“…Researchers have been trying several different techniques, such as deep learning and NLP ( Du et al, 2017 ; Bertero et al, 2017 ; Meng et al, 2019 ; Zhang et al, 2019 ), data mining, statistical learning methods, and machine learning ( Lu et al, 2017 ; He et al, 2016b ; Ghanbari, Hashemi & Amza, 2014 ; Tang & Iyer, 1992 ; Lim, Singh & Yajnik, 2008 ; Xu et al, 2009b , Xu et al, 2009a ) control flow graph mining from execution logs ( Nandi et al, 2016 ), finite state machines ( Fu et al, 2009 ; Debnath et al, 2018 ), frequent itemset mining ( Lim, Singh & Yajnik, 2008 ), dimensionality reduction techniques ( Juvonen, Sipola & Hämäläinen, 2015 ), grammar compression of log sequences ( Gao et al, 2014 ), and probabilistic suffix trees ( Bao et al, 2018 ).…”