The use of the area under the ROC curve in the evaluation of machine learning algorithms, Pattern Recognition, vol.30, issue.7, pp.1145-1159, 1997. ,
DOI : 10.1016/S0031-3203(96)00142-2
Nfv-vital: A framework for characterizing the performance of virtual network functions, Network Function Virtualization and Software Defined Network (NFV- SDN), 2015 IEEE Conference on, pp.93-99, 2015. ,
Characterizing Direct Monitoring Techniques in Software Systems, IEEE Transactions on Reliability, vol.65, issue.4, pp.1665-1681, 2016. ,
DOI : 10.1109/TR.2016.2570564
Event Logs for the Analysis of Software Failures: A Rule-Based Approach, IEEE Transactions on Software Engineering, vol.39, issue.6, pp.806-821, 2013. ,
DOI : 10.1109/TSE.2012.67
Experience report: Anomaly detection of cloud application operations using log and cloud metric correlation analysis, 2015 IEEE 26th International Symposium on Software Reliability Engineering (ISSRE), pp.24-34, 2015. ,
DOI : 10.1109/ISSRE.2015.7381796
Using syslog message sequences for predicting disk failures, Proceedings of the 24th International Conference on Large Installation System Administration, ser. LISA'10, pp.1-10, 2010. ,
The Syslog Protocol, 2009. ,
DOI : 10.17487/rfc5424
Experience Report: System Log Analysis for Anomaly Detection, 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE), pp.207-218, 2016. ,
DOI : 10.1109/ISSRE.2016.21
Data mining approach to temporal debugging of embedded streaming applications, 2015 International Conference on Embedded Software (EMSOFT), pp.167-176, 2015. ,
DOI : 10.1109/EMSOFT.2015.7318272
URL : https://hal.archives-ouvertes.fr/hal-01178782
Classification of massive mobile web log URLs for customer profiling & analytics, 2016 IEEE International Conference on Big Data (Big Data), pp.1609-1614, 2016. ,
DOI : 10.1109/BigData.2016.7840771
Crowdsourcing cybersecurity: Cyber attack detection using social media Data analysis of minimally-structured heterogeneous logs : An experimental study of log template extraction and anomaly detection based on recurrent neural network and naive bayes, p.2016 ,
Using Natural Language Processing to Automatically Detect Self-Admitted Technical Debt, IEEE Transactions on Software Engineering, vol.PP, issue.99, pp.1-1, 2017. ,
DOI : 10.1109/TSE.2017.2654244
Identification of high-level concept clones in source code, Proceedings 16th Annual International Conference on Automated Software Engineering (ASE 2001), pp.107-114, 2001. ,
DOI : 10.1109/ASE.2001.989796
An information retrieval approach to concept location in source code, 11th Working Conference on Reverse Engineering, pp.214-223, 2004. ,
DOI : 10.1109/WCRE.2004.10
Distributed representations of words and phrases and their compositionality, Advances in neural information processing systems, pp.3111-3119, 2013. ,
What Supercomputers Say: A Study of Five System Logs, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07), 2007. ,
DOI : 10.1109/DSN.2007.103
Detecting Unknown Network Attacks Using Language Models, Proceedings of the Third International Conference on Detection of Intrusions and Malware & Vulnerability Assessment, ser. DIMVA'06, pp.74-90, 2006. ,
DOI : 10.1007/11790754_5
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.67.8257
Anomaly Detection and Root Cause Localization in Virtual Network Functions, 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE), pp.196-206, 2016. ,
DOI : 10.1109/ISSRE.2016.32
URL : https://hal.archives-ouvertes.fr/hal-01419014
Topicxp: Exploring topics in source code using latent dirichlet allocation, 2010 IEEE International Conference on Software Maintenance, pp.1-6, 2010. ,
DOI : 10.1109/icsm.2010.5609654
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.380.3425
Salsa: Analyzing logs as state machines, Proceedings of the First USENIX Conference on Analysis of System Logs, ser. WASL'08, pp.6-6, 2008. ,
A data clustering algorithm for mining patterns from event logs, Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM 2003) (IEEE Cat. No.03EX764), pp.119-126, 2003. ,
DOI : 10.1109/IPOM.2003.1251233
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.111.820
Online failure prediction in cloud datacenters by real-time message pattern learning, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, pp.504-511, 2012. ,
DOI : 10.1109/CloudCom.2012.6427566
Detecting large-scale system problems by mining console logs, Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, SOSP '09, pp.117-132, 2009. ,
DOI : 10.1145/1629575.1629587
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.7257
Dynamic syslog mining for network failure monitoring, Proceeding of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining , KDD '05, pp.499-508, 2005. ,
DOI : 10.1145/1081870.1081927
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.96.8083
Sentiment analyzer: extracting sentiments about a given topic using natural language processing techniques, Third IEEE International Conference on Data Mining, pp.427-434, 2003. ,
DOI : 10.1109/ICDM.2003.1250949
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.7125