{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T23:08:12Z","timestamp":1770332892554,"version":"3.49.0"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T00:00:00Z","timestamp":1765238400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T00:00:00Z","timestamp":1765238400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s11280-025-01393-5","type":"journal-article","created":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T09:09:23Z","timestamp":1765271363000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["ELISAR: A Multi-Agent cybersecurity framework integrating retrieval-augmented generation for Blue, Red, and GRC operations"],"prefix":"10.1007","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0643-5067","authenticated-orcid":false,"given":"Sabri","family":"Allani","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9523-5798","authenticated-orcid":false,"given":"Karam","family":"Bou-Chaaya","sequence":"additional","affiliation":[]},{"given":"Helmi","family":"Rais","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,9]]},"reference":[{"key":"1393_CR1","unstructured":"Regulation (eu) 2024\/1689.: Artificial intelligence act. Official Journal of the European Union (2024)"},{"key":"1393_CR2","doi-asserted-by":"crossref","unstructured":"Allani, S., Bou-Chaaya, K., Rais, H.: Elisar: An adaptive framework for cybersecurity risk assessment powered by genai. In: Management of Digital EcoSystems. pp. 215\u2013228. Springer (2025)","DOI":"10.1007\/978-3-031-93598-5_16"},{"key":"1393_CR3","unstructured":"Cloud Security Alliance.: Maestro: Multi-agent environment, security, threat, risk and outcome (2025)"},{"key":"1393_CR4","unstructured":"CVE.: Vulnerability statistics for 2021. CVE Reports (2021)"},{"key":"1393_CR5","unstructured":"Elasticsearch.: Real-time search and analytics capabilities. Elasticsearch Reports (2021)"},{"key":"1393_CR6","unstructured":"European Union Agency for Cybersecurity.: Multilayer framework for good cybersecurity practices for ai (2023)"},{"key":"1393_CR7","unstructured":"Faiss.: Efficient similarity search. Facebook AI (2020)"},{"key":"1393_CR8","doi-asserted-by":"crossref","unstructured":"Ferrag, M.A., Alwahedi, F., Battah, A., Cherif, B., Mechri, A., Tihanyi, N.: Generative ai and large language models for cybersecurity. arXiv (2024)","DOI":"10.2139\/ssrn.4853709"},{"key":"1393_CR9","unstructured":"Google Developers.: Secure ai framework (saif) (2023)"},{"key":"1393_CR10","unstructured":"Institute, P.: The cost of cybersecurity breaches. Ponemon Research (2021)"},{"key":"1393_CR11","unstructured":"ISO.: Iso\/iec 42001:2023 information security management for ai systems (2023)"},{"key":"1393_CR12","doi-asserted-by":"crossref","unstructured":"Lupinacci, M., Blefari, F., Romeo, F., Pironti, F.A., Furfaro, A.: Arcer: An agentic rag for the automated definition of cyber ranges. arXiv (2025)","DOI":"10.1007\/978-3-032-00630-1_2"},{"key":"1393_CR13","unstructured":"Microsoft.: Ragentic: Rag-enhanced multi-agent architecture (2025)"},{"key":"1393_CR14","unstructured":"Mistral.: Mistral local llm: Efficient models for industry applications. Journal\/Website Name (2023)"},{"key":"1393_CR15","unstructured":"MITRE Corporation.: Mitre att&ck for ai (2021)"},{"key":"1393_CR16","unstructured":"NIST.: Nist cybersecurity framework (csf) (2022)"},{"key":"1393_CR17","unstructured":"Ollama.: Ollama open llms: Optimized models for industry tasks. Journal\/Website Name (2023)"},{"key":"1393_CR18","unstructured":"OWASP Foundation: Owasp top 10 for llms (2022)"},{"key":"1393_CR19","unstructured":"Pinecone.: Building similarity search applications. Pinecone Tech (2022)"},{"issue":"2","key":"1393_CR20","first-page":"45","volume":"10","author":"J Smith","year":"2024","unstructured":"Smith, J., Doe, J.: When llms meet cybersecurity: A systematic literature review. Journal of Cybersecurity 10(2), 45\u201367 (2024)","journal-title":"Journal of Cybersecurity"},{"key":"1393_CR21","first-page":"1234","volume":"19","author":"LJ Valencia","year":"2024","unstructured":"Valencia, L.J.: Autonomous cyberattack with security-augmented generative models. IEEE Trans. Inf. Forensics Secur. 19, 1234\u20131245 (2024)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1393_CR22","unstructured":"Weaviate.: Automatic data vectorization. Weaviate Docs (2021)"},{"issue":"1","key":"1393_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2024.100211","volume":"4","author":"Y Yao","year":"2024","unstructured":"Yao, Y., Duan, J., Xu, K., Cai, Y., Sun, E., Zhang, Y.: A survey on large language model (llm) security and privacy. High-Confidence Computing 4(1), 100211 (2024)","journal-title":"High-Confidence Computing"}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-025-01393-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11280-025-01393-5","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-025-01393-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T11:21:29Z","timestamp":1770290489000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11280-025-01393-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,9]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["1393"],"URL":"https:\/\/doi.org\/10.1007\/s11280-025-01393-5","relation":{},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"value":"1386-145X","type":"print"},{"value":"1573-1413","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,9]]},"assertion":[{"value":"10 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 November 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 November 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"3"}}