Landscape of automated log analysis: A systematic literature review and mapping study

Ł Korzeniowski, K Goczyła - IEEE Access, 2022 - ieeexplore.ieee.org
Logging is a common practice in software engineering to provide insights into working
systems. The main uses of log files have always been failure identification and root cause …

Temporal association rule mining: An overview considering the time variable as an integral or implied component

A Segura‐Delgado, MJ Gacto, R Alcalá… - … : Data Mining and …, 2020 - Wiley Online Library
Association rules are commonly used to provide decision‐makers with knowledge that helps
them to make good decisions. Most of the published proposals mine association rules …

Object-centric process predictive analytics

R Galanti, M De Leoni, N Navarin, A Marazzi - Expert Systems with …, 2023 - Elsevier
Object-centric processes (also known as Artifact-centric processes) are implementations of a
paradigm where an instance of one process is not executed in isolation but interacts with …

SAX-ARM: Deviant event pattern discovery from multivariate time series using symbolic aggregate approximation and association rule mining

H Park, JY Jung - Expert Systems with Applications, 2020 - Elsevier
The discovery of event patterns from multivariate time series is important to academics and
practitioners. In particular, we consider the event patterns related to anomalies such as …

[HTML][HTML] Exploring perceptions of decision-makers and specialists in defensive machine learning cybersecurity applications: The need for a standardised approach

O Alshaikh, S Parkinson, S Khan - Computers & Security, 2024 - Elsevier
Abstract Machine learning (ML) utilisation has achieved a vast global impact. This is evident
in the cybersecurity sector, where ML has wide-ranging applications, such as identifying and …

[HTML][HTML] Context-based irregular activity detection in event logs for forensic investigations: An itemset mining approach

S Khan, S Parkinson, C Murphy - Expert Systems with Applications, 2023 - Elsevier
Event logs are a powerful source of digital evidence as they contain detailed information
about activities performed on a computer. Forensic investigation of the event logs is a …

LogNADS: Network anomaly detection scheme based on log semantics representation

X Liu, W Liu, X Di, J Li, B Cai, W Ren, H Yang - Future Generation …, 2021 - Elsevier
Abstract Semantics-aware anomaly detection based on log has attracted much attention.
However, the existing methods based on the weighted aggregation of all word vectors might …

Fast top-k association rule mining using rule generation property pruning

X Liu, X Niu, P Fournier-Viger - Applied Intelligence, 2021 - Springer
Traditional association rule mining algorithms can have a long runtime, high memory
consumption, and generate a huge number of rules. Browsing through numerous rules and …

Cyber intrusion detection through association rule mining on multi-source logs

P Lou, G Lu, X Jiang, Z Xiao, J Hu, J Yan - Applied Intelligence, 2021 - Springer
Security logs in cloud environment like intrusion detection system (IDS) logs, firewall logs,
and system logs provide historical information describing potential security risks. However …

LTAnomaly: A Transformer Variant for Syslog Anomaly Detection Based on Multi-Scale Representation and Long Sequence Capture

D Han, M Sun, M Li, Q Chen - Applied Sciences, 2023 - mdpi.com
Detailed information on system operation is recorded by system logs, from which fast and
accurate detection of anomalies is conducive to service management and system …