{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T05:48:17Z","timestamp":1751435297326},"reference-count":6,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T00:00:00Z","timestamp":1704240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T00:00:00Z","timestamp":1704240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,1,3]]},"DOI":"10.1109\/comsnets59351.2024.10427540","type":"proceedings-article","created":{"date-parts":[[2024,2,16]],"date-time":"2024-02-16T18:55:32Z","timestamp":1708109732000},"page":"291-293","source":"Crossref","is-referenced-by-count":2,"title":["Dynamic- X-Y: A Tool for Learning Dynamic Alert Suppression Policies in AIOps"],"prefix":"10.1109","author":[{"given":"Karan","family":"Bhukar","sequence":"first","affiliation":[{"name":"IBM India Research Laboratory"}]},{"given":"Harshit","family":"Kumar","sequence":"additional","affiliation":[{"name":"IBM India Research Laboratory"}]},{"given":"Seema","family":"Nagar","sequence":"additional","affiliation":[{"name":"IBM India Research Laboratory"}]},{"given":"Pooja","family":"Aggarwal","sequence":"additional","affiliation":[{"name":"IBM India Research Laboratory"}]},{"given":"Ian","family":"Manning","sequence":"additional","affiliation":[{"name":"IBM Software,Cork,Ireland"}]},{"given":"Rohan","family":"Arora","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center,NY,USA"}]},{"given":"Ruchi","family":"Mahindru","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center,NY,USA"}]},{"given":"Amit","family":"Paradkar","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center,NY,USA"}]},{"given":"Matthew","family":"Thornhill","sequence":"additional","affiliation":[{"name":"IBM Software,London,UK"}]},{"given":"Stephen","family":"Cook","sequence":"additional","affiliation":[{"name":"IBM Software,London,UK"}]},{"given":"Jack","family":"Buggins","sequence":"additional","affiliation":[{"name":"IBM Software,London,UK"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3558964"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP52600.2021.00032"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-8267-0_1"},{"volume-title":"Define alert suppression groups to throttle sets of similar alerts","key":"ref4"},{"volume-title":"Technical Analysis: The Complete Resource for Financial Market Technicians","year":"2010","author":"Kirkpatrick","key":"ref5"},{"volume-title":"Incident creation based on persistence and golden signal","key":"ref6"}],"event":{"name":"2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS)","start":{"date-parts":[[2024,1,3]]},"location":"Bengaluru, India","end":{"date-parts":[[2024,1,7]]}},"container-title":["2024 16th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10426746\/10426785\/10427540.pdf?arnumber=10427540","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T11:12:52Z","timestamp":1710414772000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10427540\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,3]]},"references-count":6,"URL":"https:\/\/doi.org\/10.1109\/comsnets59351.2024.10427540","relation":{},"subject":[],"published":{"date-parts":[[2024,1,3]]}}}