The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2017 IEEE International Conference on Big Data (Big Data) 2017
DOI: 10.1109/bigdata.2017.8258034
|View full text |Cite
|
Sign up to set email alerts
|

WEAC: Word embeddings for anomaly classification from event logs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 12 publications
0
11
0
1
Order By: Relevance
“…The applied anomaly detection techniques based on one-class SVM and k-medoids cluster dissimilarity are probably for the first time combined with the GloVe representation, applied to text data, and compared to their counterparts using the bag of words representation. Prior work using word2vec for anomaly detection (Bertero et al 2017;Pande and Ahuja 2017;Bakarov et al 2018) did not combine it with clustering-based detection methods and did not include comparisons with bag of words. 3.…”
Section: Noveltymentioning
confidence: 99%
See 3 more Smart Citations
“…The applied anomaly detection techniques based on one-class SVM and k-medoids cluster dissimilarity are probably for the first time combined with the GloVe representation, applied to text data, and compared to their counterparts using the bag of words representation. Prior work using word2vec for anomaly detection (Bertero et al 2017;Pande and Ahuja 2017;Bakarov et al 2018) did not combine it with clustering-based detection methods and did not include comparisons with bag of words. 3.…”
Section: Noveltymentioning
confidence: 99%
“…This work revisits the less popular but more easily and widely applicable idea of applying general-purpose algorithms to text transformed to a vector representation (Manevitz and Yousef 2002). There is already some evidence that recent developments in word embeddings make this path more useful (Bertero et al 2017;Pande and Ahuja 2017;Bakarov et al 2018).…”
Section: Unsupervised Anomaly Detectionmentioning
confidence: 99%
See 2 more Smart Citations
“…3. Перед применением алгоритма классификации временные окна каждого журнала проходят процесс приведения к нормальному виду, построение векторного представления [16] и присвоения каждому слову весовых коэффициентов TF-IDF [17]. 4.…”
Section: использование журналов спо схд для диагностики неисправностейunclassified