{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,27]],"date-time":"2025-02-27T05:29:32Z","timestamp":1740634172587,"version":"3.38.0"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3543030","type":"journal-article","created":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T18:38:32Z","timestamp":1739817512000},"page":"33361-33378","source":"Crossref","is-referenced-by-count":0,"title":["Anomaly Detection and Performance Analysis With Exponential Smoothing Model Powered by Genetic Algorithms and Meta Optimization"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3405-005X","authenticated-orcid":false,"given":"Ali Kerem","family":"G\u00fcler","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Kadir Has University, &#x0130;stanbul, T&#x00FC;rkiye"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2988-7656","authenticated-orcid":false,"given":"H\u00fcseyin","family":"Fuat Alsan","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Kadir Has University, &#x0130;stanbul, T&#x00FC;rkiye"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4453-3218","authenticated-orcid":false,"given":"Taner","family":"Arsan","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Kadir Has University, &#x0130;stanbul, T&#x00FC;rkiye"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC55140.2022.9922142"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67180-2_55"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2020.013813"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-022-01537-8"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/s24041230"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2019.116779"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/icmla.2015.141"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2019.00105"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03493-1_41"},{"issue":"1","key":"ref10","first-page":"51","article-title":"Evolution of outlier algorithms for anomaly detection","volume":"2","author":"Ersoy","year":"2021","journal-title":"Manch. J. Artif. Intell. Appl. Sci."},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.23919\/INM.2017.7987310"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2020.950.955"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.118989"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ECICE47484.2019.8942727"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcmds.2022.100072"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1088\/2632-072X\/ac392c"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.06.027"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12030721"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.106458"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/app11156698"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/computers12120253"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.04.070"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.23919\/CCC52363.2021.9549428"},{"volume-title":"Numenta Anomaly Benchmark","year":"2020","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s40745-021-00362-9"},{"volume-title":"SciPy V1.14.0 Manual: Scipy.Stats.Norm","year":"2023","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.4249\/scholarpedia.1883"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-73003-5_196"},{"volume-title":"Sklearn.Neural_Network.MLPRegressor","year":"2025","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/2.294849"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/BF00175355"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s12665-022-10578-4"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/b978-0-08-050684-5.50008-2"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1276958.1277190"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-023-09049-0"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1986.289288"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/10891431.pdf?arnumber=10891431","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T19:06:38Z","timestamp":1740596798000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10891431\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3543030","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2025]]}}}