{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T20:13:01Z","timestamp":1774555981223,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,2,7]],"date-time":"2021-02-07T00:00:00Z","timestamp":1612656000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,2,7]],"date-time":"2021-02-07T00:00:00Z","timestamp":1612656000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,2,7]]},"DOI":"10.23919\/icact51234.2021.9370654","type":"proceedings-article","created":{"date-parts":[[2021,3,10]],"date-time":"2021-03-10T16:59:49Z","timestamp":1615395589000},"page":"312-318","source":"Crossref","is-referenced-by-count":3,"title":["An Extensible Parsing Pipeline for Unstructured Data Processing"],"prefix":"10.23919","author":[{"given":"Shubham","family":"Jain","sequence":"first","affiliation":[{"name":"Software Research Institute, Athlone Institute of Technology,Athlone,Ireland"}]},{"given":"Amy","family":"de Buitl\u00e9ir","sequence":"additional","affiliation":[{"name":"Network Management Lab,Ericsson,Athlone,Ireland"}]},{"given":"Enda","family":"Fallon","sequence":"additional","affiliation":[{"name":"Software Research Institute, Athlone Institute of Technology,Athlone,Ireland"}]}],"member":"263","reference":[{"key":"ref10","author":"suh-lee","year":"2016","journal-title":"Mining unstructured log messages for security threat detection"},{"key":"ref11","author":"li","year":"2013","journal-title":"Automatic log analysis using machine learning awesome automatic log analysis version 2 0"},{"key":"ref12","article-title":"A statistical interpretation of term specificity and its application in retrieval","author":"jones","year":"2004","journal-title":"Journal of Documentation"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1102351.1102399"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/BF00337288"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/3477.764879"},{"key":"ref16","first-page":"707","article-title":"Binary Codes Capable of Correcting Deletions, Insertions and Reversals","volume":"10","author":"levenshtein","year":"1966","journal-title":"Soviet Physics Doklady"},{"key":"ref17","first-page":"886","author":"zepeda-mendoza","year":"2013","journal-title":"Agglomerative Hierarchical Clustering"},{"key":"ref18","first-page":"1","article-title":"Unsupervised noise detection in unstructured data for automatic parsing","author":"jain","year":"0","journal-title":"16th International Conference on Network and Service Management (CNSM 2010)"},{"key":"ref19","author":"schmidt","year":"0","journal-title":"2017 R package version 3 0 4"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.21"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ESCI48226.2020.9167588"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.60"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606586"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46027-6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IPOM.2003.1251233"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/500737.500757"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00200"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063690"},{"key":"ref20","first-page":"45","article-title":"Software Framework for Topic Modelling with Large Corpora","author":"?eh??ek","year":"2010","journal-title":"Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks"},{"key":"ref22","year":"0","journal-title":"networktocode\/ntc-templates"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1111\/j.1469-1809.1936.tb02137.x","article-title":"The use of multiple measurements in taxonomic problems","volume":"7","author":"fisher","year":"1936","journal-title":"Annals of Eugenics"}],"event":{"name":"2021 23rd International Conference on Advanced Communication Technology (ICACT)","location":"PyeongChang, Korea (South)","start":{"date-parts":[[2021,2,7]]},"end":{"date-parts":[[2021,2,10]]}},"container-title":["2021 23rd International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9370342\/9370365\/09370654.pdf?arnumber=9370654","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T19:48:51Z","timestamp":1774554531000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9370654\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,7]]},"references-count":22,"URL":"https:\/\/doi.org\/10.23919\/icact51234.2021.9370654","relation":{},"subject":[],"published":{"date-parts":[[2021,2,7]]}}}