[1] S. He, J. Zhu, P. He and M. R. Lyu, "Experience Report: System Log Analysis for Anomaly Detection," 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE), Ottawa, ON, 2016, pp. 207-218. doi: 10.1109/ISSRE.2016.21.
[2] P. He, J. Zhu, S. He, J. Li, and R. Lyu, “An evaluation study on log parsing and its use in log mining”, In DSN’16: Proc. of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016.
[3] Du, Min, F. Li, G. Zheng, and V. Srikumar, "DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning." In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1285-1298. ACM, 2017.
[4] V. Chandola, A. Banerjee, and V. Kumar, “Anomaly detection: A survey”, ACM computing surveys (CSUR), 41(3):15, 2009.
[5] AiKno® Framework