{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:21:41Z","timestamp":1740172901617,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T00:00:00Z","timestamp":1725926400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T00:00:00Z","timestamp":1725926400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-024-00535-z","type":"journal-article","created":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T19:02:32Z","timestamp":1725994952000},"page":"841-855","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Validating network attack concepts: A TCAV-driven approach"],"prefix":"10.1007","volume":"20","author":[{"given":"R. R.","family":"Rejimol Robinson","sequence":"first","affiliation":[]},{"given":"Rendhir R.","family":"Prasad","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1030-3000","authenticated-orcid":false,"given":"Ciza","family":"Thomas","sequence":"additional","affiliation":[]},{"given":"N.","family":"Balakrishnan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,10]]},"reference":[{"key":"535_CR1","unstructured":"Lundberg, S.M., Lee, S.-I.: A unified approach to interpreting model predictions. In: Proceedings of the 31st International Conference on Neural Information Processing Systems, pp. 4768\u20134777. (2017)"},{"key":"535_CR2","doi-asserted-by":"crossref","unstructured":"Ribeiro, M.T., Singh, S., Guestrin, C.: Why should I trust you? Explaining the predictions of any classifier. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1135\u20131144. (2016)","DOI":"10.1145\/2939672.2939778"},{"key":"535_CR3","doi-asserted-by":"crossref","unstructured":"Anjomshoae, S., Fr\u00e4mling, K., Najjar, A.: Explanations of black-box model predictions by contextual importance and utility. In International Workshop on Explainable, Transparent Autonomous Agents and Multi- Agent Systems, pp. 95\u2013109. Springer (2019)","DOI":"10.1007\/978-3-030-30391-4_6"},{"issue":"10","key":"535_CR4","doi-asserted-by":"publisher","first-page":"1340","DOI":"10.1093\/bioinformatics\/btq134","volume":"26","author":"A Altmann","year":"2010","unstructured":"Altmann, A., Tolo\u015fi, L., Sander, O., Lengauer, T.: Permutation importance: a corrected feature importance measure. Bioinformatics 26(10), 1340\u20131347 (2010)","journal-title":"Bioinformatics"},{"key":"535_CR5","unstructured":"Shrikumar, A., Greenside, P., Kundaje, A.: Learning important features through propagating activation differences. In Proceedings of the 34th International Conference on Machine Learning - Volume 70, ser. ICML\u201917. JMLR.org, pp. 3145\u20133153 (2017)"},{"key":"535_CR6","unstructured":"Ghorbani, A., Wexler, J., Zou, J.Y., Kim, B.: Towards automatic concept-based explanations. Adv. Neural Inf. Process. Syst. 32 (2019)"},{"key":"535_CR7","unstructured":"Kim, B., Wattenberg, M., Gilmer, J., Cai, C., Wexler, J., Viegas, F. et al.: Interpretability beyond feature attribution: quantitative testing with concept activation vectors (tcav). In International Conference on Machine Learning. pp. 2668\u20132677. PMLR (2018)"},{"key":"535_CR8","unstructured":"Conceptualization as a Basis for Cognition-Human and Machine https:\/\/towardsdatascience.com\/conceptualization-as-a-basis-for-cognitiontowardsdatascience-human-and-machine-345d9e687e3c"},{"key":"535_CR9","volume-title":"The Big Book of Concepts","author":"G Murphy","year":"2004","unstructured":"Murphy, G.: The Big Book of Concepts. MIT Press, Cambridge (2004)"},{"issue":"10","key":"535_CR10","doi-asserted-by":"publisher","first-page":"112392","DOI":"10.1109\/ACCESS.2022.3216617","volume":"10","author":"S Neupane","year":"2022","unstructured":"Neupane, S., Ables, J., Anderson, W., Mittal, S., Rahimi, S., Banicescu, I., Seale, M.: Explainable intrusion detection systems (x-ids): a survey of current methods, challenges, and opportunities. IEEE Access 10(10), 112392\u2013112415 (2022)","journal-title":"IEEE Access"},{"key":"535_CR11","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1109\/LNET.2022.3186589","volume":"3","author":"P Barnard","year":"2022","unstructured":"Barnard, P., Marchetti, N., Silva, L.: Robust network intrusion detection through explainable artificial intelligence (xai). IEEE Netw. Lett. 3, 167\u2013171 (2022)","journal-title":"IEEE Netw. Lett."},{"key":"535_CR12","doi-asserted-by":"publisher","first-page":"1164","DOI":"10.1109\/OJCOMS.2022.3188750","volume":"3","author":"Z Abou El Houda","year":"2022","unstructured":"Abou El Houda, Z., Brik, B., Khoukhi, L.: Why should i trust your ids?: An explainable deep learning framework for intrusion detection systems in internet of things networks. IEEE Open J. Commun. Soc. 3, 1164\u20131176 (2022)","journal-title":"IEEE Open J. Commun. Soc."},{"key":"535_CR13","doi-asserted-by":"crossref","unstructured":"Hariharan, S., Rejimol Robinson, R.R., Prasad, R.R., Thomas, C., Balakrishnan, N.: XAI for intrusion detection system: comparing explanations based on global and local scope. J. Comput. Virol. Hack. Tech. 1\u201323 (2022)","DOI":"10.1007\/s11416-022-00441-2"},{"key":"535_CR14","doi-asserted-by":"publisher","first-page":"73127","DOI":"10.1109\/ACCESS.2020.2988359","volume":"8","author":"M Wang","year":"2020","unstructured":"Wang, M., Zheng, K., Yang, Y., Wang, X.: An explainable machine learning framework for intrusion detection systems. IEEE Access 8, 73127\u201373141 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2988359","journal-title":"IEEE Access"},{"key":"535_CR15","doi-asserted-by":"publisher","unstructured":"Wali, S., Khan, I.: Explainable AI and random forest based reliable intrusion detection system detection system. 12 (2021) https:\/\/doi.org\/10.36227\/techrxiv.17169080.v1.","DOI":"10.36227\/techrxiv.17169080.v1."},{"key":"535_CR16","doi-asserted-by":"publisher","unstructured":"Islam, S.R., Eberle, W.: Domain knowledge-aided explainable artificial intelligence. In Explainable Artificial Intelligence for Cyber Security. pp. 73\u201392. Springer (2022) https:\/\/doi.org\/10.1007\/978-3-030-96630-04","DOI":"10.1007\/978-3-030-96630-04"},{"key":"535_CR17","first-page":"108","volume":"1","author":"I Sharafaldin","year":"2018","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1, 108\u2013116 (2018)","journal-title":"ICISSp"},{"issue":"1","key":"535_CR18","doi-asserted-by":"publisher","first-page":"6634811","DOI":"10.1155\/2021\/6634811","volume":"2021","author":"B Mahbooba","year":"2021","unstructured":"Mahbooba, B., Timilsina, M., Sahal, R., Serrano, M.: Explainable artificial intelligence (XAI) to enhance trust management in intrusion detection systems using decision tree model. Complexity 2021(1), 6634811 (2021)","journal-title":"Complexity"},{"key":"535_CR19","doi-asserted-by":"crossref","unstructured":"Marino, D.L., Wickramasinghe, C.S., Manic, M.: An adversarial approach for explainable AI in intrusion detection systems. In IECON 2018-44th Annual Conference of the IEEE Industrial Electronics Society, pp. 3237\u20133243. IEEE (2018)","DOI":"10.1109\/IECON.2018.8591457"},{"issue":"3","key":"535_CR20","doi-asserted-by":"publisher","first-page":"1252","DOI":"10.3390\/app13031252","volume":"13","author":"CI Nwakanma","year":"2023","unstructured":"Nwakanma, C.I., Ahakonye, L.A.C., Njoku, J.N., Odirichukwu, J.C., Okolie, S.A., Uzondu, C., Ndubuisi Nweke, C.C., Kim, D.-S.: Explainable artificial intelligence (xai) for intrusion detection and mitigation in intelligent connected vehicles: a review. Appl. Sci. 13(3), 1252 (2023)","journal-title":"Appl. Sci."},{"key":"535_CR21","doi-asserted-by":"publisher","first-page":"93575","DOI":"10.1109\/ACCESS.2022.3204171","volume":"10","author":"N Capuano","year":"2022","unstructured":"Capuano, N., Fenza, G., Loia, V., Stanzione, C.: Explainable artificial intelligence in cybersecurity: a survey. IEEE Access 10, 93575\u201393600 (2022)","journal-title":"IEEE Access"},{"key":"535_CR22","doi-asserted-by":"publisher","first-page":"93104","DOI":"10.1109\/ACCESS.2022.3204051","volume":"10","author":"Z Zhang","year":"2022","unstructured":"Zhang, Z., Al Hamadi, H., Damiani, E., Yeun, C.Y., Taher, F.: Explainable artificial intelligence applications in cyber security: state- of-the-art in research. IEEE Access 10, 93104\u201393139 (2022)","journal-title":"IEEE Access"},{"key":"535_CR23","doi-asserted-by":"crossref","unstructured":"Hariharan, S., Velicheti, A., Anagha, A., Thomas, C., Balakrishnan, N.: Explainable artificial intelligence in cybersecurity: a brief review. In 2021 4th International Conference on Security and Privacy (ISEA- ISAP), pp. 1\u201312. (2021)","DOI":"10.1109\/ISEA-ISAP54304.2021.9689765"},{"issue":"19","key":"535_CR24","doi-asserted-by":"publisher","first-page":"3079","DOI":"10.3390\/electronics11193079","volume":"11","author":"S Patil","year":"2022","unstructured":"Patil, S., Varadarajan, V., Mazhar, S.M., Sahibzada, A., Ahmed, N., Sinha, O., Kumar, S., Shaw, K., Kotecha, K.: Explainable artificial intelligence for intrusion detection system. Electronics 11(19), 3079 (2022)","journal-title":"Electronics"},{"key":"535_CR25","doi-asserted-by":"publisher","first-page":"2339","DOI":"10.1109\/TIFS.2022.3183390","volume":"17","author":"T Zebin","year":"2022","unstructured":"Zebin, T., Rezvy, S., Luo, Y.: An explainable AI-based intrusion detection system for DNS over https (DOH) attacks. IEEE Trans. Inf. Forens. Secur. 17, 2339\u20132349 (2022)","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"535_CR26","doi-asserted-by":"crossref","unstructured":"Islam, S.R., Eberle, W.: Implications of combining domain knowledge in explainable artificial intelligence. In AAAI Spring Symposium: Combining Machine Learning with Knowledge Engineering (2021)","DOI":"10.1007\/978-3-030-96630-0_4"},{"key":"535_CR27","unstructured":"Tcydenova, E., Kim, T.W., Lee, C., Park, J.H.: Detection of adversarial attacks in AI-based intrusion detection systems using explainable AI. Human-Centric Comput. Inform. Sci. 11 (2021)"},{"issue":"1","key":"535_CR28","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1109\/TVCG.2022.3209384","volume":"29","author":"J Huang","year":"2023","unstructured":"Huang, J., Mishra, A., Kwon, B.C., Bryan, C.: Conceptexplainer: interactive explanation for deep neural networks from a concept perspective. IEEE Trans. Visual. Comput. Gr. 29(1), 831\u2013841 (2023). https:\/\/doi.org\/10.1109\/TVCG.2022.3209384","journal-title":"IEEE Trans. Visual. Comput. Gr."},{"issue":"1","key":"535_CR29","doi-asserted-by":"publisher","first-page":"780","DOI":"10.1109\/TVCG.2021.3114837","volume":"28","author":"Z Zhao","year":"2021","unstructured":"Zhao, Z., Xu, P., Scheidegger, C.E., Ren, L.: Human-in-the-loop extraction of interpretable concepts in deep learning models. IEEE Trans. Visual. Comput. Gr. 28(1), 780\u2013790 (2021)","journal-title":"IEEE Trans. Visual. Comput. Gr."},{"key":"535_CR30","unstructured":"Bahadori, M.T., Heckerman, D.E.: Debiasing concept-based explanations with causal analysis. In International Conference on Learning Representations (2020). Available: https:\/\/api.semanticscholar.org\/CorpusID:233254411"},{"key":"535_CR31","unstructured":"Ghorbani, A., Wexler, J., Kim, B.: Automating interpretability: discovering and testing visual concepts learned by neural networks. arxiv:1902.03129 (2019). Available: https:\/\/api.semanticscholar.org\/CorpusID:59842921"},{"key":"535_CR32","unstructured":"Koh, P.W., Nguyen, T., Tang, Y.S., Mussmann, S., Pierson, E., Kim, B., Liang, P.: Concept bottleneck models. In International Conference on Machine Learning, pp. 5338\u20135348. PMLR (2020)"},{"key":"535_CR33","first-page":"20554","volume":"33","author":"C-K Yeh","year":"2020","unstructured":"Yeh, C.-K., Kim, B., Arik, S., Li, C.-L., Pfister, T., Ravikumar, P.: On completeness-aware concept-based explanations in deep neural networks. Adv. Neural Inf. Process. Syst. 33, 20554\u201320565 (2020)","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"535_CR34","doi-asserted-by":"publisher","unstructured":"Prasad, R.R., Rejimol Robinson, R.R., Thomas, C., Balakrishnan, N.: Evaluation of strategic decision taken by autonomous agent using explainable AI. In 2021 4th International Conference on Security and Privacy (ISEA-ISAP), pp. 1\u20138. (2021) https:\/\/doi.org\/10.1109\/ISEA-ISAP54304.2021.9689715","DOI":"10.1109\/ISEA-ISAP54304.2021.9689715"},{"key":"535_CR35","first-page":"122","volume":"69","author":"LS Shapley","year":"1997","unstructured":"Shapley, L.S.: A value for n-person games. Class. Game Theory 69, 122 (1997)","journal-title":"Class. Game Theory"},{"key":"535_CR36","volume-title":"bib\\_CIU\\_framling\\_3 Comparison of Contextual Importance and Utility with LIME and Shapley Values","author":"K Fr\u00e4mling","year":"2021","unstructured":"Fr\u00e4mling, K., Westberg, M., Jullum, M., Madhikermi, M., Malhi, A.: bib_CIU_framling_3 Comparison of Contextual Importance and Utility with LIME and Shapley Values. Springer International Publishing, Cham (2021)"},{"key":"535_CR37","unstructured":"KDD Cup 1999 data set for network-based intrusion detection systems. Available on: https:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-024-00535-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-024-00535-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-024-00535-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T15:13:50Z","timestamp":1729005230000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-024-00535-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,10]]},"references-count":37,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2024,11]]}},"alternative-id":["535"],"URL":"https:\/\/doi.org\/10.1007\/s11416-024-00535-z","relation":{},"ISSN":["2263-8733"],"issn-type":[{"type":"electronic","value":"2263-8733"}],"subject":[],"published":{"date-parts":[[2024,9,10]]},"assertion":[{"value":"4 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 September 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}