On vulnerability and security log analysis: A systematic literature review on recent trends
J Svacina, J Raffety, C Woodahl, B Stone… - Proceedings of the …, 2020 - dl.acm.org
Log analysis is a technique of deriving knowledge from log files containing records of events
in a computer system. A common application of log analysis is to derive critical information …
in a computer system. A common application of log analysis is to derive critical information …
Landscape of automated log analysis: A systematic literature review and map** study
Ł Korzeniowski, K Goczyła - IEEE Access, 2022 - ieeexplore.ieee.org
Logging is a common practice in software engineering to provide insights into working
systems. The main uses of log files have always been failure identification and root cause …
systems. The main uses of log files have always been failure identification and root cause …
System log parsing: A survey
Modern information and communication systems have become increasingly challenging to
manage. The ubiquitous system logs contain plentiful information and are thus widely …
manage. The ubiquitous system logs contain plentiful information and are thus widely …
Context-aware learning for anomaly detection with imbalanced log data
P Sun, E Yuepeng, T Li, Y Wu, J Ge… - 2020 IEEE 22nd …, 2020 - ieeexplore.ieee.org
Logs are used to record runtime states and significant events for a software system. They are
widely used for anomaly detection. Logs produced by most of the real-world systems show …
widely used for anomaly detection. Logs produced by most of the real-world systems show …
Uncovering latency anomalies in 5G RAN-A combination learner approach
The fifth generation (5G) RAN is a complex system consisting of virtualized and distributed
parts with many concurrent threads interacting. Several services are time critical, and it is …
parts with many concurrent threads interacting. Several services are time critical, and it is …
Incremental anomaly detection with guarantee in the internet of medical things
The Internet of Medical Things (IoMT), aided by learning-enabled components, is becoming
increasingly important in health monitoring. However, the IoMT-based system must be highly …
increasingly important in health monitoring. However, the IoMT-based system must be highly …
TAElog: A Novel Transformer AutoEncoder-Based Log Anomaly Detection Method
Log anomaly detection serves as an effective approach for identifying threats. Autoencoder-
based detection methods address positive and negative sample imbalance issues and have …
based detection methods address positive and negative sample imbalance issues and have …
Latent semantics approach for network log analysis: modeling and its application
Network log analysis helps network operators to troubleshoot their network. Many
mathematical analysis methods rely on a set of time series corresponding to log type (log …
mathematical analysis methods rely on a set of time series corresponding to log type (log …
A Review of Software Testing Process Log Parsing and Mining
KH Xue, Q Han, S Han, ZC Shi… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
The substantial log data present in software testing processes are often the primary and
sometimes the sole source of information for test engineers to understand and debug …
sometimes the sole source of information for test engineers to understand and debug …
TPLAD: Template-Parsed Log Anomaly Detection for Electrical Database Systems
H Li, X Peng, D Wang, S An, C Zhang… - International Journal of …, 2024 - World Scientific
In recent years, with the increasing complexity of software systems, logs have become
crucial for system maintenance. Log-based anomaly detection plays a vital role in …
crucial for system maintenance. Log-based anomaly detection plays a vital role in …