Official implementation of "FastLogAD: Log Anomaly Detection with Mask-Guided Pseudo Anomaly Generation and Discrimination"
☆10Apr 17, 2024Updated last year
Alternatives and similar repositories for FastLogAD
Users that are interested in FastLogAD are comparing it to the libraries listed below
Sorting:
- Log anomaly detection based on MogrifierLSTM + CNN☆14Apr 23, 2022Updated 3 years ago
- Short paper published in ICSE'24☆27Oct 31, 2025Updated 4 months ago
- Artifact of TOSEM accepted paper: "Try with Simpler - An Evaluation of Improved PCA in Log-based Anomaly Detection."☆13Dec 31, 2022Updated 3 years ago
- Full pipeline for log analysis and anomaly detection.☆18Feb 11, 2020Updated 6 years ago
- ☆14Aug 28, 2022Updated 3 years ago
- Log-based anomaly detection☆15Jul 2, 2025Updated 8 months ago
- ☆18Dec 3, 2019Updated 6 years ago
- RAPID: Training-free Retrieval-based Log Anomaly Detection with PLM considering Token-level information☆18Jul 11, 2024Updated last year
- [AAAI 2024] LogFormer: A Pre-train and Tuning Pipeline for Log Anomaly Detection☆52May 27, 2024Updated last year
- Codebase for the ICKG 2023 paper: "GLAD: Content-aware Dynamic Graphs For Log Anomaly Detection".☆22Feb 16, 2024Updated 2 years ago
- Log anomaly detection model using a CNN with TF-IDF and sliding window feature extraction.☆52Sep 28, 2021Updated 4 years ago
- There are many studies done to detect anomalies based on logs. Current approaches are mainly divided into three categories: supervised le…☆10Jan 10, 2022Updated 4 years ago
- ☆11May 3, 2019Updated 6 years ago
- 该资源为安全相关的数据集,包括恶意URL、恶意流量、图像分类、恶意软件等,希望对您有所帮助~☆10Apr 21, 2021Updated 4 years ago
- Archive for different contests' problemset and editorial managed by BAPS.☆22Dec 23, 2025Updated 2 months ago
- PyTorch implements "DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning"☆99Jun 22, 2025Updated 8 months ago
- Experimental syslog template mining module☆11Aug 29, 2016Updated 9 years ago
- ☆13May 24, 2025Updated 9 months ago
- 毕业设计——基于区块链的证书管理系统☆13Apr 21, 2022Updated 3 years ago
- Log-based Anomaly Detection with Deep Learning: How Far Are We? (ICSE 2022, Technical Track)☆214Sep 27, 2024Updated last year
- log anomaly detection toolkit including DeepLog☆455Apr 23, 2020Updated 5 years ago
- eAudit suite for recording provenance-related system calls on Linux☆18Jan 16, 2026Updated last month
- Usenix Security'23☆16Feb 14, 2023Updated 3 years ago
- A React cheatsheet, going from beginners to advanced level☆13Sep 24, 2023Updated 2 years ago
- LogLLM: Log-based Anomaly Detection Using Large Language Models (system log anomaly detection)☆177Dec 9, 2025Updated 2 months ago
- "Self-supervised Log Parsing" submitted for review at ECML-PKDD 2020☆60Jul 6, 2023Updated 2 years ago
- CAShift: Benchmarking Log-Based Cloud Attack Detection under Normality Shift (FSE 2025)☆13May 19, 2025Updated 9 months ago
- Supplementary materials for paper "On the Effectiveness of Log Representation for Log-based Anomaly Detection"☆12Dec 1, 2023Updated 2 years ago
- ☆28Apr 14, 2025Updated 10 months ago
- Public Arena dataset☆14Jul 20, 2022Updated 3 years ago
- ☆18Aug 30, 2024Updated last year
- Anomaly detection is a critical step towards building a secure and trustworthy system. The primary purpose of a system log is to record s…☆14Dec 7, 2021Updated 4 years ago
- ☆13Jun 27, 2023Updated 2 years ago
- GraphChi's C++ version. Big Data - small machine.☆17Nov 29, 2020Updated 5 years ago
- This is our solution for ICASSP-SPGC 2022 AIOps Challenge in Communication Networks☆18Apr 3, 2022Updated 3 years ago
- PyTorch implementation of Deeplog: Anomaly detection and diagnosis from system logs through deep learning☆272Aug 19, 2024Updated last year
- AFDX protocol dissector for wireshark☆16Jun 17, 2019Updated 6 years ago
- 集成SQL语句测评和学生管理的数据库系统实验平台,可用于毕设和大作业,欢迎提issue和pr。☆19Oct 17, 2022Updated 3 years ago
- A embedding method for Cyber Threat Intelligence☆22Dec 2, 2018Updated 7 years ago