{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:23:35Z","timestamp":1758846215479,"version":"3.44.0"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T00:00:00Z","timestamp":1751068800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T00:00:00Z","timestamp":1751068800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100003130","name":"Fonds Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["1SD8821N","1266521N"],"award-info":[{"award-number":["1SD8821N","1266521N"]}],"id":[{"id":"10.13039\/501100003130","id-type":"DOI","asserted-by":"publisher"}]},{"name":"imec.ICON RADIANCE","award":["HBC.2017.0629"],"award-info":[{"award-number":["HBC.2017.0629"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s10922-025-09953-w","type":"journal-article","created":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T11:53:29Z","timestamp":1751111609000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enabling Cross-Context Learning with Knowledge Graphs for Anomaly Detection in Communications Networks"],"prefix":"10.1007","volume":"33","author":[{"given":"Michael","family":"Weyns","sequence":"first","affiliation":[]},{"given":"Sander Vanden","family":"Hautte","sequence":"additional","affiliation":[]},{"given":"Annelies","family":"Lejon","sequence":"additional","affiliation":[]},{"given":"Veerle","family":"Ledoux","sequence":"additional","affiliation":[]},{"given":"Pieter","family":"Bonte","sequence":"additional","affiliation":[]},{"given":"Filip","family":"De Turck","sequence":"additional","affiliation":[]},{"given":"Sofie","family":"Van Hoecke","sequence":"additional","affiliation":[]},{"given":"Femke","family":"Ongenae","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,28]]},"reference":[{"issue":"3","key":"9953_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surveys 41(3), 1\u201358 (2009)","journal-title":"ACM Comput. Surveys"},{"key":"9953_CR2","first-page":"235","volume":"46","author":"N G\u00f6rnitz","year":"2013","unstructured":"G\u00f6rnitz, N., Kloft, M., Rieck, K., Brefeld, U.: Toward supervised anomaly detection. J. Artif. Intell. 46, 235\u2013262 (2013)","journal-title":"J. Artif. Intell."},{"key":"9953_CR3","doi-asserted-by":"crossref","unstructured":"Pang, G., Hengel, A., Shen, C., Cao, L.: Toward deep supervised anomaly detection: reinforcement learning from partially labeled anomaly data. In: Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, pp. 1298\u20131308 (2021)","DOI":"10.1145\/3447548.3467417"},{"key":"9953_CR4","doi-asserted-by":"publisher","first-page":"1991","DOI":"10.1109\/ACCESS.2018.2886457","volume":"7","author":"M Munir","year":"2018","unstructured":"Munir, M., Siddiqui, S.A., Dengel, A., Ahmed, S.: Deepant: a deep learning approach for unsupervised anomaly detection in time series. IEEE Access 7, 1991\u20132005 (2018)","journal-title":"IEEE Access"},{"key":"9953_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106878","volume":"218","author":"ME Villa-P\u00e9rez","year":"2021","unstructured":"Villa-P\u00e9rez, M.E., Alvarez-Carmona, M.A., Loyola-Gonzalez, O., Medina-P\u00e9rez, M.A., Velazco-Rossell, J.C., Choo, K.-K.R.: Semi-supervised anomaly detection algorithms: a comparative summary and future research directions. Knowl. Based Syst. 218, 106878 (2021)","journal-title":"Knowl. Based Syst."},{"key":"9953_CR6","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/s007790170019","volume":"5","author":"AK Dey","year":"2001","unstructured":"Dey, A.K.: Understanding and using context. Pers. Ubiquit. Comput. 5, 4\u20137 (2001)","journal-title":"Pers. Ubiquit. Comput."},{"key":"9953_CR7","doi-asserted-by":"crossref","unstructured":"Ehsani-Besheli, F., Zarandi, H.R.: Context-aware anomaly detection in embedded systems. In: Advances in Dependability Engineering of Complex Systems: Proceedings of the Twelfth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, July 2-6, 2017, Brun\u00f3w, Poland, pp. 151\u2013165 (2018). Springer","DOI":"10.1007\/978-3-319-59415-6_15"},{"key":"9953_CR8","doi-asserted-by":"crossref","unstructured":"Bodo, R., Bertocco, M., Bianchi, A.: Feature ranking under industrial constraints in continuous monitoring applications based on machine learning techniques. In: 2020 IEEE International Instrumentation and Measurement Technology Conference (I2MTC), pp. 1\u20136 (2020). IEEE","DOI":"10.1109\/I2MTC43012.2020.9129595"},{"key":"9953_CR9","volume":"18","author":"M Rodr\u00edguez","year":"2023","unstructured":"Rodr\u00edguez, M., Tob\u00f3n, D.P., M\u00fanera, D.: Anomaly classification in industrial internet of things: a review. Intell. Syst. Appl. 18, 200232 (2023)","journal-title":"Intell. Syst. Appl."},{"issue":"10","key":"9953_CR10","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1109\/TKDE.2009.191","volume":"22","author":"SJ Pan","year":"2010","unstructured":"Pan, S.J., Yang, Q.: A survey on transfer learning. IEEE Trans. Knowl. Data Eng. 22(10), 1345\u20131359 (2010)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"9953_CR11","doi-asserted-by":"crossref","unstructured":"Tan, C., Sun, F., Kong, T., Zhang, W., Yang, C., Liu, C.: A survey on deep transfer learning. In: Artificial Neural Networks and Machine Learning\u2013ICANN 2018: 27th International Conference on Artificial Neural Networks, Rhodes, Greece, October 4-7, 2018, Proceedings, Part III 27, pp. 270\u2013279 (2018). Springer","DOI":"10.1007\/978-3-030-01424-7_27"},{"issue":"1","key":"9953_CR12","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/JPROC.2015.2483592","volume":"104","author":"M Nickel","year":"2015","unstructured":"Nickel, M., Murphy, K., Tresp, V., Gabrilovich, E.: A review of relational machine learning for knowledge graphs. Proc. IEEE 104(1), 11\u201333 (2015)","journal-title":"Proc. IEEE"},{"issue":"3\u20134","key":"9953_CR13","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/S0167-8655(97)00179-7","volume":"19","author":"H Bunke","year":"1998","unstructured":"Bunke, H., Shearer, K.: A graph distance metric based on the maximal common subgraph. Pattern Recogn. Lett. 19(3\u20134), 255\u2013259 (1998)","journal-title":"Pattern Recogn. Lett."},{"key":"9953_CR14","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.patrec.2018.05.002","volume":"134","author":"DB Blumenthal","year":"2020","unstructured":"Blumenthal, D.B., Gamper, J.: On the exact computation of the graph edit distance. Pattern Recogn. Lett. 134, 46\u201357 (2020)","journal-title":"Pattern Recogn. Lett."},{"issue":"4","key":"9953_CR15","first-page":"721","volume":"10","author":"P Ristoski","year":"2019","unstructured":"Ristoski, P., Rosati, J., Di Noia, T., De Leone, R., Paulheim, H.: Rdf2vec: Rdf graph embeddings and their applications. Semant. Web 10(4), 721\u2013752 (2019)","journal-title":"Semant. Web"},{"key":"9953_CR16","doi-asserted-by":"crossref","unstructured":"Nesen, A., Bhargava, B.: Knowledge graphs for semantic-aware anomaly detection in video. In: 2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE), 65\u201370 (2020). IEEE","DOI":"10.1109\/AIKE48582.2020.00018"},{"key":"9953_CR17","doi-asserted-by":"crossref","unstructured":"Garrido, J.S., Dold, D., Frank, J.: Machine learning on knowledge graphs for context-aware security monitoring. In: 2021 IEEE International Conference on Cyber Security and Resilience (CSR), 55\u201360 (2021). IEEE","DOI":"10.1109\/CSR51186.2021.9527927"},{"key":"9953_CR18","doi-asserted-by":"crossref","unstructured":"Mojarad, R., Attal, F., Chibani, A., Amirat, Y.: A hybrid context-aware framework to detect abnormal human daily living behavior. In: 2020 International Joint Conference on Neural Networks (IJCNN), 1\u20138 (2020). IEEE","DOI":"10.1109\/IJCNN48605.2020.9206930"},{"key":"9953_CR19","doi-asserted-by":"crossref","unstructured":"Vinzamuri, B., Khabiri, E., Bhamidipaty, A., Mckim, G., Gandhi, B.: An end-to-end context aware anomaly detection system. In: 2020 IEEE International Conference on Big Data (Big Data), 1689\u20131698 (2020). IEEE","DOI":"10.1109\/BigData50022.2020.9377767"},{"key":"9953_CR20","unstructured":"Chen, J., L\u00e9cu\u00e9, F., Pan, J.Z., Horrocks, I., Chen, H.: Knowledge-based transfer learning explanation. arXiv preprint arXiv:1807.08372 (2018)"},{"issue":"9","key":"9953_CR21","doi-asserted-by":"publisher","first-page":"2971","DOI":"10.1109\/TPAMI.2021.3052758","volume":"43","author":"Z Lu","year":"2021","unstructured":"Lu, Z., Sreekumar, G., Goodman, E., Banzhaf, W., Deb, K., Boddeti, V.N.: Neural architecture transfer. IEEE Trans. Pattern Anal. Mach. Intell. 43(9), 2971\u20132989 (2021)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"9953_CR22","doi-asserted-by":"crossref","unstructured":"Pasunuru, R., Bansal, M.: Continual and multi-task architecture search. arXiv preprint arXiv:1906.05226 (2019)","DOI":"10.18653\/v1\/P19-1185"},{"key":"9953_CR23","doi-asserted-by":"crossref","unstructured":"Chen, X., Duan, Y., Chen, Z., Xu, H., Chen, Z., Liang, X., Zhang, T., Li, Z.: Catch: context-based meta reinforcement learning for transferrable architecture search. In: Computer Vision\u2013ECCV 2020: 16th European Conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part XIX 16, 185\u2013202 (2020). Springer","DOI":"10.1007\/978-3-030-58529-7_12"},{"key":"9953_CR24","doi-asserted-by":"crossref","unstructured":"L\u00e9cu\u00e9, F., Chen, J., Pan, J.Z., Chen, H.: Augmenting transfer learning with semantic reasoning. arXiv preprint arXiv:1905.13672 (2019)","DOI":"10.24963\/ijcai.2019\/246"},{"key":"9953_CR25","doi-asserted-by":"crossref","unstructured":"Bonte, P., Hautte, S.V., Lejon, A., Ledoux, V., De\u00a0Turck, F., Van\u00a0Hoecke, S., Ongenae, F.: Unsupervised anomaly detection for communication networks: an autoencoder approach. In: IoT Streams for Data-Driven Predictive Maintenance and IoT, Edge, and Mobile for Embedded Machine Learning: Second International Workshop, IoT Streams 2020, and First International Workshop, ITEM 2020, Co-located with ECML\/PKDD 2020, Ghent, Belgium, September 14-18, 2020, Revised Selected Papers 2, pp. 160\u2013172 (2020). Springer","DOI":"10.1007\/978-3-030-66770-2_12"},{"key":"9953_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-3994-4","volume-title":"Identification of Outliers","author":"DM Hawkins","year":"1980","unstructured":"Hawkins, D.M.: Identification of Outliers, vol. 11. Springer, London (1980)"},{"key":"9953_CR27","doi-asserted-by":"crossref","unstructured":"Huang, J., Gretton, A., Borgwardt, K., Sch\u00f6lkopf, B., Smola, A.: Correcting sample selection bias by unlabeled data. Adv. Neural Inf. Process 19 (2006)","DOI":"10.7551\/mitpress\/7503.003.0080"},{"issue":"2","key":"9953_CR28","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/S0378-3758(00)00115-4","volume":"90","author":"H Shimodaira","year":"2000","unstructured":"Shimodaira, H.: Improving predictive inference under covariate shift by weighting the log-likelihood function. J. Stat. Plan. Inference 90(2), 227\u2013244 (2000)","journal-title":"J. Stat. Plan. Inference"},{"key":"9953_CR29","volume-title":"The Description Logic Handbook: Theory, Implementation and Applications","author":"F Baader","year":"2003","unstructured":"Baader, F., Calvanese, D., McGuinness, D., Patel-Schneider, P., Nardi, D.: The Description Logic Handbook: Theory, Implementation and Applications. Cambridge University Press, Cambridge (2003)"},{"key":"9953_CR30","volume-title":"Handbook of Knowledge Representation","author":"F Van Harmelen","year":"2008","unstructured":"Van Harmelen, F., Lifschitz, V., Porter, B.: Handbook of Knowledge Representation. Elsevier, Amsterdam (2008)"},{"key":"9953_CR31","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511808432","volume-title":"Hume: An Enquiry Concerning Human Understanding and Other Writings","author":"S Buckle","year":"2007","unstructured":"Buckle, S.: Hume: An Enquiry Concerning Human Understanding and Other Writings. Cambridge University Press, Cambridge (2007)"},{"key":"9953_CR32","unstructured":"Weyns, M., Bonte, P., Steenwinckel, B., De\u00a0Turck, F., Ongenae, F.: Conditional constraints for knowledge graph embeddings. In: Workshop on Deep Learning for Knowledge Graphs (DL4KG2020), Co-located with the 17th Extended Semantic Web Conference 2020 (ESWC 2020), vol. 2635 (2020)"},{"key":"9953_CR33","unstructured":"Maximilian, N.: Tensor factorization for relational learning. PhD thesis, PhD thesis, the Ludwig-Maximilians-University of Munich (2013)"},{"key":"9953_CR34","unstructured":"Narayanan, A., Chandramohan, M., Venkatesan, R., Chen, L., Liu, Y., Jaiswal, S.: graph2vec: Learning distributed representations of graphs. arXiv preprint arXiv:1707.05005 (2017)"},{"key":"9953_CR35","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1142\/S0218194023500481","volume":"34","author":"P Bonte","year":"2023","unstructured":"Bonte, P., Hautte, S.V., De Turck, F., Van Hoecke, S., Ongenae, F.: Benchmarking whole knowledge graph embedding techniques. Int. J. Softw. Eng. Knowl. Eng. 34, 163\u2013184 (2023)","journal-title":"Int. J. Softw. Eng. Knowl. Eng."},{"key":"9953_CR36","unstructured":"Le, Q., Mikolov, T.: Distributed representations of sentences and documents. In: International Conference on Machine Learning, 1188\u20131196 (2014). PMLR"},{"key":"9953_CR37","first-page":"1137","volume":"13","author":"Y Bengio","year":"2000","unstructured":"Bengio, Y., Ducharme, R., Vincent, P.: A neural probabilistic language model. Adv. Neural. Inf. Process. Syst. 13, 1137\u20131155 (2000)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"issue":"9","key":"9953_CR38","first-page":"2539","volume":"12","author":"N Shervashidze","year":"2011","unstructured":"Shervashidze, N., Schweitzer, P., Van Leeuwen, E.J., Mehlhorn, K., Borgwardt, K.M.: Weisfeiler-lehman graph kernels. J. Mach. Learn. Res. 12(9), 2539\u20132561 (2011)","journal-title":"J. Mach. Learn. Res."}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-025-09953-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-025-09953-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-025-09953-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T20:03:12Z","timestamp":1758830592000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-025-09953-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,28]]},"references-count":38,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["9953"],"URL":"https:\/\/doi.org\/10.1007\/s10922-025-09953-w","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"type":"print","value":"1064-7570"},{"type":"electronic","value":"1573-7705"}],"subject":[],"published":{"date-parts":[[2025,6,28]]},"assertion":[{"value":"24 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 December 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 June 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no potential Conflict of interest to declare.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"77"}}