{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T20:48:56Z","timestamp":1774558136794,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,2,13]],"date-time":"2022-02-13T00:00:00Z","timestamp":1644710400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,2,13]],"date-time":"2022-02-13T00:00:00Z","timestamp":1644710400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002081","name":"Irish Research Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002081","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,2,13]]},"DOI":"10.23919\/icact53585.2022.9728823","type":"proceedings-article","created":{"date-parts":[[2022,3,11]],"date-time":"2022-03-11T15:27:02Z","timestamp":1647012422000},"page":"312-318","source":"Crossref","is-referenced-by-count":1,"title":["An Extensible Parsing Pipeline for Unstructured Data Processing"],"prefix":"10.23919","author":[{"given":"Shubham","family":"Jain","sequence":"first","affiliation":[{"name":"Software Research Institute, Athlone Institute of Technology,Athlone,Ireland"}]},{"given":"Amy de","family":"Buitl\u00e9ir","sequence":"additional","affiliation":[{"name":"Network Management Lab, Ericsson,Athlone,Ireland"}]},{"given":"Enda","family":"Fallon","sequence":"additional","affiliation":[{"name":"Software Research Institute, Athlone Institute of Technology,Athlone,Ireland"}]}],"member":"263","reference":[{"key":"ref10","author":"suh-lee","year":"2016","journal-title":"Mining unstructured log messages for security threat detection"},{"key":"ref11","author":"li","year":"2013","journal-title":"Automatic log analysis using machine learning awesome automatic log analysis version 2 0"},{"key":"ref12","article-title":"A statistical interpretation of term specificity and its application in retrieval","author":"jones","year":"2004","journal-title":"Journal of Documentation"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1102351.1102399"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/BF00337288"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/3477.764879"},{"key":"ref16","first-page":"707","article-title":"Binary Codes Capable of Correcting Deletions, Insertions and Reversals","volume":"10","author":"levenshtein","year":"1966","journal-title":"Soviet Physics Doklady"},{"key":"ref17","first-page":"886","author":"zepeda-mendoza","year":"2013","journal-title":"Agglomerative Hierarchical Clustering"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM50824.2020.9269096"},{"key":"ref19","article-title":"ngram: Fast n-gram tokenization","author":"schmidt","year":"0","journal-title":"2017 R package version 3 0 4"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.21"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ESCI48226.2020.9167588"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.60"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606586"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46027-6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IPOM.2003.1251233"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/500737.500757"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00200"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063690"},{"key":"ref20","first-page":"45","article-title":"Software Framework for Topic Modelling with Large Corpora","author":"reh\u00fb?ek","year":"2010","journal-title":"Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks"},{"key":"ref22","year":"0","journal-title":"networktocode\/ntc-templates"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1111\/j.1469-1809.1936.tb02137.x","article-title":"The use of multiple measurements in taxonomic problems","volume":"7","author":"fisher","year":"1936","journal-title":"Annals of Eugenics"}],"event":{"name":"2022 24th International Conference on Advanced Communication Technology (ICACT)","location":"PyeongChang Kwangwoon_Do, Korea, Republic of","start":{"date-parts":[[2022,2,13]]},"end":{"date-parts":[[2022,2,16]]}},"container-title":["2022 24th International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9728250\/9728768\/09728823.pdf?arnumber=9728823","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T19:48:52Z","timestamp":1774554532000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9728823\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,13]]},"references-count":22,"URL":"https:\/\/doi.org\/10.23919\/icact53585.2022.9728823","relation":{},"subject":[],"published":{"date-parts":[[2022,2,13]]}}}