共 50 条
- [1] ADOps: An Anomaly Detection Pipeline in Structured Logs [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2023, 16 (12): : 4050 - 4053
- [2] Anomaly Detection on Event Logs with a Scarcity of Labels [J]. 2020 2ND INTERNATIONAL CONFERENCE ON PROCESS MINING (ICPM 2020), 2020, : 161 - 168
- [4] Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining [J]. FOUNDATIONS OF INTELLIGENT SYSTEMS, PROCEEDINGS, 2009, 5722 : 442 - +
- [5] How to Configure Masked Event Anomaly Detection on Software Logs? [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2022), 2022, : 414 - 418
- [7] A Systematic Review of Anomaly Detection for Business Process Event Logs [J]. Business & Information Systems Engineering, 2023, 65 : 441 - 462
- [8] Self-Attentive Classification-Based Anomaly Detection in Unstructured Logs [J]. 20TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM 2020), 2020, : 1196 - 1201
- [9] A Survey of Deep Anomaly Detection for System Logs [J]. 2022 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2022,
- [10] System anomaly detection: Mining firewall logs [J]. 2006 SECURECOMM AND WORKSHOPS, 2006, : 389 - +