{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T11:41:32Z","timestamp":1763811692981,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T00:00:00Z","timestamp":1750896000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Research Council of Finland","award":["349487 and 349488"],"award-info":[{"award-number":["349487 and 349488"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,26]]},"DOI":"10.1145\/3727582.3728682","type":"proceedings-article","created":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T10:50:20Z","timestamp":1749120620000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["LO2: Microservice API Anomaly Dataset of Logs and Metrics"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3513-7253","authenticated-orcid":false,"given":"Alexander","family":"Bakhtin","sequence":"first","affiliation":[{"name":"University of Oulu, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7276-5696","authenticated-orcid":false,"given":"Jesse","family":"Nyyss\u00f6l\u00e4","sequence":"additional","affiliation":[{"name":"University of Helsinki, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0175-005X","authenticated-orcid":false,"given":"Yuqing","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Helsinki, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4228-2493","authenticated-orcid":false,"given":"Noman","family":"Ahmad","sequence":"additional","affiliation":[{"name":"University of Oulu, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5433-4771","authenticated-orcid":false,"given":"Ke","family":"Ping","sequence":"additional","affiliation":[{"name":"University of Helsinki, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8451-3668","authenticated-orcid":false,"given":"Matteo","family":"Esposito","sequence":"additional","affiliation":[{"name":"University of Oulu, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2841-5879","authenticated-orcid":false,"given":"Mika","family":"M\u00e4ntyl\u00e4","sequence":"additional","affiliation":[{"name":"University of Helsinki, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3210-3990","authenticated-orcid":false,"given":"Davide","family":"Taibi","sequence":"additional","affiliation":[{"name":"University of Oulu, Finland"}]}],"member":"320","published-online":{"date-parts":[[2025,6,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-71294-4_7"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.844498"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA65012.2025.00017"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","unstructured":"Alexander Bakhtin Jesse Nyyss\u00f6l\u00e4 Yuqing Wang Noman Ahmad Ke Ping Matteo Esposito Mika M\u00e4ntyl\u00e4 and Davide Taibi. 2024. LO2: Microservice Dataset of Logs and Metrics [Data set]. doi:10.5281\/zenodo.14257989","DOI":"10.5281\/zenodo.14257989"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","unstructured":"Alexander Bakhtin Jesse Nyyss\u00f6l\u00e4 Yuqing Wang Noman Ahmad Ke Ping Matteo Esposito Mika M\u00e4ntyl\u00e4 and Davide Taibi. 2024. Replication for \"LO2: Microservice Dataset of Logs and Metrics\". doi:10.5281\/zenodo.14229369","DOI":"10.5281\/zenodo.14229369"},{"key":"e_1_3_2_1_6_1","unstructured":"Creative Commons. 2024. Creative Commons Attribution 4.0 International Public License. https:\/\/creativecommons.org\/licenses\/by\/4.0\/ Accessed: 2024-10-29."},{"key":"e_1_3_2_1_7_1","volume-title":"VALIDATE: A deep dive into vulnerability prediction datasets. Information and Software Technology","author":"Esposito Matteo","year":"2024","unstructured":"Matteo Esposito and Davide Falessi. 2024. VALIDATE: A deep dive into vulnerability prediction datasets. Information and Software Technology (2024), 107448."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/S10664-022-10261-Z"},{"key":"e_1_3_2_1_9_1","unstructured":"FORCE11. 2014. The FAIR Data Principles. https:\/\/force11.org\/info\/the-fair-data-principles\/ Accessed: 2024-12-02."},{"key":"e_1_3_2_1_10_1","unstructured":"FudanSELab. 2024. DeepTraLog. https:\/\/github.com\/FudanSELab\/DeepTraLog."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","unstructured":"Sona Ghahremani. 2021. 1998 World Cup Website Access Logs. doi:10.5281\/zenodo.5145855","DOI":"10.5281\/zenodo.5145855"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"D. Hardt. 2012. The OAuth 2.0 Authorization Framework. Request for Comments 6749. https:\/\/www.rfc-editor.org\/rfc\/rfc6749","DOI":"10.17487\/rfc6749"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3663529.3663793"},{"key":"e_1_3_2_1_14_1","unstructured":"IntelligentDDS. 2024. Nezha. https:\/\/github.com\/IntelligentDDS\/Nezha."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3660768"},{"key":"e_1_3_2_1_16_1","unstructured":"Lawrence Berkeley National Laboratory. 1998. 1998 World Cup Dataset. https:\/\/ita.ee.lbl.gov\/html\/contrib\/WorldCup.html Accessed: 2024-10-29."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.7615394"},{"key":"e_1_3_2_1_18_1","volume-title":"Eadro: An End-to-End Troubleshooting Framework for Microservices on Multi-source Data. In 45th IEEE\/ACM International Conference on Software Engineering, ICSE 2023","author":"Lee Cheryl","year":"2023","unstructured":"Cheryl Lee, Tianyi Yang, Zhuangbin Chen, Yuxin Su, and Michael R. Lyu. 2023. Eadro: An End-to-End Troubleshooting Framework for Microservices on Multi-source Data. In 45th IEEE\/ACM International Conference on Software Engineering, ICSE 2023, Melbourne, Australia, May 14-20, 2023. IEEE, 1750--1762."},{"key":"e_1_3_2_1_19_1","volume-title":"The Technical Debt Dataset. In Conference on Predictive Models and Data Analytics in Software Engineering.","author":"Lenarduzzi Valentina","year":"2019","unstructured":"Valentina Lenarduzzi, Nyyti Saarim\u00e4ki, and Davide Taibi. 2019. The Technical Debt Dataset. In Conference on Predictive Models and Data Analytics in Software Engineering."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3549092"},{"key":"e_1_3_2_1_21_1","volume-title":"2024 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 395--399","author":"M\u00e4ntyl\u00e4 Mika V","year":"2024","unstructured":"Mika V M\u00e4ntyl\u00e4, Yuqing Wang, and Jesse Nyyss\u00f6l\u00e4. 2024. Loglead-fast and integrated log loader, enhancer, and anomaly detector. In 2024 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 395--399."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","unstructured":"NetManAIOps. 2022. D\u00e9j\u00e0Vu. doi:10.5281\/zenodo.6955909 [Dataset].","DOI":"10.5281\/zenodo.6955909"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","unstructured":"Jesse Nyyss\u00f6l\u00e4 and Mika M\u00e4ntyl\u00e4. 2024. Speed and Performance of Parserless and Unsupervised Anomaly Detection Methods on Software Logs. In 2024 IEEE 24th International Conference on Software Quality Reliability and Security (QRS). 657--666. doi:10.1109\/QRS62785.2024.00071","DOI":"10.1109\/QRS62785.2024.00071"},{"key":"e_1_3_2_1_24_1","volume-title":"Willem-Jan Van Den Heuvel, and Damian Andrew Tamburri","author":"Owotogbe Joshua","year":"2024","unstructured":"Joshua Owotogbe, Indika Kumara, Willem-Jan Van Den Heuvel, and Damian Andrew Tamburri. 2024. Chaos Engineering: A Multi-Vocal Literature Review. arXiv:2412.01416 [cs.SE] https:\/\/arxiv.org\/abs\/2412.01416"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","unstructured":"Luan Pham. 2024. RCAEval: A Benchmark for Root Cause Analysis of Microservice Systems. doi:10.5281\/ZENODO.14590730","DOI":"10.5281\/ZENODO.14590730"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111722"},{"key":"e_1_3_2_1_27_1","unstructured":"Murugiah Souppaya John Morello and Karen Scarfone. 2017. Application Container Security Guide. Technical Report SP 800-190. National Institute of Standards and Technology (NIST). https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-190.pdf"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2017.4250931"},{"key":"e_1_3_2_1_29_1","unstructured":"Tsinghua University. 2021. AIOps Challenge 2021. https:\/\/www.aiops.cn\/gitlab\/aiops-nankai\/data\/trace\/aiops2021."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4625-2"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616249"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510180"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE59848.2023.00071"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.2966615"}],"event":{"name":"PROMISE '25: 21st International Conference on Predictive Models and Data Analytics in Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Trondheim Norway","acronym":"PROMISE '25"},"container-title":["Proceedings of the 21st International Conference on Predictive Models and Data Analytics in Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3727582.3728682","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3727582.3728682","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:25:45Z","timestamp":1755973545000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3727582.3728682"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,26]]},"references-count":34,"alternative-id":["10.1145\/3727582.3728682","10.1145\/3727582"],"URL":"https:\/\/doi.org\/10.1145\/3727582.3728682","relation":{},"subject":[],"published":{"date-parts":[[2025,6,26]]},"assertion":[{"value":"2025-06-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}