A. P. Bradley, The use of the area under the ROC curve in the evaluation of machine learning algorithms, Pattern Recognition, vol.30, issue.7, pp.1145-1159, 1997.
DOI : 10.1016/S0031-3203(96)00142-2

L. Cao, P. Sharma, S. Fahmy, and V. Saxena, Nfv-vital: A framework for characterizing the performance of virtual network functions, Network Function Virtualization and Software Defined Network (NFV- SDN), 2015 IEEE Conference on, pp.93-99, 2015.

M. Cinque, D. Cotroneo, R. D. Corte, and A. Pecchia, Characterizing Direct Monitoring Techniques in Software Systems, IEEE Transactions on Reliability, vol.65, issue.4, pp.1665-1681, 2016.
DOI : 10.1109/TR.2016.2570564

M. Cinque, D. Cotroneo, and A. Pecchia, Event Logs for the Analysis of Software Failures: A Rule-Based Approach, IEEE Transactions on Software Engineering, vol.39, issue.6, pp.806-821, 2013.
DOI : 10.1109/TSE.2012.67

M. Farshchi, J. G. Schneider, I. Weber, and J. Grundy, Experience report: Anomaly detection of cloud application operations using log and cloud metric correlation analysis, 2015 IEEE 26th International Symposium on Software Reliability Engineering (ISSRE), pp.24-34, 2015.
DOI : 10.1109/ISSRE.2015.7381796

R. W. Featherstun and E. W. Fulp, Using syslog message sequences for predicting disk failures, Proceedings of the 24th International Conference on Large Installation System Administration, ser. LISA'10, pp.1-10, 2010.

R. Gerhards, The Syslog Protocol, 2009.
DOI : 10.17487/rfc5424

S. He, J. Zhu, P. He, and M. R. Lyu, Experience Report: System Log Analysis for Anomaly Detection, 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE), pp.207-218, 2016.
DOI : 10.1109/ISSRE.2016.21

O. Iegorov, V. Leroy, A. Termier, J. F. Mehaut, and M. Santana, Data mining approach to temporal debugging of embedded streaming applications, 2015 International Conference on Embedded Software (EMSOFT), pp.167-176, 2015.
DOI : 10.1109/EMSOFT.2015.7318272

URL : https://hal.archives-ouvertes.fr/hal-01178782

R. Kanagasabai, A. Veeramani, H. Shangfeng, K. Sangaralingam, and G. Manai, Classification of massive mobile web log URLs for customer profiling & analytics, 2016 IEEE International Conference on Big Data (Big Data), pp.1609-1614, 2016.
DOI : 10.1109/BigData.2016.7840771

R. P. Khandpur, T. Ji, S. Jan, G. Wang, C. Lu et al., Crowdsourcing cybersecurity: Cyber attack detection using social media Data analysis of minimally-structured heterogeneous logs : An experimental study of log template extraction and anomaly detection based on recurrent neural network and naive bayes, p.2016

E. Maldonado, E. Shihab, and N. Tsantalis, Using Natural Language Processing to Automatically Detect Self-Admitted Technical Debt, IEEE Transactions on Software Engineering, vol.PP, issue.99, pp.1-1, 2017.
DOI : 10.1109/TSE.2017.2654244

A. Marcus and J. I. Maletic, Identification of high-level concept clones in source code, Proceedings 16th Annual International Conference on Automated Software Engineering (ASE 2001), pp.107-114, 2001.
DOI : 10.1109/ASE.2001.989796

A. Marcus, A. Sergeyev, V. Rajlich, and J. I. Maletic, An information retrieval approach to concept location in source code, 11th Working Conference on Reverse Engineering, pp.214-223, 2004.
DOI : 10.1109/WCRE.2004.10

T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and J. Dean, Distributed representations of words and phrases and their compositionality, Advances in neural information processing systems, pp.3111-3119, 2013.

A. Oliner, What Supercomputers Say: A Study of Five System Logs, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07), 2007.
DOI : 10.1109/DSN.2007.103

K. Rieck and P. Laskov, Detecting Unknown Network Attacks Using Language Models, Proceedings of the Third International Conference on Detection of Intrusions and Malware & Vulnerability Assessment, ser. DIMVA'06, pp.74-90, 2006.
DOI : 10.1007/11790754_5

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.67.8257

C. Sauvanaud, K. Lazri, M. Kaâniche, and K. Kanoun, Anomaly Detection and Root Cause Localization in Virtual Network Functions, 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE), pp.196-206, 2016.
DOI : 10.1109/ISSRE.2016.32

URL : https://hal.archives-ouvertes.fr/hal-01419014

T. Savage, B. Dit, M. Gethers, and D. Poshyvanyk, Topicxp: Exploring topics in source code using latent dirichlet allocation, 2010 IEEE International Conference on Software Maintenance, pp.1-6, 2010.
DOI : 10.1109/icsm.2010.5609654

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.380.3425

J. Tan, X. Pan, S. Kavulya, R. Gandhi, and P. Narasimhan, Salsa: Analyzing logs as state machines, Proceedings of the First USENIX Conference on Analysis of System Logs, ser. WASL'08, pp.6-6, 2008.

R. Vaarandi, A data clustering algorithm for mining patterns from event logs, Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM 2003) (IEEE Cat. No.03EX764), pp.119-126, 2003.
DOI : 10.1109/IPOM.2003.1251233

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.111.820

Y. Watanabe, H. Otsuka, M. Sonoda, S. Kikuchi, and Y. Matsumoto, Online failure prediction in cloud datacenters by real-time message pattern learning, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, pp.504-511, 2012.
DOI : 10.1109/CloudCom.2012.6427566

W. Xu, L. Huang, A. Fox, D. Patterson, and M. I. Jordan, Detecting large-scale system problems by mining console logs, Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, SOSP '09, pp.117-132, 2009.
DOI : 10.1145/1629575.1629587

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.7257

K. Yamanishi and Y. Maruyama, Dynamic syslog mining for network failure monitoring, Proceeding of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining , KDD '05, pp.499-508, 2005.
DOI : 10.1145/1081870.1081927

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.96.8083

J. Yi, T. Nasukawa, R. Bunescu, and W. Niblack, Sentiment analyzer: extracting sentiments about a given topic using natural language processing techniques, Third IEEE International Conference on Data Mining, pp.427-434, 2003.
DOI : 10.1109/ICDM.2003.1250949

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.7125