{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T11:27:35Z","timestamp":1745321255718,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031175091"},{"type":"electronic","value":"9783031175107"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-17510-7_1","type":"book-chapter","created":{"date-parts":[[2022,10,12]],"date-time":"2022-10-12T04:03:06Z","timestamp":1665547386000},"page":"1-17","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["KRAKEN: A Knowledge-Based Recommender System for\u00a0Analysts, to\u00a0Kick Exploration up\u00a0a\u00a0Notch"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7132-1966","authenticated-orcid":false,"given":"Romain","family":"Brisse","sequence":"first","affiliation":[]},{"given":"Simon","family":"Boche","sequence":"additional","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric","family":"Majorczyk","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4984-2199","authenticated-orcid":false,"given":"Jean-Francois","family":"Lalande","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,13]]},"reference":[{"issue":"6","key":"1_CR1","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1109\/TKDE.2005.99","volume":"17","author":"G Adomavicius","year":"2005","unstructured":"Adomavicius, G., Tuzhilin, A.: Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions. IEEE Trans. Knowl. Data Eng. 17(6), 734\u2013749 (2005). https:\/\/doi.org\/10.1109\/TKDE.2005.99","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"5","key":"1_CR2","first-page":"511","volume":"1","author":"A Afshari","year":"2010","unstructured":"Afshari, A., Mojahed, M., Yusuff, R.M.: Simple additive weighting approach to personnel selection problem. Int. J. Innovation, Manage. Technol. 1(5), 511 (2010)","journal-title":"Int. J. Innovation, Manage. Technol."},{"key":"1_CR3","doi-asserted-by":"publisher","unstructured":"Beran, M., Hrdina, F., Kou\u0159il, D., O\u0161lej\u0161ek, R., Z\u00e1kop\u010danov\u00e1, K.: Exploratory analysis of file system metadata for rapid investigation of security incidents. In: 2020 IEEE Symposium on Visualization for Cyber Security (VizSec), pp. 11\u201320 (2020). https:\/\/doi.org\/10.1109\/VizSec51108.2020.00008","DOI":"10.1109\/VizSec51108.2020.00008"},{"key":"1_CR4","unstructured":"Bertin, J., Barbut, M.: Semiology of Graphics: Diagrams, Networks, Maps. Ed. de l\u2019EHESS (2005)"},{"key":"1_CR5","unstructured":"Burke, R.: Knowledge-based recommender systems. In: Encyclopedia of library and information systems, vol. 69, pp. 175\u2013186 (2000)"},{"issue":"4","key":"1_CR6","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1023\/A:1021240730564","volume":"12","author":"R Burke","year":"2002","unstructured":"Burke, R.: Hybrid recommender systems: survey and experiments. User Model. User-Adap. Inter. 12(4), 331\u2013370 (2002). https:\/\/doi.org\/10.1023\/A:1021240730564","journal-title":"User Model. User-Adap. Inter."},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/978-3-540-72079-9_12","volume-title":"The Adaptive Web","author":"R Burke","year":"2007","unstructured":"Burke, R.: Hybrid web recommender systems. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) The Adaptive Web. LNCS, vol. 4321, pp. 377\u2013408. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-72079-9_12"},{"key":"1_CR8","doi-asserted-by":"publisher","unstructured":"Cappers, B.C., van Wijk, J.J.: Snaps: semantic network traffic analysis through projection and selection. In: 2015 IEEE Symposium on Visualization for Cyber Security (VizSec), pp. 1\u20138. IEEE (2015). https:\/\/doi.org\/10.1109\/VIZSEC.2015.7312768","DOI":"10.1109\/VIZSEC.2015.7312768"},{"key":"1_CR9","doi-asserted-by":"publisher","unstructured":"Cremilleux, D., Bidan, C., Majorczyk, F., Prigent, N.: VEGAS: visualizing, exploring and grouping alerts. In: NOMS 2016\u20132016 IEEE\/IFIP Network Operations and Management Symposium, pp. 1097\u20131100. IEEE (2016). https:\/\/doi.org\/10.1109\/NOMS.2016.7502968","DOI":"10.1109\/NOMS.2016.7502968"},{"issue":"2","key":"1_CR10","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1177\/1473871618806555","volume":"18","author":"Z Cui","year":"2019","unstructured":"Cui, Z., Badam, S.K., Yal\u00e7in, M.A., Elmqvist, N.: Datasite: proactive visual data exploration with computation of insight-based recommendations. Inf. Vis. 18(2), 251\u2013267 (2019). https:\/\/doi.org\/10.1177\/1473871618806555","journal-title":"Inf. Vis."},{"key":"1_CR11","doi-asserted-by":"publisher","unstructured":"Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. SE-13, 222\u2013232 (1987). https:\/\/doi.org\/10.1109\/TSE.1987.232894","DOI":"10.1109\/TSE.1987.232894"},{"key":"1_CR12","doi-asserted-by":"publisher","unstructured":"Fischer, F., Keim, D.A.: NStreamAware: real-time visual analytics for data streams to enhance situational awareness. In: Proceedings of the Eleventh Workshop on Visualization for Cyber Security, pp. 65\u201372. ACM (2014). https:\/\/doi.org\/10.1145\/2671491.2671495","DOI":"10.1145\/2671491.2671495"},{"key":"1_CR13","doi-asserted-by":"publisher","unstructured":"Foresti, S., Agutter, J.: Visalert: From idea to product. In: Goodall, J.R., Conti, G., Ma, KL. (eds) VizSEC 2007. Mathematics and Visualization, pp. 159\u2013174. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-78243-8_11","DOI":"10.1007\/978-3-540-78243-8_11"},{"key":"1_CR14","doi-asserted-by":"publisher","unstructured":"Hu, K., Bakker, M.A., Li, S., Kraska, T., Hidalgo, C.: VizML: a machine learning approach to visualization recommendation. In: Proceedings of the 2019 Conference on Human Factors in Computing Systems (CHI), ACM (2019). https:\/\/doi.org\/10.1145\/3290605.3300358","DOI":"10.1145\/3290605.3300358"},{"key":"1_CR15","doi-asserted-by":"publisher","unstructured":"Humphries, C., Prigent, N., Bidan, C., Majorczyk, F.: Elvis: extensible log visualization. In: Proceedings of the Tenth Workshop on Visualization for Cyber Security, p. 9\u201316. VizSec 2013, Association for Computing Machinery (2013). https:\/\/doi.org\/10.1145\/2517957.2517959","DOI":"10.1145\/2517957.2517959"},{"key":"1_CR16","doi-asserted-by":"publisher","unstructured":"Humphries, C., Prigent, N., Bidan, C., Majorczyk, F.: CORGI: combination, organization and reconstruction through graphical interactions. In: 2014 IEEE Symposium on Visualization for Cyber Security (VizSec), pp. 57\u201364. IEEE (2014). https:\/\/doi.org\/10.1145\/2671491.2671494","DOI":"10.1145\/2671491.2671494"},{"issue":"4","key":"1_CR17","doi-asserted-by":"publisher","first-page":"700","DOI":"10.1057\/jors.2010.23","volume":"62","author":"A Ishizaka","year":"2011","unstructured":"Ishizaka, A., Balkenborg, D., Kaplan, T.: Influence of aggregation and measurement scale on ranking a compromise alternative in AHP. J. Oper. Res. Soc. 62(4), 700\u2013710 (2011). https:\/\/doi.org\/10.1057\/jors.2010.23","journal-title":"J. Oper. Res. Soc."},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Jannach, D., Zanker, M., Felfernig, A., Friedrich, G.: Recommender Systems: An Introduction (2010)","DOI":"10.1017\/CBO9780511763113"},{"issue":"5","key":"1_CR19","doi-asserted-by":"publisher","first-page":"738","DOI":"10.3846\/20294913.2016.1210694","volume":"22","author":"G Kou","year":"2016","unstructured":"Kou, G., Ergu, D., Lin, C., Chen, Y.: Pairwise comparison matrix in multiple criteria decision making. Technol. Econ. Dev. Econ. 22(5), 738\u2013765 (2016). https:\/\/doi.org\/10.3846\/20294913.2016.1210694","journal-title":"Technol. Econ. Dev. Econ."},{"key":"1_CR20","doi-asserted-by":"publisher","unstructured":"Li, T., Convertino, G., Tayi, R.K., Kazerooni, S.: What data should i protect?: recommender and planning support for data security analysts. In: Proceedings of the 24th International Conference on Intelligent User Interfaces, pp. 286\u2013297. ACM (2019). https:\/\/doi.org\/10.1145\/3301275.3302294","DOI":"10.1145\/3301275.3302294"},{"issue":"2","key":"1_CR21","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1145\/22949.22950","volume":"5","author":"J Mackinlay","year":"1986","unstructured":"Mackinlay, J.: Automating the design of graphical presentations of relational information. ACM Trans. Graph. (Tog) 5(2), 110\u2013141 (1986). https:\/\/doi.org\/10.1145\/22949.22950","journal-title":"ACM Trans. Graph. (Tog)"},{"issue":"6","key":"1_CR22","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1109\/TVCG.2007.70594","volume":"13","author":"J Mackinlay","year":"2007","unstructured":"Mackinlay, J., Hanrahan, P., Stolte, C.: Show me: automatic presentation for visual analysis. IEEE Trans. Visual Comput. Graph. 13(6), 1137\u20131144 (2007). https:\/\/doi.org\/10.1109\/TVCG.2007.70594","journal-title":"IEEE Trans. Visual Comput. Graph."},{"key":"1_CR23","doi-asserted-by":"publisher","unstructured":"Nunnally, T., Abdullah, K., Uluagac, A.S., Copeland, J.A., Beyah, R.: NAVSEC: a recommender system for 3d network security visualizations. In: Proceedings of the Tenth Workshop on Visualization for Cyber Security - 2013 IEEE Symposium on Visualization for Cyber Security (VizSec). ACM Press (2013). https:\/\/doi.org\/10.1145\/2517957.2517963","DOI":"10.1145\/2517957.2517963"},{"key":"1_CR24","doi-asserted-by":"publisher","unstructured":"Nunnally, T., Chi, P., Abdullah, K., Uluagac, A.S., Copeland, J.A., Beyah, R.: P3D: A parallel 3D coordinate visualization for advanced network scans. In: 2013 IEEE International Conference on Communications (ICC), pp. 2052\u20132057 (2013). https:\/\/doi.org\/10.1109\/ICC.2013.6654828","DOI":"10.1109\/ICC.2013.6654828"},{"key":"1_CR25","doi-asserted-by":"publisher","unstructured":"Park, S.T., Chu, W.: Pairwise preference regression for cold-start recommendation. In: Proceedings of the Third ACM Conference on Recommender Systems - RecSys 2009, p. 21. ACM (2009). https:\/\/doi.org\/10.1145\/1639714.1639720","DOI":"10.1145\/1639714.1639720"},{"key":"1_CR26","unstructured":"Paxson, V., Campbell, S., Lee, J., et al.: Bro intrusion detection system. Technical Report Lawrence Berkeley National Laboratory (2006)"},{"key":"1_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-0-387-85820-3_1","volume-title":"Recommender Systems Handbook","author":"F Ricci","year":"2011","unstructured":"Ricci, F., Rokach, L., Shapira, B.: Introduction to recommender systems handbook. In: Ricci, F., Rokach, L., Shapira, B., Kantor, P.B. (eds.) Recommender Systems Handbook, pp. 1\u201335. Springer, Boston, MA (2011). https:\/\/doi.org\/10.1007\/978-0-387-85820-3_1"},{"key":"1_CR28","unstructured":"Roesch, M., et al.: Snort: Lightweight intrusion detection for networks. In: Lisa, vol. 99, pp. 229\u2013238 (1999)"},{"key":"1_CR29","doi-asserted-by":"publisher","unstructured":"Romero-Gomez, R., Nadji, Y., Antonakakis, M.: Towards designing effective visualizations for DNS-based network threat analysis. In: 2017 IEEE Symposium on Visualization for Cyber Security (VizSec), pp. 1\u20138. IEEE (2017). https:\/\/doi.org\/10.1109\/VIZSEC.2017.8062201","DOI":"10.1109\/VIZSEC.2017.8062201"},{"issue":"3","key":"1_CR30","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/0022-2496(77)90033-5","volume":"15","author":"TL Saaty","year":"1977","unstructured":"Saaty, T.L.: A scaling method for priorities in hierarchical structures. J. Math. Psychol. 15(3), 234\u2013281 (1977). https:\/\/doi.org\/10.1016\/0022-2496(77)90033-5","journal-title":"J. Math. Psychol."},{"key":"1_CR31","doi-asserted-by":"publisher","unstructured":"Theron, R., Mag\u00e1n-Carri\u00f3n, R., Camacho, J., Fernndez, G.M.: Network-wide intrusion detection supported by multivariate analysis and interactive visualization. In: 2017 IEEE Symposium on Visualization for Cyber Security (VizSec), pp. 1\u20138. IEEE (2017). https:\/\/doi.org\/10.1109\/VIZSEC.2017.8062198","DOI":"10.1109\/VIZSEC.2017.8062198"},{"key":"1_CR32","doi-asserted-by":"publisher","unstructured":"Ulmer, A., Sessler, D., Kohlhammer, J.: Netcapvis: Web-based progressive visual analytics for network packet captures. In: 2019 IEEE Symposium on Visualization for Cyber Security (VizSec), pp. 1\u201310 (2019). https:\/\/doi.org\/10.1109\/VizSec48167.2019.9161633","DOI":"10.1109\/VizSec48167.2019.9161633"},{"key":"1_CR33","doi-asserted-by":"publisher","unstructured":"Vartak, M., Parameswaran, A., Polyzotis, N., Madden, S.R.: SEEDB: automatically generating query visualizations. In: Proceedings of the VLDB Endowment, vol. 7, pp. 1581\u20131584 (2014). https:\/\/doi.org\/10.14778\/2733004.2733035","DOI":"10.14778\/2733004.2733035"},{"issue":"1","key":"1_CR34","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1109\/TVCG.2015.2467191","volume":"22","author":"K Wongsuphasawat","year":"2016","unstructured":"Wongsuphasawat, K., Moritz, D., Anand, A., Mackinlay, J., Howe, B., Heer, J.: Voyager: exploratory analysis via faceted browsing of visualization recommendations. IEEE Trans. Visual Comput. Graph. 22(1), 649\u2013658 (2016). https:\/\/doi.org\/10.1109\/TVCG.2015.2467191","journal-title":"IEEE Trans. Visual Comput. Graph."},{"key":"1_CR35","doi-asserted-by":"publisher","unstructured":"Wongsuphasawat, K., et al.: Voyager 2: augmenting visual analysis with partial view specifications. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, p. 2648\u20132659. Association for Computing Machinery (2017). https:\/\/doi.org\/10.1145\/3025453.3025768","DOI":"10.1145\/3025453.3025768"},{"key":"1_CR36","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.cose.2018.02.011","volume":"76","author":"C Zhong","year":"2018","unstructured":"Zhong, C., Lin, T., Liu, P., Yen, J., Chen, K.: A cyber security data triage operation retrieval system. Comput. Sec. 76, 12\u201331 (2018). https:\/\/doi.org\/10.1016\/j.cose.2018.02.011","journal-title":"Comput. Sec."},{"key":"1_CR37","unstructured":"Zimmerman, C.: The strategies of a world-class cybersecurity operations center. The MITRE Corporation (2014)"}],"container-title":["Lecture Notes in Computer Science","Innovative Security Solutions for Information Technology and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-17510-7_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,23]],"date-time":"2022-12-23T12:03:33Z","timestamp":1671797013000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-17510-7_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031175091","9783031175107"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-17510-7_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"13 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}