Author:
Wang Mengying,Guo Lili,Xu Lele
Reference13 articles.
1. Computer Security Threat Monitoring and Surveillance;Anderson,1980
2. System Problem Detection by Mining Console Logs. In;Xu,2010
3. Proceedings of the 20th ACM international conference on Information and knowledge management - CIKM '11
4. Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
5. A Multi-type Failure Prediction Method Based on Log Clustering;Wang;Computer Engineering,2017