{"id":"https://openalex.org/W3207794047","doi":"https://doi.org/10.1109/msec.2021.3113275","title":"Online Log Data Analysis With Efficient Machine Learning: A Review","display_name":"Online Log Data Analysis With Efficient Machine Learning: A Review","publication_year":2021,"publication_date":"2021-10-08","ids":{"openalex":"https://openalex.org/W3207794047","doi":"https://doi.org/10.1109/msec.2021.3113275","mag":"3207794047"},"language":"en","primary_location":{"id":"doi:10.1109/msec.2021.3113275","is_oa":true,"landing_page_url":"https://doi.org/10.1109/msec.2021.3113275","pdf_url":"https://ieeexplore.ieee.org/ielx7/8013/9782817/09563044.pdf","source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy","raw_type":"journal-article"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ieeexplore.ieee.org/ielx7/8013/9782817/09563044.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088439816","display_name":"Florian Skopik","orcid":"https://orcid.org/0000-0002-1922-7892"},"institutions":[{"id":"https://openalex.org/I132118926","display_name":"Austrian Institute of Technology","ror":"https://ror.org/04knbh022","country_code":"AT","type":"facility","lineage":["https://openalex.org/I132118926"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Florian Skopik","raw_affiliation_strings":["Austrian Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Austrian Institute of Technology","institution_ids":["https://openalex.org/I132118926"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072210863","display_name":"Max Landauer","orcid":"https://orcid.org/0000-0003-3813-3151"},"institutions":[{"id":"https://openalex.org/I132118926","display_name":"Austrian Institute of Technology","ror":"https://ror.org/04knbh022","country_code":"AT","type":"facility","lineage":["https://openalex.org/I132118926"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Max Landauer","raw_affiliation_strings":["Austrian Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Austrian Institute of Technology","institution_ids":["https://openalex.org/I132118926"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029942543","display_name":"Markus Wurzenberger","orcid":"https://orcid.org/0000-0003-3259-6972"},"institutions":[{"id":"https://openalex.org/I132118926","display_name":"Austrian Institute of Technology","ror":"https://ror.org/04knbh022","country_code":"AT","type":"facility","lineage":["https://openalex.org/I132118926"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Markus Wurzenberger","raw_affiliation_strings":["Austrian Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Austrian Institute of Technology","institution_ids":["https://openalex.org/I132118926"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5088439816"],"corresponding_institution_ids":["https://openalex.org/I132118926"],"apc_list":null,"apc_paid":null,"fwci":1.2802,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.81571669,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":"20","issue":"3","first_page":"80","last_page":"90"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/parsing","display_name":"Parsing","score":0.816885232925415},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7670387029647827},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6892868280410767},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5727526545524597},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.5494368672370911},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4200108051300049},{"id":"https://openalex.org/keywords/online-learning","display_name":"Online learning","score":0.4183276891708374},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4050407409667969},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3785282075405121},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3572530150413513},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.32779669761657715},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.16550827026367188},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12662291526794434}],"concepts":[{"id":"https://openalex.org/C186644900","wikidata":"https://www.wikidata.org/wiki/Q194152","display_name":"Parsing","level":2,"score":0.816885232925415},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7670387029647827},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6892868280410767},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5727526545524597},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.5494368672370911},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4200108051300049},{"id":"https://openalex.org/C2986087404","wikidata":"https://www.wikidata.org/wiki/Q15946010","display_name":"Online learning","level":2,"score":0.4183276891708374},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4050407409667969},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3785282075405121},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3572530150413513},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.32779669761657715},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.16550827026367188},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12662291526794434},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/msec.2021.3113275","is_oa":true,"landing_page_url":"https://doi.org/10.1109/msec.2021.3113275","pdf_url":"https://ieeexplore.ieee.org/ielx7/8013/9782817/09563044.pdf","source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/msec.2021.3113275","is_oa":true,"landing_page_url":"https://doi.org/10.1109/msec.2021.3113275","pdf_url":"https://ieeexplore.ieee.org/ielx7/8013/9782817/09563044.pdf","source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G232353898","display_name":null,"funder_award_id":"833456","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G373965828","display_name":null,"funder_award_id":"SI2.835928","funder_id":"https://openalex.org/F4320335998","funder_display_name":"European Defence Industrial Development Programme"},{"id":"https://openalex.org/G4937468798","display_name":null,"funder_award_id":"H2020","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G5190488160","display_name":null,"funder_award_id":"833456","funder_id":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme"},{"id":"https://openalex.org/G5211829629","display_name":null,"funder_award_id":"873980","funder_id":"https://openalex.org/F4320323031","funder_display_name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320323031","display_name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","ror":"https://ror.org/028jc0449"},{"id":"https://openalex.org/F4320332999","display_name":"Horizon 2020 Framework Programme","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320335998","display_name":"European Defence Industrial Development Programme","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3207794047.pdf","grobid_xml":"https://content.openalex.org/works/W3207794047.grobid-xml"},"referenced_works_count":15,"referenced_works":["https://openalex.org/W1488315845","https://openalex.org/W1661413208","https://openalex.org/W2038928885","https://openalex.org/W2076809217","https://openalex.org/W2108187446","https://openalex.org/W2115056012","https://openalex.org/W2122646361","https://openalex.org/W2153470728","https://openalex.org/W2560021099","https://openalex.org/W2583874385","https://openalex.org/W2754665629","https://openalex.org/W2762028850","https://openalex.org/W2767094836","https://openalex.org/W2947815220","https://openalex.org/W4243065151"],"related_works":["https://openalex.org/W2502722637","https://openalex.org/W2167662847","https://openalex.org/W1551406738","https://openalex.org/W2369308426","https://openalex.org/W2293457016","https://openalex.org/W2977842567","https://openalex.org/W1590308178","https://openalex.org/W2789919619","https://openalex.org/W1818857488","https://openalex.org/W2020540721"],"abstract_inverted_index":{"Logs":[0],"are":[1],"incrementally":[2],"produced":[3],"textual":[4],"data":[5,44],"that":[6],"reflect":[7],"events":[8],"and":[9,31,41],"their":[10],"impact":[11],"on":[12],"technical":[13],"systems.":[14],"Their":[15],"efficient":[16],"analysis":[17],"is":[18],"key":[19],"for":[20,39,45],"operational":[21],"cybersecurity.":[22],"We":[23],"investigate":[24],"approaches":[25],"beyond":[26],"applying":[27],"simple":[28],"regular":[29],"expressions":[30],"provide":[32],"insights":[33],"into":[34],"novel":[35],"machine":[36],"learning":[37],"mechanisms":[38],"parsing":[40],"analyzing":[42],"log":[43],"online":[46],"anomaly":[47],"detection.":[48]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
