[1] |
AGRAWAL R,SRIKANT R.Mining sequentialp patterns[C]//Proceedings of the 11th International Conference on Data Engineering.Washington D.C.,USA:IEEE Press,1995:3-14.
|
[2] |
NWALD P D.The minimum description length principle (adaptive computation and machine learning)[M].Cambridge,USA:MIT Press,2007.
|
[3] |
TATTI N,VREEKEN J.The long and the short of it:summarising event sequences with serial episodes[C]//Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.New York,USA:ACM Press,2012:462-470.
|
[4] |
LAM H T,MÖRCHEN F,FRADKIN D,et al.Mining compressing sequential patterns[J].Statistical Analysis and Data Mining:the ASA Data Science Journal,2014,7(1):34-52.
|
[5] |
IBRAHIM A,SASTRY S,SASTRY P S.Discovering compressing serial episodes from event sequences[J].Knowledge and Information Systems,2016,47(2):405-432.
|
[6] |
MIN D,LI F,ZHENG G,et al.DeepLog:anomaly detection and diagnosis from system logs through deep learning[C]//Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security.New York,USA:ACM Press,2017:1285-1298.
|
[7] |
XIAO Y,JOSHI P,XU J,et al.CloudSeer:workflow monitoring of cloud infrastructures via interleaved logs[C]//Proceedings of the 21st International Conference on Architectural Support for Programming Languages and Operating Systems.New York,USA:ACM Press,2016:489-502.
|
[8] |
SHUANG Kai,LI Yiwen,LÜ Zhiheng,et al.Log template extraction algorithm based on normalized feature discrimination[J].Journal of Beijing University of Posts and Telecommunications,2020,43(1):68-73.(in Chinese)双锴,李怡雯,吕志恒,等.基于归一化特征判别的日志模板挖掘算法[J].北京邮电大学学报,2020,43(1):68-73.
|
[9] |
WANG Weihua,YING Shi,JIA Xiangyang,et al.A multi-type failure prediction method based on log clustering[J].Computer Engineering,2018,44(7):67-73(in Chinese)王卫华,应时,贾向阳,等.一种基于日志聚类的多类型故障预测方法[J].计算机工程.2018,44(7):67-73.
|
[10] |
HE S L,ZHU J M,HE P J,et al.Experience report:system log analysis for anomaly detection[C]//Proceedings of the 27th International Symposium on Software Reliability Engineering.Washington D.C.,USA:IEEE Press,2016:207-218.
|
[11] |
JIAN P,HAN J,MORTAZAVI-ASL B,et al.PrefixSpan:mining sequential patterns by prefix-projected growth[C]//Proceedings of the 17th International Conference on Data Engineering.New York,USA:ACM Press,2001:215-224.
|
[12] |
GOMARIZ A,CAMPOS M,MARIN R,et al.ClaSP:an efficient algorithm for mining frequent closed sequences[EB/OL].[2019-12-10].http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=30AC1EBBDC64DA97300F9BCB9A1606B1?doi=10.1.1.377.3720&rep=rep1&type=pdf.
|
[13] |
GUAN Enzheng,CHANG Xiaoyu,WANG Zhe,et al.Mining maximal sequential patterns[C]//Proceedings of International Conference on Neural Networks and Brain.Washington D.C.,USA:IEEE Press,2005:525-528.
|
[14] |
HU J Y,MOJSILOVIC A.High-utility pattern mining:a method for discovery of high-utility item sets[J].Pattern Recognition,2007,40(11):3317-3324.
|
[15] |
TZVETKOV P,YAN X,HAN J.TSP:mining top-k closed sequential patterns[J].Knowledge and Information Systems,2005,7(4):438-457.
|
[16] |
VREEKEN J,VAN LEEUWEN M,SIEBES A.Krimp:mining itemsets that compress[J].Data Mining and Knowledge Discovery,2011,23(1):169-214.
|
[17] |
FU Q,LOU J G,WANG Y,et al.Execution anomaly detection in distributed systems through unstructured log analysis[C]//Proceedings of the 9th IEEE International Conference on Data Mining.Washington D.C.,USA:IEEE Press,2009:149-158.
|
[18] |
HE P J,ZHU J M,ZHENG Z B,et al.Drain:an online log parsing approach with fixed depth tree[C]//Proceedings of 2017 IEEE International Conference on Web Services.Washington D.C.,USA:IEEE Press,2017:33-40.
|
[19] |
FOWKES J,SUTTON C.A subsequence interleaving model for sequential pattern mining[C]//Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.New York,USA:ACM Press,2016:835-844.
|
[20] |
YAN Y,CAO L,MADDEN S,et al.SWIFT:mining representative patterns from large event streams[EB/OL].[2019-12-10].https://arxiv.org/pdf/1602.05012.pdf.
|