参考文献/References:
[1]YUAN Y,ADHATARAO S S,LIN M,et al. Ada:Adaptive deep log anomaly detector[C]//IEEE Conference on Computer Communications. Virtual Conference,2020:2449-2458.
[2]彭小圣,邓迪元,程时杰,等. 面向智能电网应用的电力大数据关键技术[J]. 中国电机工程学报,2015,35(3):503-511.
[3]ZHAO X,MIAO W,YUAN G,et al. Abnormal traffic detection system based on feature fusion and sparse transformer[J]. Mathematics,2024,12(11):1643.
[4]ZHANG X,ZHENG C,WU X,et al. Anomaly detection method for interactive data of third-party load aggregation platform based on multidimensional feature information fusion[C]//2022 IEEE 22nd International Conference on Communication Technology(ICCT). Nanjing,China,IEEE,2022:1893-1897.
[5]MAKANJU A,ZINCIR-HEYWOOD A N,MILIOS E E. A lightweight algorithm for message type extraction in system application logs[J]. IEEE transactions on knowledge and data engineering,2011,24(11):1921-1936.
[6]FU Q,LOU J G,WANG Y,et al. Execution anomaly detection in distributed systems through unstructured log analysis[C]//IEEE International Conference on Data Mining. Miami,Florida,USA,2009:149-158.
[7]HE P,ZHU J,ZHENG Z,et al. Drain:An online log parsing approach with fixed depth tree[C]//IEEE International Conference on Web Services,Honolulu,Hawaii,USA,2017:33-40.
[8]DU M,LI F. Spell:Online streaming parsing of large unstructured system logs[J]. IEEE transactions on knowledge and data engineering,2018,31(11):2213-2227.
[9]ASTEKIN M,ÖZCAN S,SÖZER H. Incremental analysis of large-scale system logs for anomaly detection[C]//IEEE Interna-tional Conference on Big Data,Los Angeles,CA,USA,2019:2119-2127.
[10]CHEN R,ZHANG S,LI D,et al. Logtransfer:Cross-system log anomaly detection for software systems with transfer learning[C]//IEEE International Symposium on Software Reliability Engineering,Virtual Conference,2020:37-47.
[11]HOCHREITER S,SCHMIDHUBER J. Long short-term memory[J]. Neural computation,1997,9(8):1735-1780.
[12]DU M,LI F,ZHENG G,et al. Deeplog:Anomaly detection and diagnosis from system logs through deep learning[C]//Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Dallas,Texas,USA,2017:1285-1298.
[13]YANG R,QU D,GAO Y,et al. NLSALog:An anomaly detection framework for log sequence in security management[J]. IEEE Access,2019,7:181152-181164.
[14]MENG W,LIU Y,ZHU Y,et al. Loganomaly:Unsupervised detection of sequential and quantitative anomalies in unstructured logs[C]//International Joint Conference on Artificial Intelligence. Macao,China,2019,19(7):4739-4745.
[15]闫力,夏伟. 基于机器学习的日志异常检测综述[J]. 计算机系统应用,2022,31(09):57-69.
[16]HE P,ZHU J,HE S,et al. An evaluation study on log parsing and its use in log mining[C]//IEEE/IFIP International Conference on Dependable Systems and Networks. Toulouse,France,2016:654-661.
[17]FU Y,LIANG K,XU J. MLog:Mogrifier LSTM-based log anomaly detection approach using semantic representation[J]. IEEE transactions on services computing,2023,16(5):3537-3549.
[18]DEVLIN J. Bert:Pre-training of deep bidirectional transformers for language understanding[J]. arXiv Preprint arXiv:1810.04805,2018.