There are a large number of end devices in an IoT system, which may malfunction due to various reasons, such as being attacked. Anomaly detection of the devices and the whole …
AB Lashram, L Hsairi, H Al Ahmadi - Engineering, Technology & Applied …, 2023 - etasr.com
Event logs are essential in many software systems' maintenance and development, as detailed runtime information is recorded in them, allowing support engineers and …
Z Jian, Z Jin, XS Xie, Y Lu, G Li, X Chen, T Baker - Measurement, 2021 - Elsevier
The massive smart devices in intelligent IoT system can break down due to malicious attacks and system failures. As a non-invasive method, mining workflow from system log can help …
C Liu, M Liang, J Hou, Z Gu… - Security and …, 2022 - Wiley Online Library
Log files are usually semistructured files that record the historical operation information of systems or devices. Researchers often find anomalies by analyzing logs, so as to identify …
X Liu, Y Zhu, S Ji - 2020 IEEE International Conference on …, 2020 - ieeexplore.ieee.org
A large amount of log data is generated every moment in many real-world applications. System logs, mobile application logs, web logs etc., all of which contain rich information and …