• Aucun résultat trouvé

A systematic literature review on automated log abstraction techniques

N/A
N/A
Protected

Academic year: 2021

Partager "A systematic literature review on automated log abstraction techniques"

Copied!
23
0
0

Texte intégral

Loading

Figure

Figure 1: Log Mining Pipeline
Figure 2: Log Mining Process
Figure 5: Log-Abstraction Phases
Figure 6: Papers Selection Process
+4

Références

Documents relatifs

- Data Segregation - Access Managment - Availability & Backup - Data Privacy, Security - Secure Data Deletion - Data Loss & Leakage - User Access.. - Application

The cognitive status of the patient influences the process, so on the one hand demented patients often have an extended latency period and are more often inattentive in a

2016 ESORICS Mobile Application Impersonation Detection Using Dynamic User Interface Extraction 2016 AST Automated test generation for detection of leaks in Android applications.

2014 ACM PPREW (W) Multi-App Security Analysis with FUSE : Statically Detecting Android App Collusion [70] 2014 IEEE SERE Protection against Code Obfuscation Attacks based on

Method: We have performed a systematic literature review which involves studying around 90 research papers published in software engineering, programming languages and security

(2000), however, referred to research outcomes that have shown genetic variation in winter wheat for NUpE and also for NUtE expressed as the ratio of grain yield to total plant N,

123 peer- reviewed academic research papers in field of IT consulting were considered for this systematic literature review.. After filtering these papers, eventually 52 papers

This section illustrates the procedure adopted for selecting the studies (section 2.1) for systematic literature review for investigating blockchain offers to businesses in relation