{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T04:11:47Z","timestamp":1751602307970,"version":"3.41.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031877711"},{"type":"electronic","value":"9783031877728"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87772-8_31","type":"book-chapter","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T07:30:47Z","timestamp":1745307047000},"page":"367-379","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Employing PDDL Plan to\u00a0Recommend Security Controls Against Cyberattacks"],"prefix":"10.1007","author":[{"given":"Afaq","family":"Inayat","sequence":"first","affiliation":[]},{"given":"Matheus","family":"Saueressig","sequence":"additional","affiliation":[]},{"given":"Muriel Figueredo","family":"Franco","sequence":"additional","affiliation":[]},{"given":"Eder John","family":"Scheid","sequence":"additional","affiliation":[]},{"given":"Lisandro Zambenedetti","family":"Granville","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,23]]},"reference":[{"key":"31_CR1","doi-asserted-by":"publisher","first-page":"2263","DOI":"10.30574\/wjarr.2024.21.1.0313","volume":"21","author":"AO Adewusi","year":"2024","unstructured":"Adewusi, A.O., Okoli, U.I., Olorunsogo, T., Adaga, E., Daraojimba, D.O., Obi, O.C.: Artificial intelligence in cybersecurity: protecting national infrastructure: a USA. World J. Adv. Res. Rev. 21, 2263\u20132275 (2024)","journal-title":"World J. Adv. Res. Rev."},{"doi-asserted-by":"crossref","unstructured":"Ayala, C., Jimenez, K., Loza-Aguirre, E., Andrade, R.O.: A hybrid recommender system for cybersecurity based on a rating approach. In: Advances in Security, Networks, and Internet of Things: Proceedings from SAM\u201920, ICWN\u201920, ICOMP\u201920, and ESCS\u201920, pp. 397\u2013409. Springer, Cham (2021)","key":"31_CR2","DOI":"10.1007\/978-3-030-71017-0_28"},{"doi-asserted-by":"crossref","unstructured":"Castellanos, S., Alvarez-Herault, M.C., Lalanda, P.: Decision support tool for the development of power distribution networks based on AI planning. In: 27th International Conference on Electricity Distribution (CIRED 2023), vol.\u00a02023. Rome, Italy, pp. 1425\u20131429 (2023)","key":"31_CR3","DOI":"10.1049\/icp.2023.0759"},{"doi-asserted-by":"crossref","unstructured":"Choi, T., et al.: St\u00a0Clair: Plan2defend: AI planning for cybersecurity in smart grids. In: 2021 IEEE PES Innovative Smart Grid Technologies-Asia (ISGT Asia), pp.\u00a01\u20135 (2021)","key":"31_CR4","DOI":"10.1109\/ISGTAsia49270.2021.9715679"},{"key":"31_CR5","doi-asserted-by":"publisher","first-page":"48360","DOI":"10.1109\/ACCESS.2018.2867556","volume":"6","author":"G Falco","year":"2018","unstructured":"Falco, G., Viswanathan, A., Caldera, C., Shrobe, H.: A master attack methodology for an AI-based automated attack planner for smart cities. IEEE Access 6, 48360\u201348373 (2018)","journal-title":"IEEE Access"},{"issue":"12","key":"31_CR6","doi-asserted-by":"publisher","first-page":"5523","DOI":"10.1007\/s10115-023-01906-6","volume":"65","author":"L Ferreira","year":"2023","unstructured":"Ferreira, L., Silva, D.C., Itzazelaia, M.U.: Recommender systems in cybersecurity. Knowl. Inf. Syst. 65(12), 5523\u20135559 (2023)","journal-title":"Knowl. Inf. Syst."},{"key":"31_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/978-3-030-63058-4_3","volume-title":"Economics of Grids, Clouds, Systems, and Services","author":"M Franco","year":"2020","unstructured":"Franco, M., Sula, E., Rodrigues, B., Scheid, E., Stiller, B.: ProtectDDoS: a platform for trustworthy offering and recommendation of protections. In: Djemame, K., Altmann, J., Ba\u00f1ares, J.\u00c1., Agmon Ben-Yehuda, O., Stankovski, V., Tuffin, B. (eds.) GECON 2020. LNCS, vol. 12441, pp. 28\u201340. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-63058-4_3"},{"doi-asserted-by":"crossref","unstructured":"Franco, M.F., Rodrigues, B., Stiller, B.: Mentor: the design and evaluation of a protection services recommender system. In: 2019 15th International Conference on Network and Service Management (CNSM), pp.\u00a01\u20137. IEEE, Halifax, Canada (2019)","key":"31_CR8","DOI":"10.23919\/CNSM46954.2019.9012686"},{"key":"31_CR9","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1613\/jair.1705","volume":"26","author":"M Helmert","year":"2006","unstructured":"Helmert, M.: The fast downward planning system. J. Artif. Intell. Res. 26, 191\u2013246 (2006)","journal-title":"J. Artif. Intell. Res."},{"key":"31_CR10","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1613\/jair.1144","volume":"20","author":"J Hoffmann","year":"2003","unstructured":"Hoffmann, J.: The metric-ff planning system: translating \u201cignoring delete lists\u2019\u2019 to numeric state variables. J. Artif. Intell. Res. 20, 291\u2013341 (2003)","journal-title":"J. Artif. Intell. Res."},{"doi-asserted-by":"crossref","unstructured":"Huff, P., McClanahan, K., Le, T., Li, Q.: A recommender system for tracking vulnerabilities. In: Proceedings of the 16th International Conference on Availability, Reliability and Security, pp.\u00a01\u20137 (2021)","key":"31_CR11","DOI":"10.1145\/3465481.3470039"},{"doi-asserted-by":"crossref","unstructured":"Hus\u00e1k, M.: Towards a data-driven recommender system for handling ransomware and similar incidents. In: 2021 IEEE International Conference on Intelligence and Security Informatics (ISI), pp.\u00a01\u20136. IEEE, San Antonio, Texas USA (2021)","key":"31_CR12","DOI":"10.1109\/ISI53945.2021.9624774"},{"doi-asserted-by":"crossref","unstructured":"Iavich, M., Iashvili, G., Odarchenko, R., Gnatyuk, S., Gagnidze, A.: Developing security recommender system using content-based filtering mechanisms. In: International Scientific-Practical Conference \u201cInformation Technology for Education, Science and Technics\u201d, pp. 619\u2013634. Springer, Cherkasy, Ukraine (2022)","key":"31_CR13","DOI":"10.1007\/978-3-031-35467-0_37"},{"doi-asserted-by":"crossref","unstructured":"Inayat, A., Franco, M.F., Scheid, E.J., Granville, L.Z.: Security management using planning domain definition language: a case for ransomware mitigation. In: Anais da XX Escola Regional de Redes de Computadores. SBC, Port Alegera, Brazil, pp. 31\u201336 (2023)","key":"31_CR14","DOI":"10.5753\/errc.2023.902"},{"unstructured":"Kazdagli, M., Tiwari, M., Kumar, A.: Leveraging AI planning for detecting cloud security vulnerabilities. arXiv preprint arXiv:2402.10985 (2024)","key":"31_CR15"},{"doi-asserted-by":"crossref","unstructured":"Kerr, R., Ding, S., Li, L., Taylor, A.: Accelerating autonomous cyber operations: a symbolic logic planner guided reinforcement learning approach. In: 2024 International Conference on Computing, Networking and Communications (ICNC), pp. 641\u2013647. Big Island, Hawaii, USA (2024)","key":"31_CR16","DOI":"10.1109\/ICNC59896.2024.10556056"},{"unstructured":"Khalaf, M., Peters, L., Waedt, K.: Modeling security controls and system assets as autonomous planning tasks. In: INFORMATIK 2022 (2022)","key":"31_CR17"},{"unstructured":"R. S. Labs: S3 ransomware: Part 1-attack vector (2024). https:\/\/rhinosecuritylabs.com\/aws\/s3-ransomware-part-1-attack-vector\/. Accessed 12 Dec 2024","key":"31_CR18"},{"doi-asserted-by":"crossref","unstructured":"Lou, X., Waedt, K., Gao, Y., Zid, I.B., Watson, V.: Combining artificial intelligence planning advantages to assist preliminary formal analysis on industrial control system cybersecurity vulnerabilities. In: 2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), pp.\u00a01\u20138. Gheorghe Asachi Technical University of Iasi, Romania (2018)","key":"31_CR19","DOI":"10.1109\/ECAI.2018.8678949"},{"doi-asserted-by":"crossref","unstructured":"Ma, J., Guo, Y., Fang, C., Zhang, Q.: Digital-twin-based cps anomaly diagnosis and security defense countermeasure recommendation. IEEE Internet Things J. (2024)","key":"31_CR20","DOI":"10.1109\/JIOT.2024.3366904"},{"doi-asserted-by":"crossref","unstructured":"Mizrak, F., Akkartal, G.R.: Prioritizing cybersecurity initiatives in aviation: a dematel-qsfs methodology. Heliyon 10(16) (2024)","key":"31_CR21","DOI":"10.1016\/j.heliyon.2024.e35487"},{"doi-asserted-by":"crossref","unstructured":"Nespoli, P., Marmol. F.G., Vidal, J.M.: Battling against cyberattacks: towards pre-standardization of countermeasures. Cluster Comput. 24, 57\u201381 (2021)","key":"31_CR22","DOI":"10.1007\/s10586-020-03198-9"},{"unstructured":"Obes, J.L., Sarraute, C., Richarte, G.: Attack planning in the real world. arXiv preprint arXiv:1306.4044 (2013)","key":"31_CR23"},{"key":"31_CR24","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1007\/s12530-018-9234-z","volume":"11","author":"N Polatidis","year":"2020","unstructured":"Polatidis, N., Pimenidis, E., Pavlidis, M., Papastergiou, S., Mouratidis, H.: From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks. Evol. Syst. 11, 479\u2013490 (2020)","journal-title":"Evol. Syst."},{"unstructured":"Reinstadler, B.M.: AI attack planning for emulated networks. Ph.D. thesis, Massachusetts Institute of Technology (2021)","key":"31_CR25"},{"issue":"1","key":"31_CR26","first-page":"1444182","volume":"2021","author":"Z Wang","year":"2021","unstructured":"Wang, Z., Zhang, Y., Liu, Z., Wei, X., Chen, Y., Wang, B.: An automatic planning-based attack path discovery approach from it to OT networks. Secur. Commun. Netw. 2021(1), 1444182 (2021)","journal-title":"Secur. Commun. Netw."},{"unstructured":"Zouave, E., Bruce, M., Colde, K., Jaitner, M., Rodhe, I., Gustafsson, T.: Artificially intelligent cyberattacks. Totalf\u00f6rsvarets forskningsinstitut FOI, Stockholm (2020)","key":"31_CR27"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87772-8_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T18:38:10Z","timestamp":1751567890000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87772-8_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031877711","9783031877728"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87772-8_31","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"23 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}