共 15 条
[1]
[Anonymous], 2008, WORKSH TACKL COMP PR
[2]
Bosch Jan, 2017, SPEED DAT EC EXC SOF
[3]
Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection
[J].
PROCEEDINGS OF THE 1ST WORKSHOP ON MACHINE LEARNING FOR COMPUTING SYSTEMS (MLCS 2018),
2018,
[5]
DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1285-1298
[6]
Du M, 2016, IEEE DATA MINING, P859, DOI [10.1109/ICDM.2016.160, 10.1109/ICDM.2016.0103]
[7]
Gunther C. W., 2014, XES STANDARD DEFINIT, DOI [10.1111/j.1477-2574.2011.00330.x, DOI 10.1111/J.1477-2574.2011.00330.X]
[8]
Drain: An Online Log Parsing Approach with Fixed Depth Tree
[J].
2017 IEEE 24TH INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2017),
2017,
:33-40
[9]
Lou J.G., 2010, P 16 ACM SIGKDD INT, P613, DOI DOI 10.1145/1835804.1835883
[10]
A Search-based Approach for Accurate Identification of Log Message Formats
[J].
2018 IEEE/ACM 26TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION (ICPC 2018),
2018,
:167-177