共 31 条
[1]
Brown TB, 2020, ADV NEURAL INFORM PR, DOI [DOI 10.18653/V1/2021.MRL-1.1, DOI 10.48550/ARXIV.2005.14165]
[2]
Devlin J, 2019, 2019 CONFERENCE OF THE NORTH AMERICAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS: HUMAN LANGUAGE TECHNOLOGIES (NAACL HLT 2019), VOL. 1, P4171
[3]
Du M, 2016, IEEE DATA MINING, P859, DOI [10.1109/ICDM.2016.160, 10.1109/ICDM.2016.0103]
[4]
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
[J].
2009 9TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING,
2009,
:149-+
[7]
Huo YT, 2021, Arxiv, DOI arXiv:2112.12636
[8]
Augmenting Log-based Anomaly Detection Models to Reduce False Anomalies with Human Feedback
[J].
PROCEEDINGS OF THE 28TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, KDD 2022,
2022,
:3081-3089
[9]
Jia ZP, 2017, IEEE INT CON AUTO SC, P1136, DOI 10.1109/COASE.2017.8256257
[10]
Log-based Anomaly Detection with Deep Learning: How Far Are We?
[J].
2022 ACM/IEEE 44TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2022),
2022,
:1356-1367