-
Notifications
You must be signed in to change notification settings - Fork 541
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
2 changed files
with
45 additions
and
44 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,97 +1,98 @@ | ||
### Publications about log parsing | ||
Reference | ||
========= | ||
|
||
1. [**ICPC'18**] Salma Messaoudi, Annibale Panichella, Domenico Bianculli, Lionel Briand, Raimondas Sasnauskas. [A Search-based Approach for Accurate Identification of Log Message Formats](http://publications.uni.lu/bitstream/10993/35286/1/ICPC-2018.pdf), *IEEE/ACM International Conference on Program Comprehension (ICPC)*, 2018. | ||
#. [**ICPC'18**] Salma Messaoudi, Annibale Panichella, Domenico Bianculli, Lionel Briand, Raimondas Sasnauskas. [A Search-based Approach for Accurate Identification of Log Message Formats](http://publications.uni.lu/bitstream/10993/35286/1/ICPC-2018.pdf), *IEEE/ACM International Conference on Program Comprehension (ICPC)*, 2018. | ||
|
||
1. [**ICWS'17**] Pinjia He, Jieming Zhu, Zibin Zheng, and Michael R. Lyu. [Drain: An Online Log Parsing Approach with Fixed Depth Tree](http://jiemingzhu.github.io/pub/pjhe_icws2017.pdf), *IEEE International Conference on Web Services (ICWS)*, 2017. | ||
#. [**ICWS'17**] Pinjia He, Jieming Zhu, Zibin Zheng, and Michael R. Lyu. [Drain: An Online Log Parsing Approach with Fixed Depth Tree](http://jiemingzhu.github.io/pub/pjhe_icws2017.pdf), *IEEE International Conference on Web Services (ICWS)*, 2017. | ||
|
||
1. [**ICDM'16**] Min Du, Feifei Li. [Spell: Streaming Parsing of System Event Logs](https://www.cs.utah.edu/~lifeifei/papers/spell.pdf), *IEEE International Conference on Data Mining (ICDM)*, 2016. | ||
#. [**ICDM'16**] Min Du, Feifei Li. [Spell: Streaming Parsing of System Event Logs](https://www.cs.utah.edu/~lifeifei/papers/spell.pdf), *IEEE International Conference on Data Mining (ICDM)*, 2016. | ||
|
||
1. [**CNSM'15**] Risto Vaarandi, Mauno Pihelgas. [LogCluster - A Data Clustering and Pattern Mining Algorithm for Event Logs](http://ristov.github.io/publications/cnsm15-logcluster-web.pdf), *International Conference on Network and Service Management (CNSM)*, 2015. | ||
#. [**CNSM'15**] Risto Vaarandi, Mauno Pihelgas. [LogCluster - A Data Clustering and Pattern Mining Algorithm for Event Logs](http://ristov.github.io/publications/cnsm15-logcluster-web.pdf), *International Conference on Network and Service Management (CNSM)*, 2015. | ||
|
||
1. [**CNSM'15**] Keiichi Shima. [Length Matters: Clustering System Log Messages using Length of Words](https://arxiv.org/pdf/1611.03213.pdf), *International Conference on Network and Service Management (CNSM)*, 2015. | ||
#. [**CNSM'15**] Keiichi Shima. [Length Matters: Clustering System Log Messages using Length of Words](https://arxiv.org/pdf/1611.03213.pdf), *International Conference on Network and Service Management (CNSM)*, 2015. | ||
|
||
1. Adetokunbo Makanju, A. Nur Zincir-Heywood, Evangelos E. Milios. [A Lightweight Algorithm for Message Type Extraction in System Application Logs](http://ieeexplore.ieee.org/abstract/document/5936060/), *IEEE Transactions on Knowledge and Data Engineering (TKDE)*, 2012. | ||
#. Adetokunbo Makanju, A. Nur Zincir-Heywood, Evangelos E. Milios. [A Lightweight Algorithm for Message Type Extraction in System Application Logs](http://ieeexplore.ieee.org/abstract/document/5936060/), *IEEE Transactions on Knowledge and Data Engineering (TKDE)*, 2012. | ||
|
||
1. Liang Tang, Tao Li, Chang-Shing Perng. [LogSig: Generating System Events from Raw Textual Logs](http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.222.9320&rep=rep1&type=pdf), *ACM International Conference on Information and Knowledge Management (CIKM)*, 2011. | ||
#. Liang Tang, Tao Li, Chang-Shing Perng. [LogSig: Generating System Events from Raw Textual Logs](http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.222.9320&rep=rep1&type=pdf), *ACM International Conference on Information and Knowledge Management (CIKM)*, 2011. | ||
|
||
1. Meiyappan Nagappan, Mladen A. Vouk. [Abstracting Log Lines to Log Event Types for Mining Software System Logs](http://www.se.rit.edu/~mei/publications/pdfs/Abstracting-Log-Lines-to-Log-Event-Types-for-Mining-Software-System-Logs.pdf), *International Working Conference on Mining Software Repositories (MSR)*, 2010. | ||
#. Meiyappan Nagappan, Mladen A. Vouk. [Abstracting Log Lines to Log Event Types for Mining Software System Logs](http://www.se.rit.edu/~mei/publications/pdfs/Abstracting-Log-Lines-to-Log-Event-Types-for-Mining-Software-System-Logs.pdf), *International Working Conference on Mining Software Repositories (MSR)*, 2010. | ||
|
||
|
||
|
||
|
||
|
||
1. Adetokunbo Makanju, A. Nur Zincir-Heywood, Evangelos E. Milios. [Clustering Event Logs Using Iterative Partitioning](https://web.cs.dal.ca/~makanju/publications/paper/kdd09.pdf), *Proceedings of ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD)*, 2009. | ||
#. Adetokunbo Makanju, A. Nur Zincir-Heywood, Evangelos E. Milios. [Clustering Event Logs Using Iterative Partitioning](https://web.cs.dal.ca/~makanju/publications/paper/kdd09.pdf), *Proceedings of ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD)*, 2009. | ||
|
||
1. Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li. [Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis](https://www.microsoft.com/en-us/research/wp-content/uploads/2016/02/DM790-CR.pdf), *Proceedings of IEEE International Conference on Data Mining (ICDM)*, 2009. | ||
#. Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li. [Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis](https://www.microsoft.com/en-us/research/wp-content/uploads/2016/02/DM790-CR.pdf), *Proceedings of IEEE International Conference on Data Mining (ICDM)*, 2009. | ||
|
||
1. Risto Vaarandi. [A Data Clustering Algorithm for Mining Patterns from Event Logs](http://www.quretec.com/u/vilo/edu/2003-04/DM_seminar_2003_II/ver1/P12/slct-ipom03-web.pdf), *Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM)*, 2003. | ||
#. Risto Vaarandi. [A Data Clustering Algorithm for Mining Patterns from Event Logs](http://www.quretec.com/u/vilo/edu/2003-04/DM_seminar_2003_II/ver1/P12/slct-ipom03-web.pdf), *Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM)*, 2003. | ||
|
||
1. A. Gainaru, F. Cappello, S. Trausan-Matu, B. Kramer. Event Log Mining Tool for Large Scale HPC Systems, in Euro-Par, 2011. | ||
#. A. Gainaru, F. Cappello, S. Trausan-Matu, B. Kramer. Event Log Mining Tool for Large Scale HPC Systems, in Euro-Par, 2011. | ||
|
||
1. H. C. Xia Ning, Geoff Jiang, K. Yoshihira. HLAer:a System for Heterogeneous Log Analysis, in SDM Workshop on Heterogeneous Learning, 2014. | ||
#. H. C. Xia Ning, Geoff Jiang, K. Yoshihira. HLAer:a System for Heterogeneous Log Analysis, in SDM Workshop on Heterogeneous Learning, 2014. | ||
|
||
1. 2016-[CIKM] LogMine:Fast Pattern Recognition for Log Analytics, | ||
#. 2016-[CIKM] LogMine:Fast Pattern Recognition for Log Analytics, | ||
|
||
1. 2016-[KDD] Anomaly Detection Using Program Control Flow Graph Mining from Execution Logs | ||
#. 2016-[KDD] Anomaly Detection Using Program Control Flow Graph Mining from Execution Logs | ||
|
||
1. 2016 - Extracting Log Patterns from System Logs in LARGE | ||
#. 2016 - Extracting Log Patterns from System Logs in LARGE | ||
|
||
1. 2015 - An Automatic Approach to Extract the Formats of Network and Security Log Messages | ||
#. 2015 - An Automatic Approach to Extract the Formats of Network and Security Log Messages | ||
|
||
|
||
1. 2014-[MSR] - Unsupervised Discovery of Intentional Process Models from Event Logs | ||
#. 2014-[MSR] - Unsupervised Discovery of Intentional Process Models from Event Logs | ||
|
||
1. 2014 - Towards an NLP-based Log Template Generation Algorithm for System Log Analysis | ||
#. 2014 - Towards an NLP-based Log Template Generation Algorithm for System Log Analysis | ||
|
||
1. 2013-[CIKM] - Searching Similar Segments over Textual Event Sequences | ||
#. 2013-[CIKM] - Searching Similar Segments over Textual Event Sequences | ||
|
||
1. 2013-[BigMine] - CAPRI:A Tool for Mining Complex Line Patterns in Large Log Data | ||
#. 2013-[BigMine] - CAPRI:A Tool for Mining Complex Line Patterns in Large Log Data | ||
|
||
1. 2011 - Event Log Mining Tool for Large Scale HPC Systems | ||
#. 2011 - Event Log Mining Tool for Large Scale HPC Systems | ||
|
||
1. 2010-[SIGOPS OS Review] - Incremental Learning of System Log Formats | ||
#. 2010-[SIGOPS OS Review] - Incremental Learning of System Log Formats | ||
|
||
1. 2010-[MSR] - Abstracting Log Lines to Log Event Types for Mining Software System Logs | ||
#. 2010-[MSR] - Abstracting Log Lines to Log Event Types for Mining Software System Logs | ||
|
||
1. 2010-[ICDM] - LogTree:A Framework for Generating System Events from Raw Textual Logs | ||
#. 2010-[ICDM] - LogTree:A Framework for Generating System Events from Raw Textual Logs | ||
|
||
1. 2008 - An automated approach for abstracting execution logs to execution events | ||
#. 2008 - An automated approach for abstracting execution logs to execution events | ||
|
||
1. 2008 - Abstracting Execution Logs to Execution Events for Enterprise Applications | ||
#. 2008 - Abstracting Execution Logs to Execution Events for Enterprise Applications | ||
|
||
1. Proactive Failure Detection Learning Generation Patterns of Large-scale Network Logs | ||
#. Proactive Failure Detection Learning Generation Patterns of Large-scale Network Logs | ||
|
||
1. [2004] A Breadth-First Algorithm for Mining Frequent Patterns from Event Logs | ||
#. [2004] A Breadth-First Algorithm for Mining Frequent Patterns from Event Logs | ||
|
||
1. [2008][NOMS] Mining Event Logs with SLCT and Loghound | ||
#. [2008][NOMS] Mining Event Logs with SLCT and Loghound | ||
|
||
1. [2009][SOSP] Large-Scale System Problem Detection by Mining Console Logs | ||
#. [2009][SOSP] Large-Scale System Problem Detection by Mining Console Logs | ||
|
||
1. [2009][ISSRE] Efficiently Extracting Operational Profiles from Execution Logs Using Suffix Arrays | ||
#. [2009][ISSRE] Efficiently Extracting Operational Profiles from Execution Logs Using Suffix Arrays | ||
|
||
1. [2010] Incremental Learning of System Log Formats | ||
#. [2010] Incremental Learning of System Log Formats | ||
|
||
1. [2016] Event Log Analysis with the LogCluster Tool | ||
#. [2016] Event Log Analysis with the LogCluster Tool | ||
|
||
1. [2017] Towards a Neural Language Model for Signature Extraction from Forensic Logs | ||
#. [2017] Towards a Neural Language Model for Signature Extraction from Forensic Logs | ||
|
||
1. 2013-[BigMine] - CAPRI:A Tool for Mining Complex Line Patterns in Large Log Data | ||
#. 2013-[BigMine] - CAPRI:A Tool for Mining Complex Line Patterns in Large Log Data | ||
|
||
1. 2014 - Towards an NLP-based Log Template Generation Algorithm for System Log Analysis | ||
#. 2014 - Towards an NLP-based Log Template Generation Algorithm for System Log Analysis | ||
|
||
1. T. Kimura, A. Watanabe, T. Toyono, and | ||
#. T. Kimura, A. Watanabe, T. Toyono, and | ||
K. Ishibashi. Proactive Failure Detection Learning | ||
Generation Patterns of Large-scale Network | ||
Logs. In Proceedings of the 11th International | ||
Conference on Network and Service Management | ||
(CNSM 2015), pages 8–14, Nov 2015. | ||
|
||
1. 2016-[KDD] - Anomaly Detection Using Program Control Flow Graph Mining from Execution Logs | ||
#. 2016-[KDD] - Anomaly Detection Using Program Control Flow Graph Mining from Execution Logs | ||
|
||
1. A data streaming algorithm for signature generation and clustering of log messages | ||
#. A data streaming algorithm for signature generation and clustering of log messages | ||
|
||
1. Length Matters: Clustering System Log Messages using Length of Words | ||
#. Length Matters: Clustering System Log Messages using Length of Words | ||
|
||
|
||
|
||
1. Navigating the Data Lake with Datamaran: Automatically Extracting Structure from Log Datasets | ||
#. Navigating the Data Lake with Datamaran: Automatically Extracting Structure from Log Datasets |