共 42 条
- [1] Bojanowski P., 2017, Transactions of the Association for Computational Linguistics, V5, P135, DOI 10.1162/tacl_a_00051
- [2] Detecting network cyber-attacks using an integrated statistical approach [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (02): : 1435 - 1453
- [3] LogTransfer: Cross-System Log Anomaly Detection for Software Systems with Transfer Learning [J]. 2020 IEEE 31ST INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE 2020), 2020, : 37 - 47
- [4] Devlin J, 2019, 2019 CONFERENCE OF THE NORTH AMERICAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS: HUMAN LANGUAGE TECHNOLOGIES (NAACL HLT 2019), VOL. 1, P4171
- [5] DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1285 - 1298
- [6] Du M, 2016, IEEE DATA MINING, P859, DOI [10.1109/ICDM.2016.0103, 10.1109/ICDM.2016.160]
- [8] Drain: An Online Log Parsing Approach with Fixed Depth Tree [J]. 2017 IEEE 24TH INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2017), 2017, : 33 - 40
- [9] Identifying Impactful Service System Problems via Log Analysis [J]. ESEC/FSE'18: PROCEEDINGS OF THE 2018 26TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, 2018, : 60 - 70
- [10] Experience Report: System Log Analysis for Anomaly Detection [J]. 2016 IEEE 27TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2016, : 207 - 218