial Economics 12 (2020) 357\u2013375.","DOI":"10.1146\/annurev-financial-012820-032249"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"Minsheng Ma Zhiyuan Yin Shaolong Zhang Sisi Wang Changcheng Zheng Xiaohong Jiang and Dan Pei. 2020. Diagnosing root causes of intermittent slow queries in cloud databases. Proceedings of the VLDB Endowment 13 8 (2020) 1176\u20131189.","DOI":"10.14778\/3389133.3389136"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"crossref","unstructured":"Hamad\u00a0S. Malallah Raghad Qashi Lana\u00a0M. Abdulrahman Mohammed\u00a0A. Omer and Ahmed\u00a0A. Yazdeen. 2023. Performance analysis of enterprise cloud computing: a review. Journal of Applied Science and Technology Trends 4 01 (2023) 01\u201312.","DOI":"10.38094\/jastt401139"},{"key":"e_1_3_3_1_17_2","volume-title":"Splunk Best Practices","author":"Marlette Travis","year":"2016","unstructured":"Travis Marlette. 2016. Splunk Best Practices. Packt Publishing Ltd."},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-5036-9_30"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-5036-9_30"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"crossref","unstructured":"K.\u00a0L. O\u2019Halloran G. Pal and M. Jin. 2021. Multimodal approach to analysing big social and news media data. Discourse Context & Media 40 (2021) 100467.","DOI":"10.1016\/j.dcm.2021.100467"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"crossref","unstructured":"Anas Oussous and Fadwa\u00a0Zohra Benjelloun. 2022. A comparative study of different search and indexing tools for big data. Jordanian Journal of Computers and Information Technology 8 1 (2022).","DOI":"10.5455\/jjcit.71-1637097759"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"crossref","unstructured":"C. Qi W.\u00a0T. Tsai W. Li Z. Zhu and Y. Luo. 2017. A cloud-based triage log analysis and recovery framework. Simulation Modelling Practice and Theory 77 (2017) 292\u2013316.","DOI":"10.1016\/j.simpat.2017.07.003"},{"key":"e_1_3_3_1_23_2","first-page":"183","volume-title":"15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21)","author":"Rodrigues Keval","year":"2021","unstructured":"Keval Rodrigues, Yizheng Luo, and Ding Yuan. 2021. CLP: Efficient and scalable search on compressed text logs. In 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21). 183\u2013198."},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"crossref","unstructured":"Muhammad Shaheen and Umar Abdullah. 2021. CARM: Context Based Association Rule Mining for Conventional Data. Computers Materials & Continua 68 3 (2021).","DOI":"10.32604\/cmc.2021.016766"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/IBIGDELFT.2018.8625291"},{"key":"e_1_3_3_1_26_2","unstructured":"Splunk. Accessed 28 August 2020. Splunk History. https:\/\/www.splunk.com\/en_us\/about-splunk.html"},{"key":"e_1_3_3_1_27_2","unstructured":"Splunk Inc.Accessed: 2024. About Splunk. https:\/\/www.splunk.com\/en_us\/about-splunk.html."},{"key":"e_1_3_3_1_28_2","volume-title":"Workshop on Managing Systems via Log Analysis and Machine Learning Techniques (SLAML 10)","author":"Stearley Jacob","year":"2010","unstructured":"Jacob Stearley, Stephanie Corwell, and Kathryn Lord. 2010. Bridging the gaps: Joining information sources with splunk. In Workshop on Managing Systems via Log Analysis and Machine Learning Techniques (SLAML 10)."},{"volume-title":"Practical Splunk Search Processing","author":"Subramanian K.","key":"e_1_3_3_1_29_2","unstructured":"K. Subramanian. Year. Practical Splunk Search Processing. Publisher."},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-6276-4_1"},{"key":"e_1_3_3_1_31_2","unstructured":"S.\u00a0S. N. S.\u00a0S. Vidhya S. Sarumathi and N. Shanthi. 2014. Comparative analysis of diverse collection of big data analytics tools. International Journal of Computer and Information Engineering 8 9 (2014) 1646\u20131652."},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"crossref","unstructured":"G. Viswanath and P.\u00a0V. Krishna. 2021. Hybrid encryption framework for securing big data storage in multi-cloud environment. Evolutionary Intelligence 14 2 (2021) 691\u2013698.","DOI":"10.1007\/s12065-020-00404-w"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"crossref","unstructured":"T. Wang B. Xiao and W. Ma. 2022. Student Behavior Data Analysis Based on Association Rule Mining. International Journal of Computational Intelligence Systems 15 1 (2022) 1\u20139.","DOI":"10.1007\/s44196-022-00087-4"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"crossref","unstructured":"W. Wang and C. Lu. 2020. Visualization analysis of big data research based on Citespace. Soft Computing 24 11 (2020) 8173\u20138186.","DOI":"10.1007\/s00500-019-04384-7"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"crossref","unstructured":"M. Yang W. He Z. Zhang Y. Xu H. Yang Y. Chen and X. Xu. 2019. An efficient storage and service method for multi-source merging meteorological big data in cloud environment. EURASIP Journal on Wireless Communications and Networking 2019 1 (2019) 1\u201312.","DOI":"10.1186\/s13638-019-1576-0"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1002\/9781394319817"},{"key":"e_1_3_3_1_37_2","unstructured":"L.A. Yu and Y.D. Zhang. 2020. Weight-selected attribute bagging based on association rules for credit dataset classification. Systems Engineering-Theory & Practice 40 2 (2020) 366\u2013372."},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-5762-2"}],"event":{"name":"ICCA 2024: 3rd International Conference on Computing Advancements","acronym":"ICCA 2024","location":"Dhaka Bangladesh"},"container-title":["Proceedings of the 3rd International Conference on Computing Advancements"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723272","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3723178.3723272","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:56:47Z","timestamp":1750298207000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723272"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,17]]},"references-count":37,"alternative-id":["10.1145\/3723178.3723272","10.1145\/3723178"],"URL":"https:\/\/doi.org\/10.1145\/3723178.3723272","relation":{},"subject":[],"published":{"date-parts":[[2024,10,17]]},"assertion":[{"value":"2025-06-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}