{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T16:17:24Z","timestamp":1774455444331,"version":"3.50.1"},"reference-count":65,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100003130","name":"Fonds Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["1881020N"],"award-info":[{"award-number":["1881020N"]}],"id":[{"id":"10.13039\/501100003130","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/tnsm.2026.3652304","type":"journal-article","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T22:01:06Z","timestamp":1768255266000},"page":"1970-1988","source":"Crossref","is-referenced-by-count":2,"title":["Toward Context-Aware Anomaly Detection for AIOps in Microservices Using Dynamic Knowledge Graphs"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2035-8766","authenticated-orcid":false,"given":"Pieter","family":"Moens","sequence":"first","affiliation":[{"name":"IDLab, Ghent University&#x2013;imec, Gent, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3488-2334","authenticated-orcid":false,"given":"Bram","family":"Steenwinckel","sequence":"additional","affiliation":[{"name":"IDLab, Ghent University&#x2013;imec, Gent, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2529-5477","authenticated-orcid":false,"given":"Femke","family":"Ongenae","sequence":"additional","affiliation":[{"name":"IDLab, Ghent University&#x2013;imec, Gent, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0575-5894","authenticated-orcid":false,"given":"Bruno","family":"Volckaert","sequence":"additional","affiliation":[{"name":"IDLab, Ghent University&#x2013;imec, Gent, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7865-6793","authenticated-orcid":false,"given":"Sofie Van","family":"Hoecke","sequence":"additional","affiliation":[{"name":"IDLab, Ghent University&#x2013;imec, Gent, Belgium"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSAW.2017.11"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3161455"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2018.2141039"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3193102"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3501297"},{"key":"ref6","volume-title":"Prometheus: Up & Running: Infrastructure and Application Performance Monitoring","author":"Brazil","year":"2018"},{"key":"ref7","first-page":"1","article-title":"Powering monitoring analytics with elk stack","volume-title":"Proc. 9th Int. Conf. Auton. Infrastruct., Manag. Security (AIMS)","author":"Lahmadi"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111906"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00023"},{"key":"ref10","volume-title":"Dynatrace: Unified observability and security","year":"2024"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939712"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111793"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2017.64"},{"key":"ref15","volume-title":"Acme air sample and benchmark","year":"2024"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"ref17","volume-title":"IEEE vast challenge","year":"2011"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.116263"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3047416"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA54631.2023.10275683"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3029088"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2019.00038"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510180"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-6222-8_36"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3194991"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05063-4_42"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/app13137891"},{"key":"ref28","volume-title":"Sock shop: A microservice demo application","year":"2024"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111917"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2018.00030"},{"key":"ref31","first-page":"3462","article-title":"Know-evolve: Deep temporal reasoning for dynamic knowledge graphs","volume-title":"Proc. 34th Int. Conf. Mach. Learn.","author":"Trivedi"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.462"},{"key":"ref33","article-title":"Anomaly detection and classification in knowledge graphs","author":"Senaratne","year":"2024","journal-title":"arXiv:2412.04780"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1201\/9781003337447-5"},{"key":"ref35","volume-title":"Online boutique: Cloud-first microservices demo application","year":"2015"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-8731-6_18"},{"key":"ref37","volume-title":"Istio: Up and Running: Using a Service Mesh to Connect, Secure, Control, and Observe","author":"Calcote","year":"2019"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2019.00026"},{"key":"ref39","first-page":"359","article-title":"Modernize digital applications with microservices management using the istio service mesh","volume-title":"Proc. 28th Annu. Int. Conf. Comput. Sci. Softw. Eng.","author":"Sheikh"},{"key":"ref40","volume-title":"Locust: Open-source performance and load testing","author":"Heyman","year":"2024"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3390\/s25113396"},{"key":"ref42","volume-title":"Distributed Computing with Python","author":"Pierfederici","year":"2016"},{"key":"ref43","volume-title":"Litmuschaos: Open Source Chaos Engineering Platform","year":"2024"},{"key":"ref44","volume-title":"AWS Fault Injection Service","year":"2021"},{"key":"ref45","volume-title":"Azure Chaos Studio","year":"2021"},{"key":"ref46","volume-title":"Chaos engineering: The history, principles, and practice","author":"Butow","year":"2021"},{"key":"ref47","volume-title":"Chaos mesh: Break your system constructively","year":"2024"},{"key":"ref48","volume-title":"Argo: Workflow engine for kubernetes","year":"2024"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN55119.2022.9829572"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24750-0_4"},{"key":"ref51","volume-title":"Kubernetes: Up and Running","author":"Burns","year":"2022"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8762053"},{"key":"ref53","volume-title":"Native Docker Clustering with Swarm","author":"Soppelsa","year":"2016"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-2149-5_4"},{"issue":"1","key":"ref55","first-page":"2648","article-title":"Representation learning for dynamic graphs: A survey","volume":"21","author":"Kazemi","year":"2020","journal-title":"J. Mach. Learn. Res."},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3044610"},{"key":"ref57","first-page":"1","article-title":"Translating embeddings for modeling multi-relational data","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Bordes"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46523-4_30"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-021-00806-z"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.10.015"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"ref62","volume-title":"A python toolkit for rule-based\/unsupervised anomaly detection in time series","author":"Analytics","year":"2019"},{"key":"ref63","article-title":"GAL-MAD: Towards explainable anomaly detection in microservice applications using graph attention networks","author":"Akmeemana","year":"2025","journal-title":"arXiv:2504.00058"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2025.103242"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.5220\/0011838600003488"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4275028\/11319294\/11341916.pdf?arnumber=11341916","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T05:24:11Z","timestamp":1768627451000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11341916\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":65,"URL":"https:\/\/doi.org\/10.1109\/tnsm.2026.3652304","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}