Cited By
View all- Fei KZhou JZhou YGu XFan HLi BWang WChen Y(2025)LaAeb: A comprehensive log-text analysis based approach for insider threat detectionComputers & Security10.1016/j.cose.2024.104126148(104126)Online publication date: Jan-2025
- Uchida HTominaga KItai HLi YNakatoh Y(2024)Verification of Generalizability in Software Log Anomaly Detection ModelsAnomaly Detection - Recent Advances, AI and ML Perspectives and Applications10.5772/intechopen.111938Online publication date: 17-Jan-2024
- Zhou YChen YRao XZhou YLi YHu C(2024)Leveraging Large Language Models and BERT for Log Parsing and Anomaly DetectionMathematics10.3390/math1217275812:17(2758)Online publication date: 5-Sep-2024
- Show More Cited By