1. Experience Report: Log Mining Using Natural Language Processing and Application to Anomaly Detection
2. Michael Chow, David Meisner, Jason Flinn, Daniel Peek, and Thomas F Wenisch. 2014. The mystery machine: End-to-end performance analysis of large-scale internet services. In 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14). 217–231.
3. Code Climate. [n. d.]. Code Climate. https://codeclimate.com/. Accessed March 2024.
4. Codacy. [n. d.]. Codacy. https://www.codacy.com/. Accessed March 2024.
5. Eelco Dolstra, Merijn De Jonge, Eelco Visser, 2004. Nix: A Safe and Policy-Free System for Software Deployment.. In LISA, Vol. 4. 79–92.