
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Survey of Deep Anomaly Detection for System Logs
Xiaoqing Zhao, Zhongyuan Jiang, Jianfeng Ma
2022 International Joint Conference on Neural Networks (IJCNN) (2022), pp. 1-8
Closed Access | Times Cited: 11
Xiaoqing Zhao, Zhongyuan Jiang, Jianfeng Ma
2022 International Joint Conference on Neural Networks (IJCNN) (2022), pp. 1-8
Closed Access | Times Cited: 11
Showing 11 citing articles:
Machine learning- and deep learning-based anomaly detection in firewalls: a survey
Hanen Dhrir, Maha Charfeddine, Nesrine Tarhouni, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 6
Closed Access
Hanen Dhrir, Maha Charfeddine, Nesrine Tarhouni, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 6
Closed Access
Adaptive dynamic graphs for anomaly detection via inter- and intra-diffusion
Ziqi Yuan, Haoyi Zhou, Qingyun Sun
International Journal of Machine Learning and Cybernetics (2025)
Closed Access
Ziqi Yuan, Haoyi Zhou, Qingyun Sun
International Journal of Machine Learning and Cybernetics (2025)
Closed Access
Robust Procedural Learning for Anomaly Detection and Observability in 5G RAN
Tobias Sundqvist, Monowar Bhuyan, Erik Elmroth
IEEE Transactions on Network and Service Management (2023) Vol. 21, Iss. 2, pp. 1432-1445
Closed Access | Times Cited: 4
Tobias Sundqvist, Monowar Bhuyan, Erik Elmroth
IEEE Transactions on Network and Service Management (2023) Vol. 21, Iss. 2, pp. 1432-1445
Closed Access | Times Cited: 4
Unsupervised Log Sequence Segmentation
W Dobrowolski, Mikołj Libura, Maciej Nikodem, et al.
IEEE Access (2024) Vol. 12, pp. 79003-79013
Open Access | Times Cited: 1
W Dobrowolski, Mikołj Libura, Maciej Nikodem, et al.
IEEE Access (2024) Vol. 12, pp. 79003-79013
Open Access | Times Cited: 1
Transformer-based Sentiment Analysis for Anomaly Detection on Drone Forensic Timeline
Swardiantara Silalahi, Tohari Ahmad, Hudan Studiawan
(2023)
Closed Access | Times Cited: 3
Swardiantara Silalahi, Tohari Ahmad, Hudan Studiawan
(2023)
Closed Access | Times Cited: 3
Software Failure Log Analysis for Engineers—Review
W Dobrowolski, Maciej Nikodem, Olgierd Unold
Electronics (2023) Vol. 12, Iss. 10, pp. 2260-2260
Open Access | Times Cited: 2
W Dobrowolski, Maciej Nikodem, Olgierd Unold
Electronics (2023) Vol. 12, Iss. 10, pp. 2260-2260
Open Access | Times Cited: 2
Drone Flight Log Anomaly Severity Classification via Sentence Embedding
Swardiantara Silalahi, Tohari Ahmad, Hudan Studiawan
(2023) Vol. 12, pp. 100-105
Closed Access | Times Cited: 1
Swardiantara Silalahi, Tohari Ahmad, Hudan Studiawan
(2023) Vol. 12, pp. 100-105
Closed Access | Times Cited: 1
Landscape and Taxonomy of Online Parser-Supported Log Anomaly Detection Methods
Scott Lupton, Hironori Washizaki, Nobukazu Yoshioka, et al.
IEEE Access (2024) Vol. 12, pp. 78193-78218
Open Access
Scott Lupton, Hironori Washizaki, Nobukazu Yoshioka, et al.
IEEE Access (2024) Vol. 12, pp. 78193-78218
Open Access
Severity-Oriented Multiclass Drone Flight Logs Anomaly Detection
Swardiantara Silalahi, Tohari Ahmad, Hudan Studiawan, et al.
IEEE Access (2024) Vol. 12, pp. 64252-64266
Open Access
Swardiantara Silalahi, Tohari Ahmad, Hudan Studiawan, et al.
IEEE Access (2024) Vol. 12, pp. 64252-64266
Open Access
Improving the Accuracy of Anomaly Detection from System Audit Logs via Heterogeneous Provenance Graphs
Qiangyi Wu, Yiyu Xiang
2022 International Conference on Networking and Network Applications (NaNA) (2024), pp. 529-535
Closed Access
Qiangyi Wu, Yiyu Xiang
2022 International Conference on Networking and Network Applications (NaNA) (2024), pp. 529-535
Closed Access
A Multi-feature Fusion Method for Web Scanning Behavior Detection in Online Web Logs
Qianqian Zhao, Bo Liu, Hepei Wu, et al.
(2023), pp. 246-252
Closed Access
Qianqian Zhao, Bo Liu, Hepei Wu, et al.
(2023), pp. 246-252
Closed Access