{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T20:21:10Z","timestamp":1771359670545,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T00:00:00Z","timestamp":1704240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T00:00:00Z","timestamp":1704240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,1,3]]},"DOI":"10.1109\/comsnets59351.2024.10427016","type":"proceedings-article","created":{"date-parts":[[2024,2,16]],"date-time":"2024-02-16T13:55:32Z","timestamp":1708091732000},"page":"737-741","source":"Crossref","is-referenced-by-count":5,"title":["Adaptive Thresholding Heuristic for KPI Anomaly Detection"],"prefix":"10.1109","author":[{"given":"Ebenezer R.H.P.","family":"Isaac","sequence":"first","affiliation":[{"name":"Global AI Accelerator, Ericsson,Chennai,India"}]},{"given":"Akshat","family":"Sharma","sequence":"additional","affiliation":[{"name":"Global AI Accelerator, Ericsson,Chennai,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC50000.2020.9219701"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM50824.2020.9269100"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2021.06.033"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011409"},{"issue":"15","key":"ref5","doi-asserted-by":"crossref","DOI":"10.3390\/app11156698","article-title":"Semi-supervised time series anomaly detection based on statistics and deep learning","volume":"11","author":"Jiang","year":"2021","journal-title":"Applied Sciences"},{"key":"ref6","article-title":"Mospat: Automl based model selection and parameter tuning for time series anomaly detection","author":"Chatterjee","year":"2022","journal-title":"arXiv preprint"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403392"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4266498"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788611"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/02626667.2013.831174"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219845"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098144"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14778\/3514061.3514067"},{"key":"ref14","volume-title":"Adaptive thresholding heuristic for anomaly detection","author":"Isaac","year":"2021"},{"key":"ref15","volume-title":"First node and methods performed thereby for handling anomalous values","author":"Isaac","year":"2021"},{"key":"ref16","article-title":"QBSD: quartile-based seasonality decomposition for cost-effective time series forecasting","author":"Isaac","year":"2023","journal-title":"arXiv preprint"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1080\/00031305.2017.1380080"},{"key":"ref18","article-title":"PyOD: A python toolbox for scalable outlier detection","author":"Zhao","year":"2019","journal-title":"arXiv preprint"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-015-5521-0"},{"key":"ref20","first-page":"4393","article-title":"Deep one-class classification","volume-title":"International conference on machine learning","author":"Ruff"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00135"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3159580"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14142-8_8"},{"key":"ref24","article-title":"Auto-encoding variational bayes","author":"Kingma","year":"2013","journal-title":"arXiv preprint"},{"key":"ref25","volume-title":"pyextremes - Extreme Value Analysis (EVA) in Python","author":"Bocharov","year":"2022"},{"key":"ref26","article-title":"Constructing large-scale real-world benchmark datasets for aiops","author":"Li","year":"2022","journal-title":"arXiv preprint"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.141"},{"key":"ref28","volume-title":"Ericsson Outlier Nexus (EON)","year":"2023"}],"event":{"name":"2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS)","location":"Bengaluru, India","start":{"date-parts":[[2024,1,3]]},"end":{"date-parts":[[2024,1,7]]}},"container-title":["2024 16th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10426746\/10426785\/10427016.pdf?arnumber=10427016","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T09:02:43Z","timestamp":1709456563000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10427016\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,3]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/comsnets59351.2024.10427016","relation":{},"subject":[],"published":{"date-parts":[[2024,1,3]]}}}