{"id":"https://openalex.org/W2994645731","doi":"https://doi.org/10.1145/3368756.3369069","title":"Incident prediction through logging management and machine learning","display_name":"Incident prediction through logging management and machine learning","publication_year":2019,"publication_date":"2019-10-02","ids":{"openalex":"https://openalex.org/W2994645731","doi":"https://doi.org/10.1145/3368756.3369069","mag":"2994645731"},"language":"en","primary_location":{"id":"doi:10.1145/3368756.3369069","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3368756.3369069","pdf_url":null,"source":{"id":"https://openalex.org/S4306523848","display_name":"Proceedings of the 4th International Conference on Smart City Applications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Conference on Smart City Applications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057252520","display_name":"Jamal El Abdelkhalki","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"J. El Abdelkhalki","raw_affiliation_strings":["LSIT, Tanger, Morocco"],"affiliations":[{"raw_affiliation_string":"LSIT, Tanger, Morocco","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101562816","display_name":"Mohamed Ben Ahmed","orcid":"https://orcid.org/0000-0001-6138-5299"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"M. Ben Ahmed","raw_affiliation_strings":["LSIT, Tanger, Morocco"],"affiliations":[{"raw_affiliation_string":"LSIT, Tanger, Morocco","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029538047","display_name":"Ahmed Slimani","orcid":"https://orcid.org/0009-0001-2400-7819"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"A. Slimani","raw_affiliation_strings":["LSIT, Tanger, Morocco"],"affiliations":[{"raw_affiliation_string":"LSIT, Tanger, Morocco","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5057252520"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.7091,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.69092543,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7828727960586548},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.6570959091186523},{"id":"https://openalex.org/keywords/logging","display_name":"Logging","score":0.6012730598449707},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.5593361258506775},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4952320158481598},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3827086091041565},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3579391539096832},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.32743749022483826},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2553240656852722},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10074770450592041}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7828727960586548},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.6570959091186523},{"id":"https://openalex.org/C125620115","wikidata":"https://www.wikidata.org/wiki/Q845249","display_name":"Logging","level":2,"score":0.6012730598449707},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.5593361258506775},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4952320158481598},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3827086091041565},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3579391539096832},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.32743749022483826},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2553240656852722},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10074770450592041},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3368756.3369069","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3368756.3369069","pdf_url":null,"source":{"id":"https://openalex.org/S4306523848","display_name":"Proceedings of the 4th International Conference on Smart City Applications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Conference on Smart City Applications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.46000000834465027}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W161431362","https://openalex.org/W309845829","https://openalex.org/W1530215515","https://openalex.org/W1655425503","https://openalex.org/W2027380800","https://openalex.org/W2146084249","https://openalex.org/W2187730514","https://openalex.org/W2191006491","https://openalex.org/W2310604680","https://openalex.org/W2330348401","https://openalex.org/W2364045976","https://openalex.org/W2412522600","https://openalex.org/W2415113388","https://openalex.org/W2515007666","https://openalex.org/W2569118262","https://openalex.org/W2589223628","https://openalex.org/W2762776925","https://openalex.org/W2784296545","https://openalex.org/W2787791008","https://openalex.org/W2885391676","https://openalex.org/W2914744172","https://openalex.org/W4213255817","https://openalex.org/W4241638174","https://openalex.org/W4288079856","https://openalex.org/W4399176852"],"related_works":["https://openalex.org/W2373969208","https://openalex.org/W2578023326","https://openalex.org/W2800852182","https://openalex.org/W2177102068","https://openalex.org/W60557881","https://openalex.org/W1972416716","https://openalex.org/W2129700183","https://openalex.org/W2945389153","https://openalex.org/W153262387","https://openalex.org/W2348000104"],"abstract_inverted_index":{"Analyzing":[0],"the":[1,18,23,46,53],"log":[2,27,47],"file":[3],"for":[4,12],"software":[5],"or":[6,30],"device":[7],"provides":[8],"a":[9,61],"focal":[10],"point":[11],"making":[13],"incremental":[14],"improvements;":[15],"it":[16],"is":[17],"performed":[19],"step":[20],"to":[21],"start":[22],"incident":[24],"analysis.":[25],"Although,":[26],"messages":[28],"format":[29],"contents":[31],"may":[32],"not":[33],"always":[34],"be":[35],"fully":[36],"documented,":[37],"and":[38,58],"described":[39],"in":[40],"many":[41],"different":[42],"formats.":[43],"It":[44],"makes":[45],"analysis":[48],"task":[49],"more":[50],"difficult,":[51],"affects":[52],"correction":[54],"deadline":[55],"of":[56],"incidents":[57],"therefore":[59],"involves":[60],"high":[62],"financial":[63],"risk.":[64]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
