{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T09:53:12Z","timestamp":1769853192374,"version":"3.49.0"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T00:00:00Z","timestamp":1752624000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T00:00:00Z","timestamp":1752624000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"DOI":"10.1186\/s13677-025-00765-6","type":"journal-article","created":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T09:24:19Z","timestamp":1752657859000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["SSLA: a semi-supervised framework for real-time injection detection and anomaly monitoring in cloud-based web applications with real-world implementation and evaluation"],"prefix":"10.1186","volume":"14","author":[{"given":"Seyed Salar","family":"Sefati","sequence":"first","affiliation":[]},{"given":"Bahman","family":"Arasteh","sequence":"additional","affiliation":[]},{"given":"Octavian","family":"Fratu","sequence":"additional","affiliation":[]},{"given":"Simona","family":"Halunga","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,16]]},"reference":[{"issue":"2","key":"765_CR1","doi-asserted-by":"publisher","first-page":"186","DOI":"10.3390\/math12020186","volume":"12","author":"B Arasteh","year":"2024","unstructured":"Arasteh B, Arasteh K, Kiani F, Sefati SS, Fratu O, Halunga S, Tirkolaee EB (2024) A bioinspired test generation method using discretized and modified Bat optimization algorithm. Mathematics 12(2):186","journal-title":"Mathematics"},{"issue":"3","key":"765_CR2","doi-asserted-by":"publisher","first-page":"1294","DOI":"10.1109\/SURV.2012.111412.00045","volume":"15","author":"M Shiraz","year":"2012","unstructured":"Shiraz M, Gani A, Khokhar RH, Buyya R (2012) A review on distributed application processing frameworks in smart mobile devices for mobile cloud computing. IEEE Commun Surv Tutorials 15(3):1294\u20131313","journal-title":"IEEE Commun Surv Tutorials"},{"key":"765_CR3","doi-asserted-by":"crossref","unstructured":"Verma R, Rane D (2024) Service-Oriented Computing: Challenges, Benefits, and Emerging Trends, Soft Computing Principles and Integration for Real-Time Service-Oriented Computing, pp. 65\u201382","DOI":"10.1201\/9781032716718-4"},{"key":"765_CR4","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1016\/j.jnca.2016.09.002","volume":"75","author":"S Singh","year":"2016","unstructured":"Singh S, Jeong Y-S, Park JH (2016) A survey on cloud computing security: issues, threats, and solutions. J Netw Comput Appl 75:200\u2013222","journal-title":"J Netw Comput Appl"},{"key":"765_CR5","doi-asserted-by":"publisher","first-page":"101660","DOI":"10.1016\/j.scs.2019.101660","volume":"50","author":"H Habibzadeh","year":"2019","unstructured":"Habibzadeh H, Nussbaum BH, Anjomshoa F, Kantarci B, Soyata T (2019) A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities. Sustainable Cities Soc 50:101660","journal-title":"Sustainable Cities Soc"},{"issue":"1","key":"765_CR6","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1186\/s13677-025-00742-z","volume":"14","author":"\u0141 Pawlik","year":"2025","unstructured":"Pawlik \u0141 (2025) Google cloud vs. Azure: sentiment analysis accuracy for Polish and english across content types. J Cloud Comput 14(1):17","journal-title":"J Cloud Comput"},{"issue":"18","key":"765_CR7","doi-asserted-by":"publisher","first-page":"2917","DOI":"10.3390\/math12182917","volume":"12","author":"B Arasteh","year":"2024","unstructured":"Arasteh B, Bouyer A, Sefati SS, Craciunescu R (2024) Effective SQL Injection Detection: A Fusion of Binary Olympiad Optimizer and Classification Algorithm. Mathematics 12(18):2917","journal-title":"Mathematics"},{"key":"765_CR8","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1007\/s13198-015-0376-0","volume":"8","author":"S Gupta","year":"2017","unstructured":"Gupta S, Gupta BB (2017) Cross-Site scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art. Int J Syst Assur Eng Manage 8:512\u2013530","journal-title":"Int J Syst Assur Eng Manage"},{"issue":"6","key":"765_CR9","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.3390\/electronics12061333","volume":"12","author":"\u00d6 Aslan","year":"2023","unstructured":"Aslan \u00d6, Aktu\u011f SS, Ozkan-Okay M, Yilmaz AA, Akin E (2023) A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics 12(6):1333","journal-title":"Electronics"},{"issue":"1","key":"765_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-025-00739-8","volume":"14","author":"J Cao","year":"2025","unstructured":"Cao J, Zhang C, Qi P, Hu K (2025) Utility-driven virtual machine allocation in edge cloud environments using a partheno-genetic algorithm. J Cloud Comput 14(1):1\u201315","journal-title":"J Cloud Comput"},{"key":"765_CR11","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.comcom.2019.04.011","volume":"140","author":"J Domingo-Ferrer","year":"2019","unstructured":"Domingo-Ferrer J, Farras O, Ribes-Gonz\u00e1lez J, S\u00e1nchez D (2019) Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges. Comput Commun 140:38\u201360","journal-title":"Comput Commun"},{"issue":"1","key":"765_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40649-019-0069-y","volume":"6","author":"S Zhang","year":"2019","unstructured":"Zhang S, Tong H, Xu J, Maciejewski R (2019) Graph convolutional networks: a comprehensive review. Comput Social Networks 6(1):1\u201323","journal-title":"Comput Social Networks"},{"key":"765_CR13","doi-asserted-by":"crossref","unstructured":"Almansouri HT, Masmoudi Y Hadoop distributed file system for big data analysis, in (2019) 4th World Conference on Complex Systems (WCCS), 2019: IEEE, pp. 1\u20135","DOI":"10.1109\/ICoCS.2019.8930804"},{"key":"765_CR14","doi-asserted-by":"crossref","unstructured":"Meghana C, Kariyapppa B Supervised Learning for Log-Based Anomaly Detection, in (2024) 8th International Conference on Computational System and Information Technology for Sustainable Solutions (CSITSS), 2024: IEEE, pp. 1\u20134","DOI":"10.1109\/CSITSS64042.2024.10816951"},{"issue":"5","key":"765_CR15","doi-asserted-by":"publisher","first-page":"2802","DOI":"10.3390\/smartcities7050109","volume":"7","author":"SS Sefati","year":"2024","unstructured":"Sefati SS, Craciunescu R, Arasteh B, Halunga S, Fratu O, Tal I (2024) Cybersecurity in a Scalable Smart City Framework Using Blockchain and Federated Learning for Internet of Things (IoT). Smart Cities 7(5):2802\u20132841","journal-title":"Smart Cities"},{"key":"765_CR16","first-page":"103871","volume":"85","author":"A Paul","year":"2024","unstructured":"Paul A, Sharma V, Olukoya O (2024) SQL injection attack: detection, prioritization & prevention. J Inform Secur Appl 85:103871","journal-title":"J Inform Secur Appl"},{"key":"765_CR17","doi-asserted-by":"publisher","first-page":"109468","DOI":"10.1016\/j.compeleceng.2024.109468","volume":"118","author":"A Farahani","year":"2024","unstructured":"Farahani A, Delkhosh H, Seifi H, Azimi M (2024) A new bi-level model for the false data injection attack on real-time electricity market considering uncertainties. Comput Electr Eng 118:109468","journal-title":"Comput Electr Eng"},{"key":"765_CR18","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.infsof.2016.02.005","volume":"74","author":"G Deepa","year":"2016","unstructured":"Deepa G, Thilagam PS (2016) Securing web applications from injection and logic vulnerabilities: approaches and challenges. \u200eInf Softw Technol 74:160\u2013180","journal-title":"\u200eInf Softw Technol"},{"issue":"4","key":"765_CR19","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/s10723-023-09703-9","volume":"21","author":"J Lu","year":"2023","unstructured":"Lu J, Lan J, Huang Y, Song M, Liu X (2023) Anti-attack intrusion detection model based on MPNN and traffic Spatiotemporal characteristics. J Grid Comput 21(4):60","journal-title":"J Grid Comput"},{"key":"765_CR20","doi-asserted-by":"publisher","unstructured":"Khan IA, Pi D, Kamal S, Alsuhaibani M, Alshammari BM. Federated-Boosting: A Distributed and Dynamic Boosting-Powered Cyber-Attack Detection Scheme for Security and Privacy of Consumer IoT. In IEEE Trans Consum Electron.\u00a0https:\/\/doi.org\/10.1109\/TCE.2024.3499942","DOI":"10.1109\/TCE.2024.3499942"},{"key":"765_CR21","doi-asserted-by":"crossref","unstructured":"Kaushal P, Kaur P (2025) Cyber security techniques architecture and design: Cyber-Attacks detection and prevention. Advancing cyber security through quantum cryptography. IGI Global, pp 231\u2013258","DOI":"10.4018\/979-8-3693-5961-7.ch009"},{"key":"765_CR22","doi-asserted-by":"publisher","unstructured":"Haq AU, Sefati SS, Nawaz SJ, Mihovska A, Beliatis MJ (2025) Need of UAVs and Physical Layer Security in Next-Generation Non-Terrestrial Wireless Networks: Potential Challenges and Open Issues. In IEEE Open J of Veh Technol 6:554\u2013595. https:\/\/doi.org\/10.1109\/OJVT.2025.3525781.","DOI":"10.1109\/OJVT.2025.3525781"},{"issue":"2","key":"765_CR23","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/s10994-019-05855-6","volume":"109","author":"JE Van Engelen","year":"2020","unstructured":"Van Engelen JE, Hoos HH (2020) A survey on semi-supervised learning. Mach Learn 109(2):373\u2013440","journal-title":"Mach Learn"},{"key":"765_CR24","doi-asserted-by":"crossref","unstructured":"Pise NN, Kulkarni P A survey of semi-supervised learning methods, in (2008) International conference on computational intelligence and security, 2008, vol. 2: IEEE, pp. 30\u201334","DOI":"10.1109\/CIS.2008.204"},{"key":"765_CR25","doi-asserted-by":"publisher","first-page":"102002","DOI":"10.1016\/j.inffus.2023.102002","volume":"101","author":"IA Khan","year":"2024","unstructured":"Khan IA et al (2024) Fed-inforce-fusion: A federated reinforcement-based fusion model for security and privacy protection of IoMT networks against cyber-attacks. Inform Fusion 101:102002","journal-title":"Inform Fusion"},{"key":"765_CR26","doi-asserted-by":"publisher","first-page":"78658","DOI":"10.1109\/ACCESS.2021.3083060","volume":"9","author":"AB Nassif","year":"2021","unstructured":"Nassif AB, Talib MA, Nasir Q, Dakalbab FM (2021) Machine learning for anomaly detection: A systematic review. Ieee Access 9:78658\u201378700","journal-title":"Ieee Access"},{"issue":"7","key":"765_CR27","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1016\/j.cose.2010.05.002","volume":"29","author":"F Palmieri","year":"2010","unstructured":"Palmieri F, Fiore U (2010) Network anomaly detection through nonlinear analysis. Computers Secur 29(7):737\u2013755","journal-title":"Computers Secur"},{"key":"765_CR28","doi-asserted-by":"publisher","unstructured":"Sefati SS, Halunga S (2022) Mobile sink assisted data gathering for URLLC in IoT using a fuzzy logic system, 2022 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom). Sofia 379\u2013384.\u00a0https:\/\/doi.org\/10.1109\/BlackSeaCom54372.2022.9858268","DOI":"10.1109\/BlackSeaCom54372.2022.9858268"},{"issue":"10","key":"765_CR29","doi-asserted-by":"publisher","first-page":"1082","DOI":"10.3390\/app7101082","volume":"7","author":"GA Pimenta Rodrigues","year":"2017","unstructured":"Pimenta Rodrigues GA et al (2017) Cybersecurity and network forensics: analysis of malicious traffic towards a honeynet with deep packet inspection. Appl Sci 7(10):1082","journal-title":"Appl Sci"},{"issue":"1","key":"765_CR30","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/s10207-023-00742-7","volume":"23","author":"S Lagraa","year":"2024","unstructured":"Lagraa S, Hus\u00e1k M, Seba H, Vuppala S, State R, Ouedraogo M (2024) A review on graph-based approaches for network security monitoring and botnet detection. Int J Inf Secur 23(1):119\u2013140","journal-title":"Int J Inf Secur"},{"key":"765_CR31","doi-asserted-by":"publisher","unstructured":"Ghadermazi J, Shah\u00a0A, Bastian ND (2025) Towards Real-Time Network Intrusion Detection With Image-Based Sequential Packets Representation. In IEEE Transactions on Big Data 11(1):157\u2013173. https:\/\/doi.org\/10.1109\/TBDATA.2024.3403394","DOI":"10.1109\/TBDATA.2024.3403394"},{"key":"765_CR32","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/S1353-4858(21)00039-8","volume":"4","author":"S Eswaran","year":"2021","unstructured":"Eswaran S, Srinivasan A, Honnavalli P (2021) A threshold-based, real-time analysis in early detection of endpoint anomalies using SIEM expertise. Network Security 4:7\u201316","journal-title":"Network Security"},{"issue":"8","key":"765_CR33","doi-asserted-by":"publisher","first-page":"378","DOI":"10.3390\/a16080378","volume":"16","author":"V Demertzi","year":"2023","unstructured":"Demertzi V, Demertzis S, Demertzis K (2023) An Overview of Privacy Dimensions on the Industrial Internet of Things (IIoT). Algorithms 16(8):378","journal-title":"Algorithms"},{"issue":"2","key":"765_CR34","doi-asserted-by":"publisher","first-page":"443","DOI":"10.33022\/ijcs.v12i2.3182","volume":"12","author":"K Bezas","year":"2023","unstructured":"Bezas K, Filippidou F (2023) Comparative analysis of open source security information & event management systems (SIEMs). Indonesian J Comput Sci 12(2):443\u2013468","journal-title":"Indonesian J Comput Sci"},{"issue":"13","key":"765_CR35","doi-asserted-by":"publisher","first-page":"6067","DOI":"10.3390\/s23136067","volume":"23","author":"HA Noman","year":"2023","unstructured":"Noman HA, Abu-Sharkh OM (2023) Code injection attacks in wireless-based Internet of Things (IoT): A comprehensive review and practical implementations. Sensors 23(13):6067","journal-title":"Sensors"},{"issue":"4","key":"765_CR36","doi-asserted-by":"publisher","first-page":"758","DOI":"10.3390\/jcp3040034","volume":"3","author":"T Theodoropoulos","year":"2023","unstructured":"Theodoropoulos T et al (2023) Security in Cloud-Native services: A survey. J Cybersecur Priv 3(4):758\u2013793","journal-title":"J Cybersecur Priv"},{"issue":"19","key":"765_CR37","doi-asserted-by":"publisher","first-page":"8174","DOI":"10.3390\/s23198174","volume":"23","author":"S Alam","year":"2023","unstructured":"Alam S, Alam Y, Cui S, Akujuobi C (2023) Data-driven network analysis for anomaly traffic detection. Sensors 23(19):8174","journal-title":"Sensors"},{"key":"765_CR38","doi-asserted-by":"publisher","first-page":"110866","DOI":"10.1016\/j.patcog.2024.110866","volume":"157","author":"X Zeng","year":"2025","unstructured":"Zeng X, Zhuo Y, Liao T, Guo J (2025) Cloud-GAN: cloud generation adversarial networks for anomaly detection. Pattern Recogn 157:110866","journal-title":"Pattern Recogn"},{"key":"765_CR39","doi-asserted-by":"publisher","first-page":"4254","DOI":"10.1109\/JSTARS.2021.3070786","volume":"14","author":"S Mohajerani","year":"2021","unstructured":"Mohajerani S, Saeedi P (2021) Cloud and cloud shadow segmentation for remote sensing imagery via filtered Jaccard loss function and parametric augmentation. IEEE J Sel Top Appl Earth Observations Remote Sens 14:4254\u20134266","journal-title":"IEEE J Sel Top Appl Earth Observations Remote Sens"},{"key":"765_CR40","doi-asserted-by":"publisher","unstructured":"Chu G, et al (2025) Anomaly Detection on Interleaved Log Data With Semantic Association Mining on Log-Entity Graph. In IEEE Transactions on Software Engineering 51(2):581\u2013594. https:\/\/doi.org\/10.1109\/TSE.2025.3527856","DOI":"10.1109\/TSE.2025.3527856"},{"key":"765_CR41","doi-asserted-by":"publisher","first-page":"109347","DOI":"10.1016\/j.compeleceng.2024.109347","volume":"118","author":"X Zhang","year":"2024","unstructured":"Zhang X, Yan W, Li H (2024) False data injection attacks detection and state restoration based on power system interval dynamic state Estimation. Comput Electr Eng 118:109347","journal-title":"Comput Electr Eng"},{"key":"765_CR42","doi-asserted-by":"publisher","first-page":"102507","DOI":"10.1016\/j.is.2024.102507","volume":"129","author":"JM G\u00f8ttcke","year":"2025","unstructured":"G\u00f8ttcke JM, Zimek A, Campello RJ (2025) Bayesian label distribution propagation: A semi-supervised probabilistic k nearest neighbor classifier. Inform Syst 129:102507","journal-title":"Inform Syst"},{"key":"765_CR43","doi-asserted-by":"publisher","first-page":"104303","DOI":"10.1016\/j.cose.2024.104303","volume":"150","author":"Y Song","year":"2025","unstructured":"Song Y et al (2025) A multi-source log semantic analysis-based attack investigation approach. Computers Secur 150:104303","journal-title":"Computers Secur"},{"key":"765_CR44","first-page":"29005","volume":"36","author":"J Chen","year":"2023","unstructured":"Chen J, Ying R (2023) Tempme: towards the explainability of Temporal graph neural networks via motif discovery. Adv Neural Inf Process Syst 36:29005\u201329028","journal-title":"Adv Neural Inf Process Syst"},{"key":"765_CR45","doi-asserted-by":"crossref","unstructured":"Sefati SS, Fartu O, Nor AM, Halunga S (2024) Enhancing Internet of Things security and efficiency: Anomaly detection via proof of stake blockchain techniques, in 2024 International Conference on Artificial Intelligence in Information and Communication (ICAIIC),: IEEE, pp. 591\u2013595","DOI":"10.1109\/ICAIIC60209.2024.10463516"},{"key":"765_CR46","doi-asserted-by":"crossref","unstructured":"Leushuis RM (2025) Probabilistic forecasting with VAR-VAE: Advancing time series forecasting under uncertainty. Info Sci 713. p. 122184","DOI":"10.1016\/j.ins.2025.122184"},{"issue":"15","key":"765_CR47","doi-asserted-by":"publisher","first-page":"3283","DOI":"10.3390\/electronics12153283","volume":"12","author":"N Jeffrey","year":"2023","unstructured":"Jeffrey N, Tan Q, Villar JR (2023) A review of anomaly detection strategies to detect threats to cyber-physical systems. Electronics 12(15):3283","journal-title":"Electronics"},{"key":"765_CR48","first-page":"289","volume":"45","author":"RAA Habeeb","year":"2019","unstructured":"Habeeb RAA, Nasaruddin F, Gani A, Hashem IAT, Ahmed E, Imran M (2019) Real-time big data processing for anomaly detection: A survey. Int J Inf Manag 45:289\u2013307","journal-title":"Int J Inf Manag"},{"issue":"6","key":"765_CR49","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1016\/j.future.2012.01.006","volume":"28","author":"MT Khorshed","year":"2012","unstructured":"Khorshed MT, Ali AS, Wasimi SA (2012) A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Generation Comput Syst 28(6):833\u2013851","journal-title":"Future Generation Comput Syst"},{"issue":"2","key":"765_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10723-025-09805-6","volume":"23","author":"SS Sefati","year":"2025","unstructured":"Sefati SS, Nor AM, Arasteh B, Craciunescu R, Comsa C-R (2025) A probabilistic approach to load balancing in Multi-Cloud environments via machine learning and optimization algorithms. J Grid Comput 23(2):1\u201336","journal-title":"J Grid Comput"},{"key":"765_CR51","doi-asserted-by":"publisher","first-page":"100665","DOI":"10.1016\/j.cosrev.2024.100665","volume":"54","author":"D Adhikari","year":"2024","unstructured":"Adhikari D, Jiang W, Zhan J, Rawat DB, Bhattarai A (2024) Recent advances in anomaly detection in internet of things: status, challenges, and perspectives. Comput Sci Rev 54:100665","journal-title":"Comput Sci Rev"},{"key":"765_CR52","doi-asserted-by":"publisher","unstructured":"Sefati SS, Halunga S (2022) Data forwarding to Fog with guaranteed fault tolerance in Internet of Things (IoT). 2022 14th International Conference on Communications (COMM). Bucharest 1\u20135. https:\/\/doi.org\/10.1109\/COMM54429.2022.9817179","DOI":"10.1109\/COMM54429.2022.9817179"},{"issue":"1","key":"765_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10723-024-09790-2","volume":"23","author":"J Liu","year":"2025","unstructured":"Liu J, Huang Y, Deng C, Zhang L, Chen C, Li K (2025) Efficient resource allocation algorithm for maximizing operator profit in 5G edge computing network. J Grid Comput 23(1):1\u201318","journal-title":"J Grid Comput"},{"issue":"1","key":"765_CR54","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10723-024-09789-9","volume":"23","author":"SN Agos Jawaddi","year":"2025","unstructured":"Agos Jawaddi SN, Ismail A, Sulaiman MS, Cardellini V (2025) Analyzing Energy-Efficient and Kubernetes-Based autoscaling of microservices using probabilistic model checking. J Grid Comput 23(1):3","journal-title":"J Grid Comput"},{"issue":"5","key":"765_CR55","doi-asserted-by":"publisher","first-page":"2136","DOI":"10.1109\/TDSC.2020.3037903","volume":"18","author":"H Studiawan","year":"2020","unstructured":"Studiawan H, Sohel F, Payne C (2020) Anomaly detection in operating system logs with deep learning-based sentiment analysis. IEEE Trans Dependable Secur Comput 18(5):2136\u20132148","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"765_CR56","first-page":"3","volume":"80","author":"Z Xu","year":"2024","unstructured":"Xu Z, Wang Z, Xu J, Shi H, Zhao H (2024) Enhancing log anomaly detection with semantic embedding and integrated neural network innovations. Computers Mater Continua 80:3","journal-title":"Computers Mater Continua"},{"key":"765_CR57","first-page":"11","volume":"14","author":"AA Mir","year":"2023","unstructured":"Mir AA, Zuhairi MF, Musa SM (2023) Graph anomaly detection with graph convolutional networks. Int J Adv Comput Sci Appl 14:11","journal-title":"Int J Adv Comput Sci Appl"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-025-00765-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-025-00765-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-025-00765-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T12:45:07Z","timestamp":1757249107000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-025-00765-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,16]]},"references-count":57,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["765"],"URL":"https:\/\/doi.org\/10.1186\/s13677-025-00765-6","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,16]]},"assertion":[{"value":"10 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"All authors confirm that neither the article nor any parts of its content are currently under consideration or published in another journal. The authors agree to publication in the journal.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"38"}}