
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
LAnoBERT: System log anomaly detection based on BERT masked language model
Yukyung Lee, Jina Kim, Pilsung Kang
Applied Soft Computing (2023) Vol. 146, pp. 110689-110689
Open Access | Times Cited: 38
Yukyung Lee, Jina Kim, Pilsung Kang
Applied Soft Computing (2023) Vol. 146, pp. 110689-110689
Open Access | Times Cited: 38
Showing 1-25 of 38 citing articles:
Anomaly diagnosis of connected autonomous vehicles: A survey
Yukun Fang, Haigen Min, Xia Wu, et al.
Information Fusion (2024) Vol. 105, pp. 102223-102223
Closed Access | Times Cited: 12
Yukun Fang, Haigen Min, Xia Wu, et al.
Information Fusion (2024) Vol. 105, pp. 102223-102223
Closed Access | Times Cited: 12
LogFiT: Log Anomaly Detection Using Fine-Tuned Language Models
Crispin Almodovar, Fariza Sabrina, Sarvnaz Karimi, et al.
IEEE Transactions on Network and Service Management (2024) Vol. 21, Iss. 2, pp. 1715-1723
Open Access | Times Cited: 10
Crispin Almodovar, Fariza Sabrina, Sarvnaz Karimi, et al.
IEEE Transactions on Network and Service Management (2024) Vol. 21, Iss. 2, pp. 1715-1723
Open Access | Times Cited: 10
Large Language Models Meet Next-Generation Networking Technologies: A Review
Ching Nam Hang, Pei-Duo Yu, Roberto Morabito, et al.
Future Internet (2024) Vol. 16, Iss. 10, pp. 365-365
Open Access | Times Cited: 5
Ching Nam Hang, Pei-Duo Yu, Roberto Morabito, et al.
Future Internet (2024) Vol. 16, Iss. 10, pp. 365-365
Open Access | Times Cited: 5
Generalizable and Robust Log Anomaly Detection Based on Transformer
Z. Lou, Xiaolin Chai, Ce Shang, et al.
Communications in computer and information science (2025), pp. 168-177
Closed Access
Z. Lou, Xiaolin Chai, Ce Shang, et al.
Communications in computer and information science (2025), pp. 168-177
Closed Access
SemiRALD: A semi-supervised hybrid language model for Robust Anomalous Log Detection
Yicheng Sun, Jacky Keung, Zhen Yang, et al.
Information and Software Technology (2025), pp. 107743-107743
Closed Access
Yicheng Sun, Jacky Keung, Zhen Yang, et al.
Information and Software Technology (2025), pp. 107743-107743
Closed Access
CAN-BERT do it? Controller Area Network Intrusion Detection System based on BERT Language Model
Natasha Alkhatib, Maria Mushtaq, Hadi Ghauch, et al.
(2022)
Open Access | Times Cited: 19
Natasha Alkhatib, Maria Mushtaq, Hadi Ghauch, et al.
(2022)
Open Access | Times Cited: 19
Proceedings of the 2024 ACM/IEEE 44th International Conference on Software Engineering: New Ideas and Emerging Results
(2024)
Open Access | Times Cited: 4
(2024)
Open Access | Times Cited: 4
LogCTBL: a hybrid deep learning model for log-based anomaly detection
Hong Huang, Wengang Luo, Yunfei Wang, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 2
Closed Access
Hong Huang, Wengang Luo, Yunfei Wang, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 2
Closed Access
MidLog: An automated log anomaly detection method based on multi-head GRU
Wanli Yuan, Shi Hui Ying, Xiaoyu Duan, et al.
Journal of Systems and Software (2025), pp. 112431-112431
Closed Access
Wanli Yuan, Shi Hui Ying, Xiaoyu Duan, et al.
Journal of Systems and Software (2025), pp. 112431-112431
Closed Access
Improvement of Multi-Parameter Anomaly Detection Method: Addition of a Relational Token Between Parameters
Hironori Uchida, Keitaro Tominaga, Hideki Itai, et al.
Cognitive Robotics (2025)
Open Access
Hironori Uchida, Keitaro Tominaga, Hideki Itai, et al.
Cognitive Robotics (2025)
Open Access
Large language models and unsupervised feature learning: implications for log analysis
Egil Karlsen, Xiao Luo, A. Nur Zincir‐Heywood, et al.
Annals of Telecommunications (2024)
Closed Access | Times Cited: 3
Egil Karlsen, Xiao Luo, A. Nur Zincir‐Heywood, et al.
Annals of Telecommunications (2024)
Closed Access | Times Cited: 3
A Review of Advancements and Applications of Pre-Trained Language Models in Cybersecurity
Zefang Liu
(2024), pp. 1-10
Closed Access | Times Cited: 3
Zefang Liu
(2024), pp. 1-10
Closed Access | Times Cited: 3
Training-free retrieval-based log anomaly detection with pre-trained language model considering token-level information
Gunho No, Yukyung Lee, Hyeongwon Kang, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108613-108613
Closed Access | Times Cited: 2
Gunho No, Yukyung Lee, Hyeongwon Kang, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108613-108613
Closed Access | Times Cited: 2
Interpretable Spatial–Temporal Graph Convolutional Network for System Log Anomaly Detection
Rucong Xu, Yun Li
Advanced Engineering Informatics (2024) Vol. 62, pp. 102803-102803
Closed Access | Times Cited: 2
Rucong Xu, Yun Li
Advanced Engineering Informatics (2024) Vol. 62, pp. 102803-102803
Closed Access | Times Cited: 2
A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities
Diana Levshun, Igor Kotenko
Research Square (Research Square) (2022)
Closed Access | Times Cited: 10
Diana Levshun, Igor Kotenko
Research Square (Research Square) (2022)
Closed Access | Times Cited: 10
SaRLog: Semantic-Aware Robust Log Anomaly Detection via BERT-Augmented Contrastive Learning
Lelisa Adeba Jilcha, Deuk-Hun Kim, Jin Kwak
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 13, pp. 23727-23736
Open Access | Times Cited: 1
Lelisa Adeba Jilcha, Deuk-Hun Kim, Jin Kwak
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 13, pp. 23727-23736
Open Access | Times Cited: 1
Machine Reasoning in FCAPS: Towards Enhanced Beyond 5G Network Management
Abdelkader Mekrache, Adlen Ksentini, Christos Verikoukis
IEEE Communications Surveys & Tutorials (2024) Vol. 26, Iss. 4, pp. 2769-2797
Closed Access | Times Cited: 1
Abdelkader Mekrache, Adlen Ksentini, Christos Verikoukis
IEEE Communications Surveys & Tutorials (2024) Vol. 26, Iss. 4, pp. 2769-2797
Closed Access | Times Cited: 1
Using Transformers to Classify Arabic Dialects on Social Networks
Berhoum Adel, Mohammad Charaf Eddine Meftah, Abdelkader Laouid, et al.
(2024) Vol. 9, pp. 1-7
Closed Access | Times Cited: 1
Berhoum Adel, Mohammad Charaf Eddine Meftah, Abdelkader Laouid, et al.
(2024) Vol. 9, pp. 1-7
Closed Access | Times Cited: 1
Lightweight Multi-Task Learning Method for System Log Anomaly Detection
Tuan-Anh Pham, Jonghoon Lee
IEEE Access (2024) Vol. 12, pp. 147739-147752
Open Access | Times Cited: 1
Tuan-Anh Pham, Jonghoon Lee
IEEE Access (2024) Vol. 12, pp. 147739-147752
Open Access | Times Cited: 1
Enhancing Log Anomaly Detection through Knowledge Graph Integration
G.-H. Chen, Tai-Ju Yang, Chien Chin Chen
(2024), pp. 204-207
Closed Access
G.-H. Chen, Tai-Ju Yang, Chien Chin Chen
(2024), pp. 204-207
Closed Access
Neural Network-Based Log Anomaly Detection Algorithm for 6G Wireless Integrated Cyber-Physical System
Junjie Shen, Ranran Tie, Zujin Li, et al.
Wireless Personal Communications (2024)
Closed Access
Junjie Shen, Ranran Tie, Zujin Li, et al.
Wireless Personal Communications (2024)
Closed Access
Leveraging Large Language Models and BERT for Log Parsing and Anomaly Detection
Yihan Zhou, Yan Chen, X. L. Rao, et al.
Mathematics (2024) Vol. 12, Iss. 17, pp. 2758-2758
Open Access
Yihan Zhou, Yan Chen, X. L. Rao, et al.
Mathematics (2024) Vol. 12, Iss. 17, pp. 2758-2758
Open Access
Personalised soft prompt tuning in pre-trained language models: Bridging multitask transfer learning and crowdsourcing learning
Zeshu Tian, Hongli Zhang, Yan Wang
Knowledge-Based Systems (2024), pp. 112646-112646
Closed Access
Zeshu Tian, Hongli Zhang, Yan Wang
Knowledge-Based Systems (2024), pp. 112646-112646
Closed Access
LogCSS: Log anomaly detection based on BERT-CNN with context-semantics-statistics features
Zhongliang Li, Xuezhen Tu, Hong Gao, et al.
Journal of Intelligent & Fuzzy Systems (2024) Vol. 46, Iss. 4, pp. 7659-7676
Closed Access
Zhongliang Li, Xuezhen Tu, Hong Gao, et al.
Journal of Intelligent & Fuzzy Systems (2024) Vol. 46, Iss. 4, pp. 7659-7676
Closed Access
Translated Temporal Component-Enhanced Attention for Multivariate Time-Series Anomaly Detection
Minji Seo, Myung Ho Kim
(2024)
Closed Access
Minji Seo, Myung Ho Kim
(2024)
Closed Access