We propose the Base-(k+1) Graph, which is finite-time convergence for any number of nodes and maximum degree $k$, Thanks to this property, the Base-(k+1) Graph ...
Abstract: Modern software systems generate a large amount of logs during runtime, which reflect the system's operational status. The reliability of system services relies on automatic log anomaly ...
Abstract: Host log contains rich semantic information, which is meaningful for cyber attack detection, cyber attack tracing and forensic. We propose a method that leverages the RoBERTa model to detect ...