{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T22:05:56Z","timestamp":1761170756097,"version":"build-2065373602"},"reference-count":0,"publisher":"KSI Research Inc.","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,29]]},"DOI":"10.18293\/seke2025-122","type":"proceedings-article","created":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T02:35:52Z","timestamp":1761100552000},"page":"171-174","source":"Crossref","is-referenced-by-count":0,"title":["DualATLog: Dual-mode Anomaly Transformer-based Log Anomaly Detection Framework for Securing Software Systems (S)"],"prefix":"10.18293","volume":"2025","author":[{"given":"Qinxuan","family":"Shi","sequence":"first","affiliation":[]},{"given":"Zhanglong","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Sicong","family":"Shao","sequence":"additional","affiliation":[]}],"member":"7672","published-online":{"date-parts":[[2025,9,29]]},"event":{"name":"The 37th International Conference on Software Engineering and Knowledge Engineering","acronym":"SEKE2025"},"container-title":["International Conferences on Software Engineering and Knowledge Engineering","Proceedings of the 37th International Conference on Software Engineering and Knowledge Engineering"],"original-title":[],"deposited":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T02:56:49Z","timestamp":1761101809000},"score":1,"resource":{"primary":{"URL":"http:\/\/ksiresearchorg.ipage.com\/seke\/seke25paper\/paper122.pdf"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,29]]},"references-count":0,"URL":"https:\/\/doi.org\/10.18293\/seke2025-122","relation":{},"ISSN":["2325-9000"],"issn-type":[{"value":"2325-9000","type":"print"}],"subject":[],"published":{"date-parts":[[2025,9,29]]}}}