{"id":"https://openalex.org/W7125121958","doi":"https://doi.org/10.48550/arxiv.2601.12978","title":"Reproducibility in Event-Log Research: A Parametrised Generator and Benchmark for Event-based Signatures","display_name":"Reproducibility in Event-Log Research: A Parametrised Generator and Benchmark for Event-based Signatures","publication_year":2026,"publication_date":"2026-01-19","ids":{"openalex":"https://openalex.org/W7125121958","doi":"https://doi.org/10.48550/arxiv.2601.12978"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2601.12978","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.12978","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2601.12978","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123505402","display_name":"Saad Khan","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Khan, Saad","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037686924","display_name":"Simon Parkinson","orcid":"https://orcid.org/0000-0002-1747-9914"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Parkinson, Simon","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5087829338","display_name":"Monika Roopak","orcid":"https://orcid.org/0000-0002-3654-6035"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Roopak, Monika","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5123505402"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.17219999432563782,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.17219999432563782,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.094200000166893,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.08720000088214874,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/benchmarking","display_name":"Benchmarking","score":0.8463000059127808},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.8424000144004822},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.6924999952316284},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6223999857902527},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6152999997138977},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.5788999795913696},{"id":"https://openalex.org/keywords/generator","display_name":"Generator (circuit theory)","score":0.5442000031471252},{"id":"https://openalex.org/keywords/data-validation","display_name":"Data validation","score":0.34860000014305115}],"concepts":[{"id":"https://openalex.org/C86251818","wikidata":"https://www.wikidata.org/wiki/Q816754","display_name":"Benchmarking","level":2,"score":0.8463000059127808},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.8424000144004822},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7979999780654907},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.6924999952316284},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.649399995803833},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6223999857902527},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6152999997138977},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.5788999795913696},{"id":"https://openalex.org/C2780992000","wikidata":"https://www.wikidata.org/wiki/Q17016113","display_name":"Generator (circuit theory)","level":3,"score":0.5442000031471252},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.42739999294281006},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.37389999628067017},{"id":"https://openalex.org/C92446256","wikidata":"https://www.wikidata.org/wiki/Q3306762","display_name":"Data validation","level":2,"score":0.34860000014305115},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3393999934196472},{"id":"https://openalex.org/C20556612","wikidata":"https://www.wikidata.org/wiki/Q4469374","display_name":"Volume (thermodynamics)","level":2,"score":0.32499998807907104},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.3142000138759613},{"id":"https://openalex.org/C2778135862","wikidata":"https://www.wikidata.org/wiki/Q5416719","display_name":"Event monitoring","level":3,"score":0.29269999265670776},{"id":"https://openalex.org/C2987896495","wikidata":"https://www.wikidata.org/wiki/Q5416716","display_name":"Event data","level":3,"score":0.2849000096321106},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.2827000021934509},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.28110000491142273},{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.2775000035762787},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.27300000190734863},{"id":"https://openalex.org/C111442797","wikidata":"https://www.wikidata.org/wiki/Q7291446","display_name":"Rand index","level":3,"score":0.25999999046325684}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2601.12978","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.12978","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2601.12978","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.12978","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Event-based":[0],"datasets":[1,36,59,72,125],"are":[2,30,73],"crucial":[3],"for":[4,39,65,100,130],"cybersecurity":[5,178,187],"analysis.":[6],"A":[7],"key":[8],"use":[9],"case":[10],"is":[11,37],"detecting":[12],"event-based":[13,128],"signatures,":[14],"which":[15],"represent":[16],"attacks":[17],"spanning":[18],"multiple":[19],"events":[20,29],"and":[21,32,47,52,62,75,110,175,185],"can":[22],"only":[23],"be":[24],"understood":[25],"once":[26],"the":[27,134,137,149,169],"relevant":[28],"identified":[31],"linked.":[33],"Analysing":[34],"event":[35,102,124],"essential":[38],"monitoring":[40],"system":[41],"security,":[42],"but":[43],"their":[44],"growing":[45],"volume":[46],"frequency":[48],"create":[49],"significant":[50],"scalability":[51],"processing":[53],"difficulties.":[54],"Researchers":[55],"rely":[56],"on":[57,162],"these":[58],"to":[60,81,173,182],"develop":[61,174],"test":[63],"techniques":[64],"automatically":[66],"identifying":[67],"signatures.":[68],"However,":[69],"because":[70],"real":[71],"security-sensitive":[74],"rarely":[76],"shared,":[77],"it":[78],"becomes":[79],"difficult":[80],"perform":[82],"meaningful":[83],"comparative":[84],"evaluation":[85,93],"between":[86],"different":[87],"approaches.":[88],"This":[89,166],"work":[90,167],"addresses":[91],"this":[92],"limitation":[94],"by":[95],"offering":[96],"a":[97,115,141,154],"systematic":[98],"method":[99],"generating":[101],"logs":[103],"with":[104],"known":[105],"ground":[106],"truth,":[107],"enabling":[108],"reproducible":[109],"comparable":[111],"research.":[112],"We":[113],"present":[114],"novel":[116],"parametrised":[117],"generation":[118],"technique":[119],"capable":[120],"of":[121,136,151,171],"producing":[122],"synthetic":[123],"that":[126],"contain":[127],"signatures":[129],"discovery.":[131],"To":[132],"demonstrate":[133],"capabilities":[135],"technique,":[138],"we":[139],"provide":[140],"benchmark":[142,176],"in":[143],"signature":[144],"detection.":[145],"Our":[146],"benchmarking":[147],"demonstrated":[148],"suitability":[150],"DBSCAN,":[152],"achieving":[153],"score":[155],"greater":[156],"than":[157],"0.95":[158],"Adjusted":[159],"Rand":[160],"Index":[161],"most":[163],"generated":[164],"datasets.":[165],"enhances":[168],"ability":[170],"researchers":[172],"new":[177],"techniques,":[179],"ultimately":[180],"contributing":[181],"more":[183],"robust":[184],"effective":[186],"measures.":[188]},"counts_by_year":[],"updated_date":"2026-01-22T23:33:04.759266","created_date":"2026-01-22T00:00:00"}
