
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
MADDC: Multi-Scale Anomaly Detection, Diagnosis and Correction for Discrete Event Logs
Xiaolei Wang, Lin Yang, Dongyang Li, et al.
(2022), pp. 769-784
Closed Access | Times Cited: 8
Xiaolei Wang, Lin Yang, Dongyang Li, et al.
(2022), pp. 769-784
Closed Access | Times Cited: 8
Showing 8 citing articles:
SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection
Giovanni Apruzzese, Pavel Laskov, Johannes Schneider
(2023), pp. 592-614
Open Access | Times Cited: 13
Giovanni Apruzzese, Pavel Laskov, Johannes Schneider
(2023), pp. 592-614
Open Access | Times Cited: 13
Advances in deep learning intrusion detection over encrypted data with privacy preservation: a systematic review
Fatma Hendaoui, Ahlem Ferchichi, Lamia Trabelsi, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 8683-8724
Closed Access | Times Cited: 1
Fatma Hendaoui, Ahlem Ferchichi, Lamia Trabelsi, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 8683-8724
Closed Access | Times Cited: 1
Parameter-Efficient Log Anomaly Detection based on Pre-training model and LORA
Shiming He, Lei Ying, Ying Zhang, et al.
(2023), pp. 207-217
Closed Access | Times Cited: 2
Shiming He, Lei Ying, Ying Zhang, et al.
(2023), pp. 207-217
Closed Access | Times Cited: 2
Landscape and Taxonomy of Online Parser-Supported Log Anomaly Detection Methods
Scott Lupton, Hironori Washizaki, Nobukazu Yoshioka, et al.
IEEE Access (2024) Vol. 12, pp. 78193-78218
Open Access
Scott Lupton, Hironori Washizaki, Nobukazu Yoshioka, et al.
IEEE Access (2024) Vol. 12, pp. 78193-78218
Open Access
Bad Design Smells in Benchmark NIDS Datasets
R. Flood, Gints Engelen, David Aspinall, et al.
(2024), pp. 658-675
Open Access
R. Flood, Gints Engelen, David Aspinall, et al.
(2024), pp. 658-675
Open Access
ColBetect: A Contrastive Learning Framework Featuring Dual Negative Samples for Anomaly Behavior Detection
Ziqi Yuan, Haoyi Zhou, Qingyun Sun, et al.
Lecture notes in computer science (2024), pp. 465-480
Closed Access
Ziqi Yuan, Haoyi Zhou, Qingyun Sun, et al.
Lecture notes in computer science (2024), pp. 465-480
Closed Access
CACluster: A Clustering Approach for IoT Attack Activities Based on Contextual Analysis
Huiran Yang, Yan Zhang, Yueyue Dai, et al.
(2023)
Closed Access
Huiran Yang, Yan Zhang, Yueyue Dai, et al.
(2023)
Closed Access
Process mining approach for Multi-Cloud SLA Reporting
Jeremy Mechouche, Mohamed Sellami, Zakaria Maamar, et al.
2021 IEEE International Conference on Big Data (Big Data) (2023), pp. 5867-5876
Closed Access
Jeremy Mechouche, Mohamed Sellami, Zakaria Maamar, et al.
2021 IEEE International Conference on Big Data (Big Data) (2023), pp. 5867-5876
Closed Access