{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T09:41:26Z","timestamp":1762335686464,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032104854","type":"print"},{"value":"9783032104861","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T00:00:00Z","timestamp":1762387200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T00:00:00Z","timestamp":1762387200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-10486-1_19","type":"book-chapter","created":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T09:36:42Z","timestamp":1762335402000},"page":"202-213","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Contrastive Learning for\u00a0Correlating Network Incidents"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-7801-4639","authenticated-orcid":false,"given":"Jeremias","family":"D\u00f6tterl","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,11,6]]},"reference":[{"key":"19_CR1","doi-asserted-by":"publisher","unstructured":"Ban, T., Takahashi, T., Ndichu, S., Inoue, D.: Breaking alert fatigue: AI-assisted SIEM framework for effective incident response. Appl. Sci. 13(11) (2023). https:\/\/doi.org\/10.3390\/app13116610","DOI":"10.3390\/app13116610"},{"key":"19_CR2","unstructured":"Chen, T., Kornblith, S., Norouzi, M., Hinton, G.: A simple framework for contrastive learning of visual representations. In: Proceedings of the 37th International Conference on Machine Learning. ICML\u201920, JMLR.org (2020)"},{"key":"19_CR3","doi-asserted-by":"publisher","unstructured":"Chen, Y., et al.: Identifying linked incidents in large-scale online service systems. In: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 304\u2013314. ESEC\/FSE 2020, Association for Computing Machinery, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3368089.3409768","DOI":"10.1145\/3368089.3409768"},{"key":"19_CR4","doi-asserted-by":"publisher","unstructured":"Chen, Z., et al.: Graph-based incident aggregation for large-scale online service systems. In: Proceedings of the 36th IEEE\/ACM International Conference on Automated Software Engineering, pp. 430\u2013442. ASE \u201921, IEEE Press (2022). https:\/\/doi.org\/10.1109\/ASE51524.2021.9678746","DOI":"10.1109\/ASE51524.2021.9678746"},{"key":"19_CR5","doi-asserted-by":"publisher","unstructured":"Freitas, S., Gharib, A.: GraphWeaver: billion-scale cybersecurity incident correlation. In: Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, pp. 4479\u20134486. CIKM \u201924, Association for Computing Machinery, New York, NY, USA (2024). https:\/\/doi.org\/10.1145\/3627673.3680057","DOI":"10.1145\/3627673.3680057"},{"key":"19_CR6","unstructured":"Grabocka, J., Schmidt-Thieme, L.: NeuralWarp: Time-series similarity with warping networks (2018)"},{"key":"19_CR7","doi-asserted-by":"publisher","unstructured":"Julisch, K.: Mining alarm clusters to improve alarm handling efficiency. In: Seventeenth Annual Computer Security Applications Conference, pp. 12\u201321 (2001). https:\/\/doi.org\/10.1109\/ACSAC.2001.991517","DOI":"10.1109\/ACSAC.2001.991517"},{"issue":"4","key":"19_CR8","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1145\/950191.950192","volume":"6","author":"K Julisch","year":"2003","unstructured":"Julisch, K.: Clustering intrusion detection alarms to support root cause analysis. ACM Trans. Inf. Syst. Secur. 6(4), 443\u2013471 (2003). https:\/\/doi.org\/10.1145\/950191.950192","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"19_CR9","unstructured":"Loshchilov, I., Hutter, F.: Decoupled weight decay regularization. In: International Conference on Learning Representations (2019)"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Manning, C.D., Raghavan, P., Sch\u00fctze, H.: Introduction to Information Retrieval. Cambridge University Press (2008)","DOI":"10.1017\/CBO9780511809071"},{"key":"19_CR11","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-319-03584-0_14","volume-title":"Cyberspace Safety and Security","author":"SA Mirheidari","year":"2013","unstructured":"Mirheidari, S.A., Arshad, S., Jalili, R.: Alert correlation algorithms: a survey and taxonomy. In: Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds.) Cyberspace Safety and Security, pp. 183\u2013197. Springer International Publishing, Cham (2013)"},{"key":"19_CR12","unstructured":"van\u00a0den Oord, A., Li, Y., Vinyals, O.: Representation learning with contrastive predictive coding. CoRR abs\/1807.03748 (2018)"},{"issue":"5","key":"19_CR13","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1016\/j.comnet.2012.10.022","volume":"57","author":"S Salah","year":"2013","unstructured":"Salah, S., Maci\u00e1-Fern\u00e1ndez, G., D\u00edaz-Verdejo, J.E.: A model-based survey of alert correlation techniques. Comput. Netw. 57(5), 1289\u20131317 (2013). https:\/\/doi.org\/10.1016\/j.comnet.2012.10.022","journal-title":"Comput. Netw."},{"key":"19_CR14","unstructured":"Sohn, K.: Improved deep metric learning with multi-class n-pair loss objective. In: Proceedings of the 30th International Conference on Neural Information Processing Systems, pp. 1857\u20131865. Curran Associates Inc., Red Hook, NY, USA (2016)"},{"issue":"56","key":"19_CR15","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15(56), 1929\u20131958 (2014)","journal-title":"J. Mach. Learn. Res."},{"key":"19_CR16","doi-asserted-by":"publisher","unstructured":"Wu, Z., Xiong, Y., Yu, S.X., Lin, D.: Unsupervised feature learning via non-parametric instance discrimination. In: 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 3733\u20133742 (2018). https:\/\/doi.org\/10.1109\/CVPR.2018.00393","DOI":"10.1109\/CVPR.2018.00393"}],"container-title":["Lecture Notes in Computer Science","Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-10486-1_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T09:36:44Z","timestamp":1762335404000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-10486-1_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,6]]},"ISBN":["9783032104854","9783032104861"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-10486-1_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,6]]},"assertion":[{"value":"6 November 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IDEAL","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Data Engineering and Automated Learning","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ja\u00e9n","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 November 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ideal2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ideal2025.ujaen.es\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}