Search

  • Select Article Type
  • Abstract Supplements
  • Blood Group Review
  • Call to Arms
  • Hypothesis
  • In Memoriam
  • Interview
  • Introduction
  • Short Report
  • abstract
  • Abstracts
  • Article
  • book-review
  • case-report
  • case-study
  • Clinical Practice
  • Commentary
  • Conference Presentation
  • conference-report
  • congress-report
  • Correction
  • critical-appraisal
  • Editorial
  • Editorial Comment
  • Erratum
  • Events
  • Letter
  • Letter to Editor
  • mini-review
  • minireview
  • News
  • non-scientific
  • Obituary
  • original-paper
  • Original Research
  • Pictorial Review
  • Position Paper
  • Practice Report
  • Preface
  • Preliminary report
  • Product Review
  • rapid-communication
  • Report
  • research-article
  • Research Communicate
  • research-paper
  • Research Report
  • Review
  • review -article
  • review-article
  • review-paper
  • Review Paper
  • Sampling Methods
  • Scientific Commentary
  • short-communication
  • short-report
  • Student Essay
  • Varia
  • Welome
  • Select Journal
  • International Journal Advanced Network Monitoring Controls

 

Article | 11-January-2021

Review of Anomaly Detection Based on Log Analysis

failure problems were not logged. At this time, maintenance personnel are required to manually find the cause of the problem. Due to the large amount of code, The time invested is much more. High-quality software code can greatly help the detection efficiency after a program error occurs. Log records at key locations are an important means to ensure that the abnormality can be quickly located and repaired. Therefore, it is necessary to add log records to key positions of the program, and log analysis

Xudong Wu

International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 4, 40–49

No Record Found..
Page Actions