On vulnerability and security log analysis: A systematic literature review on recent trends

J Svacina, J Raffety, C Woodahl, B Stone… - Proceedings of the …, 2020 - dl.acm.org
Log analysis is a technique of deriving knowledge from log files containing records of events
in a computer system. A common application of log analysis is to derive critical information …

Landscape of automated log analysis: A systematic literature review and map** study

Ł Korzeniowski, K Goczyła - IEEE Access, 2022 - ieeexplore.ieee.org
Logging is a common practice in software engineering to provide insights into working
systems. The main uses of log files have always been failure identification and root cause …

System log parsing: A survey

T Zhang, H Qiu, G Castellano, M Rifai… - … on Knowledge and …, 2023 - ieeexplore.ieee.org
Modern information and communication systems have become increasingly challenging to
manage. The ubiquitous system logs contain plentiful information and are thus widely …

Context-aware learning for anomaly detection with imbalanced log data

P Sun, E Yuepeng, T Li, Y Wu, J Ge… - 2020 IEEE 22nd …, 2020 - ieeexplore.ieee.org
Logs are used to record runtime states and significant events for a software system. They are
widely used for anomaly detection. Logs produced by most of the real-world systems show …

Uncovering latency anomalies in 5G RAN-A combination learner approach

T Sundqvist, M Bhuyan… - 2022 14th International …, 2022 - ieeexplore.ieee.org
The fifth generation (5G) RAN is a complex system consisting of virtualized and distributed
parts with many concurrent threads interacting. Several services are time critical, and it is …

Incremental anomaly detection with guarantee in the internet of medical things

X Ji, H Choi, O Sokolsky, I Lee - Proceedings of the 8th ACM/IEEE …, 2023 - dl.acm.org
The Internet of Medical Things (IoMT), aided by learning-enabled components, is becoming
increasingly important in health monitoring. However, the IoMT-based system must be highly …

TAElog: A Novel Transformer AutoEncoder-Based Log Anomaly Detection Method

C Zhao, K Huang, D Wu, X Han, D Du, Y Zhou… - … on Information Security …, 2023 - Springer
Log anomaly detection serves as an effective approach for identifying threats. Autoencoder-
based detection methods address positive and negative sample imbalance issues and have …

Latent semantics approach for network log analysis: modeling and its application

K Otomo, S Kobayashi, K Fukuda… - 2021 IFIP/IEEE …, 2021 - ieeexplore.ieee.org
Network log analysis helps network operators to troubleshoot their network. Many
mathematical analysis methods rely on a set of time series corresponding to log type (log …

A Review of Software Testing Process Log Parsing and Mining

KH Xue, Q Han, S Han, ZC Shi… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
The substantial log data present in software testing processes are often the primary and
sometimes the sole source of information for test engineers to understand and debug …

TPLAD: Template-Parsed Log Anomaly Detection for Electrical Database Systems

H Li, X Peng, D Wang, S An, C Zhang… - International Journal of …, 2024 - World Scientific
In recent years, with the increasing complexity of software systems, logs have become
crucial for system maintenance. Log-based anomaly detection plays a vital role in …