LogExpert: Log-based Recommended Resolutions Generation using Large Language Model
Abstract
References
Index Terms
- LogExpert: Log-based Recommended Resolutions Generation using Large Language Model
Recommendations
GenGLAD: A Generated Graph Based Log Anomaly Detection Framework
Smart Computing and CommunicationAbstractInformation systems record the current states and the access records in logs, so logs become the data basis for detecting anomalies of system security. To realize log anomaly detection, frameworks based on text, sequence, and graph are applied. ...
HEART: Heterogeneous Log Anomaly Detection Using Robust Transformers
Discovery ScienceAbstractLog sequences generated by heterogeneous systems are critical for understanding computer system behaviour and ensuring operational and security integrity. However, the diverse formats, structures, and content of logs pose challenges for ...
Log Attention – Assessing Software Releases with Attention-Based Log Anomaly Detection
Service-Oriented Computing – ICSOC 2021 WorkshopsAbstractA Software Engineering Manager (EM) has to cater to the demand for higher reliability and resilience in Production while simultaneously addressing the evolution of software architecture from monolithic applications to multi-cloud distributed ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- Co-chairs:
- Ana Paiva,
- Rui Abreu,
- Robert Hierons,
- Henrique Madeira,
- Program Co-chairs:
- Abhik Roychoudhury,
- Margaret Storey
Sponsors
In-Cooperation
- Faculty of Engineering of University of Porto
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Upcoming Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 293Total Downloads
- Downloads (Last 12 months)293
- Downloads (Last 6 weeks)44
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in