Cited By
View all- Jungwirth GSaha ASchröder MFiebig TLindorfer MCito J(2023)Connecting the .dotfiles: Checked-In Secret Exposure with Extra (Lateral Movement) Steps2023 IEEE/ACM 20th International Conference on Mining Software Repositories (MSR)10.1109/MSR59073.2023.00051(322-333)Online publication date: May-2023
- Li ZLuo CChen TShang WHe SLin QZhang D(2023)Did We Miss Something Important? Studying and Exploring Variable-Aware Log Abstraction2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE)10.1109/ICSE48619.2023.00078(830-842)Online publication date: May-2023
- Sun LXu X(2023)SNNLog: A Log Parsing Scheme with Siamese Network and Fixed Depth Tree in Networks2023 26th International Conference on Computer Supported Cooperative Work in Design (CSCWD)10.1109/CSCWD57460.2023.10152745(1025-1030)Online publication date: 24-May-2023
- Show More Cited By