Log-based anomaly detection with robust feature extraction and online learning

S Han, Q Wu, H Zhang, B Qin, J Hu… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Cloud technology has brought great convenience to enterprises as well as customers.
System logs record notable events and are becoming valuable resources to track and …

Blockchain-driven anomaly detection framework on edge intelligence

X Xie, Y Fang, Z Jian, Y Lu, T Li, G Wang - CCF Transactions on …, 2020 - Springer
There are a large number of end devices in an IoT system, which may malfunction due to
various reasons, such as being attacked. Anomaly detection of the devices and the whole …

Sysnif: A log-based workflow construction method and performance measurement in intelligent IoT system

Z Jian, Z Jin, XS Xie, Y Lu, G Li, X Chen, T Baker - Measurement, 2021 - Elsevier
The massive smart devices in intelligent IoT system can break down due to malicious attacks
and system failures. As a non-invasive method, mining workflow from system log can help …

WIP: Sysnif: Constructing Workflow from Interleaved Logs in Intelligent IoT System

Z Jin, X Xie, Y Fang, Z Jian, Y Lu… - 2021 IEEE 22nd …, 2021 - ieeexplore.ieee.org
The massive smart devices in intelligent IoT can be broken due to malicious attacks and
system failures. As a nonintrusive method, workflows mined from system logs facilitate …