{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:51:39Z","timestamp":1772909499434,"version":"3.50.1"},"reference-count":83,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1016\/j.jss.2023.111917","type":"journal-article","created":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T21:04:06Z","timestamp":1702587846000},"page":"111917","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":33,"special_numbering":"C","title":["ServiceAnomaly: An anomaly detection approach in microservices using distributed traces and profiling metrics"],"prefix":"10.1016","volume":"209","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6369-8982","authenticated-orcid":false,"given":"Mahsa","family":"Panahandeh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3319-5006","authenticated-orcid":false,"given":"Abdelwahab","family":"Hamou-Lhadj","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4927-2755","authenticated-orcid":false,"given":"Mohammad","family":"Hamdaqa","sequence":"additional","affiliation":[]},{"given":"James","family":"Miller","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jss.2023.111917_b1","series-title":"Apache JMeter","author":"Anon.","year":"2022"},{"key":"10.1016\/j.jss.2023.111917_b2","series-title":"istio-simplify observability, traffic management, security, and policy with the leading service mesh","author":"Anon.","year":"2022"},{"key":"10.1016\/j.jss.2023.111917_b3","series-title":"Jaeger: Open source, end-to-end distributed tracing","author":"Anon.","year":"2022"},{"key":"10.1016\/j.jss.2023.111917_b4","series-title":"Kubernetes","author":"Anon.","year":"2022"},{"key":"10.1016\/j.jss.2023.111917_b5","series-title":"Prometheus: From metrics to insight power your metrics and alerting with the leading open-source monitoring solution","author":"Anon.","year":"2022"},{"key":"10.1016\/j.jss.2023.111917_b6","doi-asserted-by":"crossref","unstructured":"Ayers, Andrew, Schooler, Richard, Metcalf, Chris, Agarwal, Anant, Rhee, Junghwan, Witchel, Emmett, 2005. Traceback: First fault diagnosis by reconstruction of distributed control flow. In: Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation. pp. 201\u2013212.","DOI":"10.1145\/1065010.1065035"},{"key":"10.1016\/j.jss.2023.111917_b7","series-title":"European Conference on Service-Oriented and Cloud Computing","first-page":"201","article-title":"Migrating to cloud-native architectures using microservices: An experience report","author":"Balalaie","year":"2015"},{"issue":"3","key":"10.1016\/j.jss.2023.111917_b8","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MS.2016.64","article-title":"Microservices architecture enables devops: Migration to a cloud-native architecture","volume":"33","author":"Balalaie","year":"2016","journal-title":"IEEE Softw."},{"key":"10.1016\/j.jss.2023.111917_b9","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.jss.2018.05.016","article-title":"Execution anomaly detection in large-scale systems through console log analysis","volume":"143","author":"Bao","year":"2018","journal-title":"J. Syst. Softw."},{"issue":"1","key":"10.1016\/j.jss.2023.111917_b10","first-page":"17","article-title":"Nonparametric entropy estimation: An overview","volume":"6","author":"Beirlant","year":"1997","journal-title":"Int. J. Math. Stat. Sci."},{"issue":"2","key":"10.1016\/j.jss.2023.111917_b11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3375633","article-title":"Visualizing distributed system executions","volume":"29","author":"Beschastnikh","year":"2020","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"10.1016\/j.jss.2023.111917_b12","series-title":"Hands-on Machine Learning with R","author":"Boehmke","year":"2019"},{"key":"10.1016\/j.jss.2023.111917_b13","series-title":"International Conference on Service-Oriented Computing","first-page":"201","article-title":"Multi-source anomaly detection in distributed it systems","author":"Bogatinovski","year":"2020"},{"key":"10.1016\/j.jss.2023.111917_b14","series-title":"2020 IEEE\/ACM 13th International Conference on Utility and Cloud Computing, UCC","first-page":"342","article-title":"Self-supervised anomaly detection from distributed traces","author":"Bogatinovski","year":"2020"},{"key":"10.1016\/j.jss.2023.111917_b15","doi-asserted-by":"crossref","DOI":"10.1016\/j.jss.2019.110432","article-title":"Graph-based root cause analysis for service-oriented and microservice architectures","volume":"159","author":"Brand\u00f3n","year":"2020","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.jss.2023.111917_b16","series-title":"2021 IEEE 45th Annual Computers, Software, and Applications Conference, COMPSAC","first-page":"884","article-title":"Trace-based intelligent fault diagnosis for microservices with deep learning","author":"Chen","year":"2021"},{"key":"10.1016\/j.jss.2023.111917_b17","series-title":"Graph Based Representations in Pattern Recognition","first-page":"43","article-title":"Subgraph transformations for the inexact matching of attributed relational graphs","author":"Cordella","year":"1998"},{"issue":"10","key":"10.1016\/j.jss.2023.111917_b18","doi-asserted-by":"crossref","first-page":"1367","DOI":"10.1109\/TPAMI.2004.75","article-title":"A (sub) graph isomorphism algorithm for matching large graphs","volume":"26","author":"Cordella","year":"2004","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"09","key":"10.1016\/j.jss.2023.111917_b19","doi-asserted-by":"crossref","first-page":"P09008","DOI":"10.1088\/1742-5468\/2005\/09\/P09008","article-title":"Comparing community structure identification","volume":"2005","author":"Danon","year":"2005","journal-title":"J. Stat. Mech. Theory Exp."},{"key":"10.1016\/j.jss.2023.111917_b20","series-title":"Regression Analysis and Linear Models: Concepts, Applications, and Implementation","author":"Darlington","year":"2017"},{"key":"10.1016\/j.jss.2023.111917_b21","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2022.106989","article-title":"Trace visualization within the software city metaphor: Controlled experiments on program comprehension","volume":"150","author":"Dashuber","year":"2022","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.jss.2023.111917_b22","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.neucom.2015.12.114","article-title":"Mean absolute percentage error for regression models","volume":"192","author":"De Myttenaere","year":"2016","journal-title":"Neurocomputing"},{"key":"10.1016\/j.jss.2023.111917_b23","doi-asserted-by":"crossref","unstructured":"Du, Min, Li, Feifei, Zheng, Guineng, Srikumar, Vivek, 2017. Deeplog: Anomaly detection and diagnosis from system logs through deep learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. pp. 1285\u20131298.","DOI":"10.1145\/3133956.3134015"},{"key":"10.1016\/j.jss.2023.111917_b24","series-title":"International Colloquium on Automata, Languages, and Programming","first-page":"220","article-title":"Analytic variations on the common subexpression problem","author":"Flajolet","year":"1990"},{"key":"10.1016\/j.jss.2023.111917_b25","series-title":"Statistical Models: Theory and Practice","author":"Freedman","year":"2009"},{"key":"10.1016\/j.jss.2023.111917_b26","series-title":"2009 Ninth IEEE International Conference on Data Mining","first-page":"149","article-title":"Execution anomaly detection in distributed systems through unstructured log analysis","author":"Fu","year":"2009"},{"key":"10.1016\/j.jss.2023.111917_b27","series-title":"Loss Data Analysis: The Maximum Entropy Approach","author":"Gzyl","year":"2023"},{"key":"10.1016\/j.jss.2023.111917_b28","series-title":"Proceedings 10th International Workshop on Program Comprehension","first-page":"159","article-title":"Compression techniques to simplify the analysis of large execution traces","author":"Hamou-Lhadj","year":"2002"},{"key":"10.1016\/j.jss.2023.111917_b29","series-title":"Proceedings 10th International Conference on Engineering of Complex Computer Systems","first-page":"559","article-title":"Measuring various properties of execution traces to help build better trace analysis tools","author":"Hamou-Lhadj","year":"2005"},{"key":"10.1016\/j.jss.2023.111917_b30","article-title":"A spatiotemporal deep learning approach for unsupervised anomaly detection in cloud systems","author":"He","year":"2020","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"10.1016\/j.jss.2023.111917_b31","series-title":"2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom)","first-page":"493","article-title":"Diagnosing performance issues in microservices with heterogeneous data source","author":"Hou","year":"2021"},{"key":"10.1016\/j.jss.2023.111917_b32","series-title":"2016 IEEE International Conference on Mechatronics and Automation","first-page":"2065","article-title":"Heuristic sample reduction based support vector regression method","author":"Hui","year":"2016"},{"issue":"1","key":"10.1016\/j.jss.2023.111917_b33","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1109\/TR.2017.2787138","article-title":"Anomaly detection techniques based on kappa-pruned ensembles","volume":"67","author":"Islam","year":"2018","journal-title":"IEEE Trans. Reliab."},{"key":"10.1016\/j.jss.2023.111917_b34","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2022.102728","article-title":"Anomalous distributed traffic: Detecting cyber security attacks amongst microservices using graph convolutional networks","volume":"118","author":"Jacob","year":"2022","journal-title":"Comput. Secur."},{"issue":"4","key":"10.1016\/j.jss.2023.111917_b35","doi-asserted-by":"crossref","first-page":"510","DOI":"10.1109\/TDSC.2011.16","article-title":"Efficient fault detection and diagnosis in complex software systems with information-theoretic monitoring","volume":"8","author":"Jiang","year":"2011","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.jss.2023.111917_b36","series-title":"Proceedings 2001 IEEE International Conference on Data Mining","first-page":"289","article-title":"An online algorithm for segmenting time series","author":"Keogh","year":"2001"},{"key":"10.1016\/j.jss.2023.111917_b37","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1016\/j.infsof.2017.07.009","article-title":"An anomaly detection system based on variable N-gram features and one-class SVM","volume":"91","author":"Khreich","year":"2017","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.jss.2023.111917_b38","doi-asserted-by":"crossref","unstructured":"von Kistowski, J\u00f3akim, Eismann, Simon, Schmitt, Norbert, Bauer, Andr\u00e9, Grohmann, Johannes, Kounev, Samuel, 2018. TeaStore: A Micro-Service Reference Application for Benchmarking, Modeling and Resource Management Research. In: Proceedings of the 26th IEEE International Symposium on the Modelling, Analysis, and Simulation of Computer and Telecommunication Systems. MASCOTS \u201918.","DOI":"10.1109\/MASCOTS.2018.00030"},{"key":"10.1016\/j.jss.2023.111917_b39","doi-asserted-by":"crossref","unstructured":"Kohyarnejadfard, Iman, Shakeri, Mahsa, Aloise, Daniel, 2019. System performance anomaly detection using tracing data analysis. In: Proceedings of the 2019 5th International Conference on Computer and Technology Applications. pp. 169\u2013173.","DOI":"10.1145\/3323933.3324085"},{"key":"10.1016\/j.jss.2023.111917_b40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jss.2017.01.001","article-title":"Understanding cloud-native applications after 10 years of cloud computing-a systematic mapping study","volume":"126","author":"Kratzke","year":"2017","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.jss.2023.111917_b41","series-title":"Scikit-learn: Machine learning in Python","author":"scikit learn","year":"2023"},{"issue":"1","key":"10.1016\/j.jss.2023.111917_b42","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1007\/s10489-011-0315-y","article-title":"A novel feature selection method based on normalized mutual information","volume":"37","author":"Lee","year":"2012","journal-title":"Appl. Intell."},{"key":"10.1016\/j.jss.2023.111917_b43","series-title":"Proceedings of the 45th International Conference on Software Engineering","first-page":"1750","article-title":"Eadro: An end-to-end troubleshooting framework for microservices on multi-source data","author":"Lee","year":"2023"},{"key":"10.1016\/j.jss.2023.111917_b44","doi-asserted-by":"crossref","unstructured":"Li, Richard, Du, Min, Wang, Zheng, Chang, Hyunseok, Mukherjee, Sarit, Eide, Eric, 2022a. LongTale: Toward Automatic Performance Anomaly Explanation in Microservices. In: Proceedings of the 2022 ACM\/SPEC on International Conference on Performance Engineering. pp. 5\u201316.","DOI":"10.1145\/3489525.3511675"},{"issue":"1","key":"10.1016\/j.jss.2023.111917_b45","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10664-021-10063-9","article-title":"Enjoy your observability: An industrial survey of microservice tracing and analysis","volume":"27","author":"Li","year":"2022","journal-title":"Empir. Softw. Eng."},{"key":"10.1016\/j.jss.2023.111917_b46","series-title":"2021 4th International Conference on Artificial Intelligence and Big Data, ICAIBD","first-page":"38","article-title":"Microservice anomaly detection based on tracing data using semi-supervised learning","author":"Li","year":"2021"},{"key":"10.1016\/j.jss.2023.111917_b47","series-title":"Service-Oriented Computing","first-page":"3","article-title":"Microscope: Pinpoint performance issues with causal graphs in micro-service environments","author":"Lin","year":"2018"},{"key":"10.1016\/j.jss.2023.111917_b48","series-title":"2021 IEEE\/ACM 43rd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP)","first-page":"338","article-title":"Microhecl: High-efficient root cause localization in large-scale microservice systems","author":"Liu","year":"2021"},{"key":"10.1016\/j.jss.2023.111917_b49","series-title":"2020 IEEE 31st International Symposium on Software Reliability Engineering, ISSRE","first-page":"48","article-title":"Unsupervised detection of microservice trace anomalies through service-level deep bayesian networks","author":"Liu","year":"2020"},{"issue":"1","key":"10.1016\/j.jss.2023.111917_b50","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/0022-0000(82)90009-5","article-title":"Isomorphism of graphs of bounded valence can be tested in polynomial time","volume":"25","author":"Luks","year":"1982","journal-title":"J. Comput. Syst. Sci."},{"key":"10.1016\/j.jss.2023.111917_b51","doi-asserted-by":"crossref","unstructured":"Ma, Meng, Xu, Jingmin, Wang, Yuan, Chen, Pengfei, Zhang, Zonghua, Wang, Ping, 2020. Automap: Diagnose your microservice-based web applications automatically. In: Proceedings of the Web Conference 2020. pp. 246\u2013258.","DOI":"10.1145\/3366423.3380111"},{"key":"10.1016\/j.jss.2023.111917_b52","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1016\/j.future.2020.10.040","article-title":"Detecting anomalies in microservices with execution trace comparison","volume":"116","author":"Meng","year":"2021","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.jss.2023.111917_b53","series-title":"2012 Sixth International Conference on Research Challenges in Information Science, RCIS","first-page":"1","article-title":"A first step for building a document warehouse: Unification of XML documents","author":"Messaoud","year":"2012"},{"key":"10.1016\/j.jss.2023.111917_b54","series-title":"Artificial Intelligence, Machine Learning, and Data Science Technologies: future Impact and Well-Being for Society 5.0","author":"Mohan","year":"2021"},{"key":"10.1016\/j.jss.2023.111917_b55","doi-asserted-by":"crossref","unstructured":"Nandi, Animesh, Mandal, Atri, Atreja, Shubham, Dasgupta, Gargi B., Bhattacharya, Subhrajit, 2016. Anomaly detection using program control flow graph mining from execution logs. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. pp. 215\u2013224.","DOI":"10.1145\/2939672.2939712"},{"key":"10.1016\/j.jss.2023.111917_b56","series-title":"2019 19th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGRID","first-page":"241","article-title":"Anomaly detection and classification using distributed tracing and deep learning","author":"Nedelkoski","year":"2019"},{"key":"10.1016\/j.jss.2023.111917_b57","series-title":"2019 IEEE 12th International Conference on Cloud Computing, CLOUD","first-page":"179","article-title":"Anomaly detection from system tracing data using multimodal deep learning","author":"Nedelkoski","year":"2019"},{"key":"10.1016\/j.jss.2023.111917_b58","series-title":"Visualization of microservices: Mapping dependencies in a distributed architecture","author":"Niemi","year":"2021"},{"key":"10.1016\/j.jss.2023.111917_b59","series-title":"OpenTracing specification","author":"OpenTracing Contributors","year":"2023"},{"issue":"3","key":"10.1016\/j.jss.2023.111917_b60","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MCC.2015.51","article-title":"Containerization and the paas cloud","volume":"2","author":"Pahl","year":"2015","journal-title":"IEEE Cloud Comput."},{"key":"10.1016\/j.jss.2023.111917_b61","series-title":"Distributed Tracing in Practice: Instrumenting, Analyzing, and Debugging Microservices","author":"Parker","year":"2020"},{"issue":"8","key":"10.1016\/j.jss.2023.111917_b62","doi-asserted-by":"crossref","first-page":"1099","DOI":"10.1016\/j.scico.2012.11.002","article-title":"Stratified sampling of execution traces: Execution phases serving as strata","volume":"78","author":"Pirzadeh","year":"2013","journal-title":"Sci. Comput. Program."},{"key":"10.1016\/j.jss.2023.111917_b63","series-title":"International Conference on Machine Learning","first-page":"4393","article-title":"Deep one-class classification","author":"Ruff","year":"2018"},{"issue":"3&4","key":"10.1016\/j.jss.2023.111917_b64","first-page":"247","article-title":"Anomaly detection and analysis for reliability management clustered container architectures","volume":"12","author":"Samir","year":"2020","journal-title":"Int. J. Adv. Syst. Meas."},{"key":"10.1016\/j.jss.2023.111917_b65","series-title":"2019 7th International Conference on Future Internet of Things and Cloud, FiCloud","first-page":"205","article-title":"DLA: Detecting and localizing anomalies in containerized microservice architectures using markov models","author":"Samir","year":"2019"},{"issue":"1","key":"10.1016\/j.jss.2023.111917_b66","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1002\/sta4.96","article-title":"A mutual information approach to calculating nonlinearity","volume":"4","author":"Smith","year":"2015","journal-title":"Stat"},{"key":"10.1016\/j.jss.2023.111917_b67","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/j.jss.2018.09.082","article-title":"The pains and gains of microservices: A systematic grey literature review","volume":"146","author":"Soldani","year":"2018","journal-title":"J. Syst. Softw."},{"issue":"1","key":"10.1016\/j.jss.2023.111917_b68","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1471-2105-13-328","article-title":"Comparison of co-expression measures: Mutual information, correlation, and model based indices","volume":"13","author":"Song","year":"2012","journal-title":"BMC Bioinformatics"},{"key":"10.1016\/j.jss.2023.111917_b69","series-title":"Simple and Efficient Tree Pattern Matching","author":"Valiente Feruglio","year":"2000"},{"key":"10.1016\/j.jss.2023.111917_b70","series-title":"Nonlinear Modeling","first-page":"55","article-title":"The support vector method of function estimation","author":"Vapnik","year":"1998"},{"key":"10.1016\/j.jss.2023.111917_b71","article-title":"Support vector method for function approximation, regression estimation and signal processing","volume":"9","author":"Vapnik","year":"1996","journal-title":"Adv. Neural Inf. Process. Syst."},{"issue":"4","key":"10.1016\/j.jss.2023.111917_b72","doi-asserted-by":"crossref","first-page":"2350","DOI":"10.1109\/TNSM.2020.3022028","article-title":"Workflow-aware automatic fault diagnosis for microservice-based applications with statistics","volume":"17","author":"Wang","year":"2020","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"1","key":"10.1016\/j.jss.2023.111917_b73","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/TSMC.2015.2430834","article-title":"FD4C: Automatic fault diagnosis framework for web applications in cloud computing","volume":"46","author":"Wang","year":"2015","journal-title":"IEEE Trans. Syst. Man Cybern. A"},{"key":"10.1016\/j.jss.2023.111917_b74","series-title":"2021 IEEE\/ACM International Workshop on Cloud Intelligence, CloudIntelligence","first-page":"31","article-title":"MicroDiag: Fine-grained performance diagnosis for microservice systems","author":"Wu","year":"2021"},{"key":"10.1016\/j.jss.2023.111917_b75","series-title":"NOMS 2020-2020 IEEE\/IFIP Network Operations and Management Symposium","first-page":"1","article-title":"Microrca: Root cause localization of performance issues in microservices","author":"Wu","year":"2020"},{"key":"10.1016\/j.jss.2023.111917_b76","series-title":"Graph neural network-based anomaly detection for trace of microservices","author":"Xu","year":"2022"},{"key":"10.1016\/j.jss.2023.111917_b77","doi-asserted-by":"crossref","first-page":"1432","DOI":"10.2307\/4586294","article-title":"Statistical problems in assessing methods of medical diagnosis, with special reference to X-ray techniques","author":"Yerushalmy","year":"1947","journal-title":"Public Health Rep. (1896\u20131970)"},{"key":"10.1016\/j.jss.2023.111917_b78","article-title":"TraceRank: Abnormal service localization with dis-aggregated end-to-end tracing data in cloud native systems","author":"Yu","year":"2021","journal-title":"J. Softw. Evol. Process"},{"key":"10.1016\/j.jss.2023.111917_b79","series-title":"2022 7th International Conference on Cloud Computing and Big Data Analytics, ICCCBDA","first-page":"149","article-title":"Fault localization for microservice applications with system logs and monitoring metrics","author":"Zhang","year":"2022"},{"key":"10.1016\/j.jss.2023.111917_b80","doi-asserted-by":"crossref","unstructured":"Zhang, Chenxi, Peng, Xin, Sha, Chaofeng, Zhang, Ke, Fu, Zhenqing, Wu, Xiya, Lin, Qingwei, Zhang, Dongmei, 2022b. DeepTraLog: Trace-Log Combined Microservice Anomaly Detection through Graph-based Deep Learning. In: Conference on Software Engineering, ICSE.","DOI":"10.1145\/3510003.3510180"},{"key":"10.1016\/j.jss.2023.111917_b81","series-title":"Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","first-page":"5639","article-title":"Robust multimodal failure detection for microservice systems","author":"Zhao","year":"2023"},{"issue":"2","key":"10.1016\/j.jss.2023.111917_b82","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1109\/TSE.2018.2887384","article-title":"Fault analysis and debugging of microservice systems: Industrial survey, benchmark system, and empirical study","volume":"47","author":"Zhou","year":"2018","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"2","key":"10.1016\/j.jss.2023.111917_b83","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1109\/TCCN.2020.2966615","article-title":"An intelligent anomaly detection scheme for micro-services architectures with temporal and spatial data analysis","volume":"6","author":"Zuo","year":"2020","journal-title":"IEEE Trans. Cogn. Commun. Netw."}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121223003126?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121223003126?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T23:39:59Z","timestamp":1759016399000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0164121223003126"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":83,"alternative-id":["S0164121223003126"],"URL":"https:\/\/doi.org\/10.1016\/j.jss.2023.111917","relation":{},"ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"subject":[],"published":{"date-parts":[[2024,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"ServiceAnomaly: An anomaly detection approach in microservices using distributed traces and profiling metrics","name":"articletitle","label":"Article Title"},{"value":"Journal of Systems and Software","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jss.2023.111917","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"111917"}}