1 |
廖湘科, 李姗姗, 董威, 等. 大规模软件系统日志研究综述[J]. 软件学报, 2016, 27(8): 1934-1947.
|
|
LIAO X K, LI S S, DONG W, et al. Survey on log research of large scale software system[J]. Journal of Software, 2016, 27(8): 1934-1947.
|
2 |
FU Q, LOU J G, LIN Q W, et al. Contextual analysis of program logs for understanding system behaviors[C]//Proceedings of the 2013 10th Working Conference on Mining Software Repositories (MSR). Piscataway: IEEE Press, 2013: 397-400.
|
3 |
CHOW M, MEISNER D, FLINN J, et al. The mystery machine: end-to-end performance analysis of large-scale internet services[C]//Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14). Berkeley: USENIX Association, 2014: 217-231.
|
4 |
AIT E H M, KHOUMSI A, BENKAOUZ Y, et al. Efficient security policy management using suspicious rules through access log analysis[M]. Belin: Springer, 2019.
|
5 |
CINQUE M, COTRONEO D, PECCHIA A. Event logs for the analysis of software failures: a rule-based approach[J]. IEEE Transactions on Software Engineering, 2013, 39(6): 806-821.
|
6 |
PREWETT J E. Analyzing cluster log files using logsurfer[C]//Proceedings of the 4th Annual Conference on Linux Clusters. PA: Citeseer, 2003: 1-12.
|
7 |
ROUILLARD J P. Refereed papers: real-time log file analysis using the simple event correlator (SEC)[C]//Proceedings of the 18th USENIX Conference on System Administration. Berkeley: USENIX Association, 2004: 133-150.
|
8 |
LIN Q W, ZHANG H Y, LOU J G, et al. Log clustering based problem identification for online service systems[C]//Proceedings of the 2016 IEEE/ACM 38th International Conference on Software Engineering Companion (ICSE-C). Piscataway: IEEE Press, 2016: 102-111.
|
9 |
MI H B, WANG H M, ZHOU Y F, et al. Toward fine-grained, unsupervised, scalable performance diagnosis for production cloud computing systems[J]. IEEE Transactions on Parallel and Distributed Systems, 2013, 24(6): 1245-1255.
|
10 |
ZHAO X Q, JIANG Z Y, MA J F. A survey of deep anomaly detection for system logs[C]//Proceedings of the 2022 International Joint Conference on Neural Networks (IJCNN). Piscataway: IEEE Press, 2022: 1-8.
|
11 |
HARDY S, HENECKA W, IVEY-LAW H, et al. Private federated learning on vertically par- titioned data via entity resolution and additively homomorphic encryption[J]. arXiv Preprint, arXiv:, 2017.
|
12 |
DI S, GUO H Q, PERSHEY E, et al. Characterizing and understanding HPC job failures over the 2K-day life of IBM BlueGene/Q system[C]//Proceedings of the 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Piscataway: IEEE Press, 2019: 473-484.
|
13 |
XU W, HUANG L, FOX A, et al. Detecting large-scale system problems by mining console logs[C]//Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles. New York: ACM Press, 2009: 117-132.
|
14 |
NAGAPPAN M, WU K S, VOUK M A. Efficiently extracting operational profiles from execution logs using suffix arrays[C]//Proceedings of the 20th International Symposium on Software Reliability Engineering. Piscataway: IEEE Press, 2009: 41-50.
|
15 |
VAARANDI R. A data clustering algorithm for mining patterns from event logs[C]//Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM 2003). Piscataway: IEEE Press, 2003: 119-126.
|
16 |
NAGAPPAN M, VOUK M A. Abstracting log lines to log event types for mining software system logs[C]//Proceedings of the 7th IEEE Working Conference on Mining Software Repositories (MSR 2010). Piscataway: IEEE Press, 2010: 114-117.
|
17 |
VAARANDI R, PIHELGAS M. LogCluster - A data clustering and pattern mining algorithm for event logs[C]//Proceedings of the 11th International Conference on Network and Service Management (CNSM). Piscataway: IEEE Press, 2015: 1-7.
|
18 |
DAI H, LI H, CHEN C S, et al. Logram: e?icient log parsing using n-Gram dictionaries[J]. IEEE Transactions on Software Engineering, 2020,47(12):2803-2822.
|
19 |
FU Q, LOU J G, WANG Y, et al. Execution anomaly detection in distributed systems through unstructured log analysis[C]//Proceedings of the 2009 Ninth IEEE International Conference on Data Mining. Piscataway: IEEE Press, 2009: 149-158.
|
20 |
TANG L, LI T, PERNG C S. LogSig: generating system events from raw textual logs[C]//Proceedings of the 20th ACM international conference on Information and knowledge management. New York: ACM Press, 2011: 785-794.
|
21 |
HAMOONI H, DEBNATH B, XU J W, et al. LogMine: fast pattern recognition for log analytics[C]//Proceedings of the Proceedings of the 25th ACM International on Conference on Information and Knowledge Management. New York: ACM Press, 2016: 1573-1582.
|
22 |
MIZUTANI M. Incremental mining of system log format[C]//Proceedings of the 2013 IEEE International Conference on Services Computing. Piscataway: IEEE Press, 2013: 595-602.
|
23 |
SHIMA K. Length matters: Clustering system log messages using length of words[J]. arXiv Preprint, arXiv:, 2016.
|
24 |
DU M, LI F F. SPELL: streaming parsing of system event logs[C]//Proceedings of the 2016 IEEE 16th International Conference on Data Mining (ICDM). Piscataway: IEEE Press, 2016: 859-864.
|
25 |
MESSAOUDI S, PANICHELLA A, BIANCULLI D, et al. A search-based approach for accurate identification of log message formats[C]//Proceedings of the 26th Conference on Program Comprehension. Piscataway: IEEE Press, 2018: 167-177.
|
26 |
DEB K, PRATAP A, AGARWAL S, et al. A fast and elitist multiobjective genetic algorithm: NSGA-II[J]. IEEE Transactions on Evolutionary Computation, 2002, 6(2): 182-197.
|
27 |
MENG W B, LIU Y, ZAITER F, et al. LogParse: making log parsing adaptive through word classification[C]//Proceedings of the 29th International Conference on Computer Communications and Networks (ICCCN). Piscataway: IEEE Press, 2020: 1-9.
|
28 |
JIANG Z M, HASSAN A E, FLORA P, et al. Abstracting execution logs to execution events for enterprise applications (short paper)[C]//Proceedings of the 8th International Conference on Quality Software. Piscataway: IEEE Press, 2008: 181-186.
|
29 |
MAKANJU A, ZINCIR-HEYWOOD A N, MILIOS E E. A lightweight algorithm for message type extraction in system application logs[J]. IEEE Transactions on Knowledge and Data Engineering, 2012, 24(11): 1921-1936.
|
30 |
HE P J, ZHU J M, ZHENG Z B, et al. Drain: an online log parsing approach with fixed depth tree[C]//Proceedings of the 2017 IEEE International Conference on Web Services (ICWS). Piscataway: IEEE Press, 2017: 33-40.
|
31 |
HE P J, ZHU J M, HE S L, et al. An evaluation study on log parsing and its use in log mining[C]//Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Piscataway: IEEE Press, 2016: 654-661.
|
32 |
ZHU J M, HE S L, LIU J Y, et al. Tools and benchmarks for automated log parsing[C]//Proceedings of the 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). Piscataway: IEEE Press, 2019: 121-130.
|