{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T11:36:58Z","timestamp":1770896218160,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T00:00:00Z","timestamp":1559001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T00:00:00Z","timestamp":1559001600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Science and Technology on Information Transmission and Dissemination in Communication"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s13638-019-1430-4","type":"journal-article","created":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T09:03:39Z","timestamp":1559034219000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["An online log template extraction method based on hierarchical clustering"],"prefix":"10.1186","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7373-393X","authenticated-orcid":false,"given":"Ruipeng","family":"Yang","sequence":"first","affiliation":[]},{"given":"Dan","family":"Qu","sequence":"additional","affiliation":[]},{"given":"Yekui","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Yusheng","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Shaowei","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,28]]},"reference":[{"key":"1430_CR1","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.diin.2018.09.006","volume":"27","author":"Y Dai","year":"2018","unstructured":"Y. Dai, H. Li, Y. Qian, X. Lu, A malware classification method based on memory dump grayscale image. Digit. Investig. 27, 30\u201337 (2018)","journal-title":"Digit. Investig."},{"key":"1430_CR2","first-page":"1","volume":"2015","author":"L Yuchong","year":"2015","unstructured":"L. Yuchong, L. Xingguo, Q. Yekui, Z. Xin, Network-wide traffic anomaly detection and localization based on robust multivariate probabilistic calibration model. Math. Probl. Eng. 2015, 1\u201326 (2015)","journal-title":"Math. Probl. Eng."},{"key":"1430_CR3","unstructured":"C. Wang, Q. Xu, X. Lin, S. Liu, Research on data mining of permissions mode for Android malware detection. Clust. Comput. 2018, 1\u201314 (2018)"},{"key":"1430_CR4","doi-asserted-by":"crossref","unstructured":"A. Nandi, A. Mandal, S. Atreja, G.B. Dasgupta, S. Bhattacharya, in Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Anomaly detection using program control flow graph mining from execution logs (ACM, 2016), pp. 215\u2013224","DOI":"10.1145\/2939672.2939712"},{"key":"1430_CR5","doi-asserted-by":"crossref","unstructured":"M. Du, F. Li, G. Zheng, V. Srikumar, in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. DeepLog: anomaly detection and diagnosis from system logs through deep learning, vol 2017 (ACM, 2017), pp. 1285\u20131298","DOI":"10.1145\/3133956.3134015"},{"key":"1430_CR6","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/978-3-319-46298-1_32","volume-title":"International Conference on Network and System Security","author":"A Rahman","year":"2016","unstructured":"A. Rahman, Y. Xu, K. Radke, E. Foo, in International Conference on Network and System Security. Finding anomalies in SCADA logs using rare sequential pattern mining (Springer, Cham, 2016), pp. 499\u2013506"},{"key":"1430_CR7","doi-asserted-by":"crossref","unstructured":"A. Oprea, Z. Li, T.F. Yen, S.H. Chin, S. Alrwais, Detection of early-stage enterprise infection by mining large-scale log data, Dependable Systems and Networks (DSN), 2015 45th Annual IEEE\/IFIP International Conference on (IEEE, 2015), pp. 45\u201356","DOI":"10.1109\/DSN.2015.14"},{"key":"1430_CR8","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.compind.2018.01.018","volume":"97","author":"N Nagashree","year":"2018","unstructured":"N. Nagashree, R. Tejasvi, K.C. Swathi, An early risk detection and management system for the cloud with log parser. Comput. Ind. 97, 24\u201333 (2018)","journal-title":"Comput. Ind."},{"key":"1430_CR9","first-page":"1","volume":"2018","author":"D Kim","year":"2018","unstructured":"D. Kim, D. Shin, D. Shin, Y.H. Kim, Attack detection application with attack tree for mobile system using log analysis. Mob Netw App. 2018, 1\u20139 (2018)","journal-title":"Mob Netw App."},{"key":"1430_CR10","volume-title":"Proc. USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"K Nagaraj","year":"2012","unstructured":"K. Nagaraj, C. Killian, J. Neville, in Proc. USENIX Symposium on Networked Systems Design and Implementation (NSDI). Structured comparative analysis of systems logs to diagnose performance problems (2012)"},{"key":"1430_CR11","unstructured":"W. Xu, L. Huang, A. Fox, D. Patterson, M.I. Jordan, in Proc. ACM Symposium on Operating Systems Principles (SOSP). Detecting large-scale system problems by mining console logs 2009, 117\u2013132 (2009)"},{"issue":"11","key":"1430_CR12","doi-asserted-by":"publisher","first-page":"1921","DOI":"10.1109\/TKDE.2011.138","volume":"24","author":"A Makanju","year":"2012","unstructured":"A. Makanju, A.N. Zincir-Heywood, E.E. Milios, A lightweight algorithm for message type extraction in system application logs. IEEE Trans. Knowl. Data Eng. 24(11), 1921\u20131936 (2012)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"1430_CR13","doi-asserted-by":"crossref","unstructured":"M. Du, F. Li, Spell: streaming parsing of system event logs. Data Mining (ICDM), 2016 IEEE 16th International Conference on IEEE, 859\u2013864 (2016)","DOI":"10.1109\/ICDM.2016.0103"},{"key":"1430_CR14","doi-asserted-by":"crossref","unstructured":"P. He, J. Zhu, Z. Zheng, M.R. Lyu, Drain: an online log parsing approach with fixed depth tree. Web Services (ICWS), 2017 IEEE International Conference on IEEE, 33\u201340 (2017)","DOI":"10.1109\/ICWS.2017.13"},{"key":"1430_CR15","doi-asserted-by":"crossref","unstructured":"L. Tang, T. Li, in 2010 IEEE International Conference on Data Mining. LogTree: a framework for generating system events from raw textual logs (IEEE, 2010), pp. 491\u2013500","DOI":"10.1109\/ICDM.2010.76"},{"key":"1430_CR16","unstructured":"R. Vaarandi, A Data Clustering Algorithm for Mining Patterns From Event Logs, IP Operations & Management, 2003.(IPOM 2003). 3rd IEEE Workshop on. IEEE, 2003: 119\u2013126"},{"key":"1430_CR17","unstructured":"X. Ning, G. Jiang, H. Chen, K. Yoshihira, HLAer: a System for Heterogeneous Log Analysis (Sdm, 2014), pp. 1\u201322"},{"key":"1430_CR18","doi-asserted-by":"crossref","unstructured":"L. Tang, T. Li, C.-S. Perng, LogSig: generating system events from raw textual logs. Proceedings of the 20th ACM International Conference on Information and Knowledge Management ACM, 785\u2013794 (2011)","DOI":"10.1145\/2063576.2063690"},{"key":"1430_CR19","doi-asserted-by":"crossref","unstructured":"I. Beschastnikh, Y. Brun, M.D. Ernst, A. Krishnamurthy, Inferring models of concurrent systems from logs of their behavior with CSight, Proceedings of the 36th International Conference on Software Engineering (ACM, 2014), pp. 468\u2013479","DOI":"10.1145\/2568225.2568246"},{"key":"1430_CR20","doi-asserted-by":"crossref","unstructured":"Q. Fu, J.-G. Lou, Y. Wang, J. Li, Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis, Data Mining, 2009. ICDM'09, Ninth IEEE International Conference on (IEEE, 2009), pp. 149\u2013158","DOI":"10.1109\/ICDM.2009.60"},{"key":"1430_CR21","volume-title":"Preserving Privacy through Log Analysis in Health Information Systems","author":"C Wickramage","year":"2017","unstructured":"C. Wickramage, C. Fidge, T. Sahama, A. Daly, R. Wong, Preserving Privacy through Log Analysis in Health Information Systems (2017)"},{"key":"1430_CR22","doi-asserted-by":"crossref","unstructured":"Q. Xu, M. Li, M. Yu, Learning to rank with relational graph and pointwise constraint for cross-modal retrieval. Soft. Comput., 1\u201315 (2018)","DOI":"10.1007\/s00500-018-3608-9"},{"key":"1430_CR23","first-page":"e4892","volume-title":"Concurrency and Computation: Practice and Experience","author":"S Liu","year":"2015","unstructured":"S. Liu, M. Li, M. Li, Q. Xu, in Concurrency and Computation: Practice and Experience. Research of animals image semantic segmentation based on deep learning (2015), p. e4892"},{"key":"1430_CR24","doi-asserted-by":"crossref","unstructured":"Moh, M., Pininti, S., Doddapaneni, S., & Moh, T. S. Detecting web attacks using multi-stage log analysis[C]\/\/Advanced Computing (IACC), 2016 IEEE 6th International Conference on. IEEE, 2016: 733\u2013738","DOI":"10.1109\/IACC.2016.141"},{"key":"1430_CR25","unstructured":"Q. Xu, M. Li, A new cluster computing technique for social media data analysis. Clust. Comput., 1\u20138 (2017)"},{"key":"1430_CR26","doi-asserted-by":"publisher","first-page":"5534","DOI":"10.1016\/j.jde.2017.02.010","volume":"262","author":"W Peihe","year":"2017","unstructured":"W. Peihe, Z. Dekai, Convexity of level sets of minimal graph on space form with nonnegative curvature. J Diff Equ. 262, 5534\u20135564 (2017)","journal-title":"J Diff Equ."},{"issue":"2","key":"1430_CR27","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1109\/TETC.2016.2520883","volume":"4","author":"D Sun","year":"2016","unstructured":"D. Sun, M. Fu, L. Zhu, G. Li, Q. Lu, Non-intrusive anomaly detection with streaming performance metrics and logs for DevOps in public clouds: a case study in AWS. IEEE Trans. Emerg. Top. Comput. 4(2), 278\u2013289 (2016)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"issue":"5","key":"1430_CR28","doi-asserted-by":"publisher","first-page":"6311","DOI":"10.1007\/s11042-017-4537-9","volume":"77","author":"Q Xu","year":"2018","unstructured":"Q. Xu, Z. Wang, F. Wang, J. Li, Thermal comfort research on human CT data modeling. Multimed. Tools Appl. 77(5), 6311\u20136326 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"1430_CR29","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/978-3-662-46578-3_53","volume-title":"Information Science and Applications","author":"J Breier","year":"2015","unstructured":"J. Breier, J. Brani\u0161ov\u00e1, in Information Science and Applications. Anomaly detection from log files using data mining techniques (Springer, Berlin, Heidelberg, 2015), pp. 449\u2013457"},{"key":"1430_CR30","unstructured":"Tuor, A., Kaplan, S., Hutchinson, B., Nichols, N., & Robinson, S. Deep learning for unsupervised insider threat detection in structured cybersecurity data streams. arXiv preprint arXiv:1710.00811, (2017), pp. 224\u2013231"},{"issue":"3","key":"1430_CR31","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s10916-018-0904-y","volume":"42","author":"Q Xu","year":"2018","unstructured":"Q. Xu, M. Li, M. Li, S. Liu, Energy spectrum CT image detection based dimensionality reduction with phase congruency. J Med Syst. 42(3), 49 (2018)","journal-title":"J Med Syst."},{"key":"1430_CR32","volume-title":"An Online Hierarchical Algorithm for Extreme Clustering","author":"A Kobren","year":"2017","unstructured":"Kobren, A., Monath, N., Krishnamurthy, A., & McCallum, A. (2017). An Online Hierarchical Algorithm for Extreme Clustering. arXiv preprint arXiv:1704.01858"},{"key":"1430_CR33","volume-title":"Tools and Benchmarks for Automated Log Parsing","author":"J Zhu","year":"2018","unstructured":"Zhu, J., He, S., Liu, J., He, P., Xie, Q., Zheng, Z., & Lyu, M. R. (2018). Tools and Benchmarks for Automated Log Parsing. arXiv preprint arXiv:1811.03509"},{"issue":"6","key":"1430_CR34","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1109\/TDSC.2017.2762673","volume":"15","author":"P He","year":"2018","unstructured":"P. He, J. Zhu, S. He, J. Li, M.R. Lyu, Towards automated log parsing for large-scale log data analysis. IEEE Trans Dependable Secure Comput. 15(6), 931\u2013944 (2018)","journal-title":"IEEE Trans Dependable Secure Comput."},{"key":"1430_CR35","doi-asserted-by":"crossref","unstructured":"P. He, J. Zhu, S. He, J. Li, M.R. Lyu, An Evaluation Study on Log Parsing and Its Use in Log Mining, 2016 46th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN) (IEEE, 2016), pp. 654\u2013661","DOI":"10.1109\/DSN.2016.66"},{"key":"1430_CR36","doi-asserted-by":"crossref","unstructured":"K.a. Heller, Z. Ghahramani, in Proceedings of the 22nd International Conference on Machine Learning. Bayesian hierarchical clustering (ACM, 2005), pp. 297\u2013304","DOI":"10.1145\/1102351.1102389"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1430-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-019-1430-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1430-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,26]],"date-time":"2020-05-26T23:08:16Z","timestamp":1590534496000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-019-1430-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,28]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["1430"],"URL":"https:\/\/doi.org\/10.1186\/s13638-019-1430-4","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,28]]},"assertion":[{"value":"19 February 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 May 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"135"}}