Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[PDF][PDF] Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation.
Concept drift is one of the most frustrating challenges for learning-based security
applications built on the closeworld assumption of identical distribution between training and …
applications built on the closeworld assumption of identical distribution between training and …
Landscape of automated log analysis: A systematic literature review and map** study
Ł Korzeniowski, K Goczyła - IEEE Access, 2022 - ieeexplore.ieee.org
Logging is a common practice in software engineering to provide insights into working
systems. The main uses of log files have always been failure identification and root cause …
systems. The main uses of log files have always been failure identification and root cause …
On the effectiveness of log representation for log-based anomaly detection
Logs are an essential source of information for people to understand the running status of a
software system. Due to the evolving modern software architecture and maintenance …
software system. Due to the evolving modern software architecture and maintenance …
Logstamp: Automatic online log parsing based on sequence labelling
Logs are one of the most critical data for service management. It contains rich runtime
information for both services and users. Since size of logs are often enormous in size and …
information for both services and users. Since size of logs are often enormous in size and …
Putracead: Trace anomaly detection with partial labels based on gnn and pu learning
Distributed tracing has been an important part of microservice infrastructure and learning-
based trace analysis has been used to detect anomalies in microservice systems. Existing …
based trace analysis has been used to detect anomalies in microservice systems. Existing …
Semi-supervised and unsupervised anomaly detection by mining numerical workflow relations from system logs
Large-scale software-intensive systems often generate logs for troubleshooting purpose.
The system logs are semi-structured text messages that record the internal status of a …
The system logs are semi-structured text messages that record the internal status of a …
Evlog: Identifying anomalous logs over software evolution
Software logs record system activities, aiding maintainers in identifying the underlying
causes for failures and enabling prompt mitigation actions. However, maintainers need to …
causes for failures and enabling prompt mitigation actions. However, maintainers need to …
Logonline: A semi-supervised log-based anomaly detector aided with online learning mechanism
Logs are prevalent in modern cloud systems and serve as a valuable source of information
for system maintenance. Over the years, a lot of research and industrial efforts have been …
for system maintenance. Over the years, a lot of research and industrial efforts have been …
Logst: Log semi-supervised anomaly detection based on sentence-bert
M Zhang, J Chen, J Liu, J Wang, R Shi… - 2022 7th International …, 2022 - ieeexplore.ieee.org
Semantics extraction is a very important part in the field of log anomaly detection, how to
accurately obtain the semantics representation of log events will have a direct impact on the …
accurately obtain the semantics representation of log events will have a direct impact on the …
Literature review on log anomaly detection approaches utilizing online parsing methodology
The use of anomaly detection for log monitoring requires parsing model input features from
raw, unstructured data. Log parsing methods come in many forms, but are generally …
raw, unstructured data. Log parsing methods come in many forms, but are generally …