{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T23:53:30Z","timestamp":1773878010217,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T00:00:00Z","timestamp":1773792000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T00:00:00Z","timestamp":1773792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-026-00615-2","type":"journal-article","created":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T17:04:34Z","timestamp":1773853474000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A graph-based approach to adaptive threat detection for security operations centers"],"prefix":"10.1007","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9490-3328","authenticated-orcid":false,"given":"R.","family":"Krishnaprabha","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,18]]},"reference":[{"key":"615_CR1","doi-asserted-by":"crossref","unstructured":"Alessa, A.S., Hammoudeh, M., Singh, H.: A peek into the post-quantum era\u2013pqa pqc: what will happen in 2030. In: Quantum Technology Applications, Impact, and Future Challenges, pages 163\u2013180. CRC Press (2025)","DOI":"10.1201\/9781003537243-10"},{"key":"615_CR2","doi-asserted-by":"crossref","unstructured":"Borah S., Dhablia, A., Afaq, A., Sharma, R.,\u00a0Wankhede, D.S., Pawar, R.: Machine learning for security operations center (soc) optimization. In: International Conference on Data Engineering and Communication Technology, pages 397\u2013409. Springer (2024)","DOI":"10.1007\/978-981-96-5214-3_32"},{"key":"615_CR3","doi-asserted-by":"crossref","unstructured":"Chahar, S.: Exploring the future trends of cryptography. In: Next Generation Mechanisms for Data Encryption, pages 234\u2013257. CRC Press (2025)","DOI":"10.1201\/9781003508632-16"},{"key":"615_CR4","doi-asserted-by":"crossref","unstructured":"de\u00a0la Cruz, J., Mart\u00ednez-Moro, E., Villanueva-Polanco, R.: Public key cryptography based on skew dihedral group rings (2022). arXiv preprint arXiv:2205.02997","DOI":"10.3390\/math10183343"},{"issue":"6\u20137","key":"615_CR5","doi-asserted-by":"publisher","first-page":"2023","DOI":"10.1166\/jctn.2018.7400","volume":"15","author":"D Ezhilmaran","year":"2018","unstructured":"Ezhilmaran, D., Muthukumaran, V.: Authenticated group key agreement protocol based on twisted conjugacy root extraction problem in near-ring. J. Comput. Theor. Nanosci. 15(6\u20137), 2023\u20132026 (2018)","journal-title":"J. Comput. Theor. Nanosci."},{"key":"615_CR6","doi-asserted-by":"crossref","unstructured":"Feltovic, M.: Cryptographic foundations for blockchain security in decentralized networks. MEST Journal, 13(1), (2025)","DOI":"10.12709\/mest.13.13.01.05"},{"key":"615_CR7","unstructured":"Hieta-aho, E., Rautell, M., Lintulampi, A.: Security of lattice-based cryptography. In: Quantum Software Day 2025 (2025)"},{"issue":"6","key":"615_CR8","doi-asserted-by":"publisher","first-page":"3747","DOI":"10.1090\/tran\/7490","volume":"371","author":"Y-Z Huang","year":"2019","unstructured":"Huang, Y.-Z., Yang, J.: Associative algebras for (logarithmic) twisted modules for a vertex operator algebra. Trans. Am. Math. Soc. 371(6), 3747\u20133786 (2019)","journal-title":"Trans. Am. Math. Soc."},{"key":"615_CR9","doi-asserted-by":"crossref","unstructured":"Khayat, M., Barka, E., Serhani, M.A., Sallabi, F., Shuaib, K., Khater, H.M.: Empowering security operation center with artificial intelligence and machine learning\u2014a systematic literature review. IEEE Access (2025)","DOI":"10.1109\/ACCESS.2025.3532951"},{"key":"615_CR10","doi-asserted-by":"crossref","unstructured":"Kumar, M., Pattnaik, P.: Post quantum cryptography (pqc)-an overview. In: 2020 IEEE High Performance Extreme Computing Conference (HPEC), pages 1\u20139. IEEE (2020)","DOI":"10.1109\/HPEC43674.2020.9286147"},{"key":"615_CR11","doi-asserted-by":"crossref","unstructured":"Ladino, I., Gomez, C., Corredor, C., Toro, L.: Low-compute cryptography for iot: challenges, solutions, and perspectives. In: 2024 Congreso Internacional de Innovaci\u00f3n y Tendencias en Ingenier\u00eda (CONIITI), pages 1\u20135. IEEE (2024)","DOI":"10.1109\/CONIITI64189.2024.10854855"},{"issue":"2","key":"615_CR12","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s10586-024-04799-4","volume":"28","author":"K Mansoor","year":"2025","unstructured":"Mansoor, K., Afzal, M., Iqbal, W., Abbas, Y.: Securing the future: exploring post-quantum cryptography for authentication and user privacy in iot devices. Clust. Comput. 28(2), 93 (2025)","journal-title":"Clust. Comput."},{"key":"615_CR13","unstructured":"Mohammed\u00a0Najeeb Shaik, K.: Sdn-based insider threat detection. Int. J. Eng. Tech. Res.(IJETR) 7(10.5281) (2023)"},{"issue":"1","key":"615_CR14","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1137\/23M1609786","volume":"67","author":"NS Moore","year":"2025","unstructured":"Moore, N.S., Cyr, E.C., Ohm, P., Siefert, C.M., Tuminaro, R.S.: Graph neural networks and applied linear algebra. SIAM Rev. 67(1), 141\u2013175 (2025)","journal-title":"SIAM Rev."},{"issue":"8","key":"615_CR15","doi-asserted-by":"publisher","first-page":"1019","DOI":"10.3390\/sym11081019","volume":"11","author":"MDG Olvera","year":"2019","unstructured":"Olvera, M.D.G., Ramos, J.A.L., Jover, B.T.: Public key protocols over twisted dihedral group rings. Symmetry 11(8), 1019 (2019)","journal-title":"Symmetry"},{"key":"615_CR16","doi-asserted-by":"publisher","first-page":"3351","DOI":"10.1109\/TSP.2021.3084537","volume":"69","author":"A Parada-Mayorga","year":"2021","unstructured":"Parada-Mayorga, A., Ribeiro, A.: Algebraic neural networks: stability to deformations. IEEE Trans. Signal Process. 69, 3351\u20133366 (2021)","journal-title":"IEEE Trans. Signal Process."},{"key":"615_CR17","doi-asserted-by":"crossref","unstructured":"Sengar, S.S., Hasan, A.B., Kumar, S., Carroll, F.: Generative artificial intelligence: a systematic review and applications. Multimed. Tools Appl. 84(21), 23661\u201323700 (2025)","DOI":"10.1007\/s11042-024-20016-1"},{"key":"615_CR18","doi-asserted-by":"crossref","unstructured":"Sharma, P., Gupta, V., Sood, S.K.: Post-quantum cryptography research landscape: a scientometric perspective. J. Comput. Inf. Syst. 65(1), 119\u2013140 (2025)","DOI":"10.1080\/08874417.2023.2260333"},{"key":"615_CR19","doi-asserted-by":"crossref","unstructured":"Venkataratnam, S.,\u00a0Balaji Srikaanth, P., Madhavi, J.: Development of light weight authentication protocol based on cryptography to access. In: Cyber Warfare, Security and Space Computing: Second International Conference on Cyber Warfare, Security and Space Computing, SpacSec 2024, Jaipur, India, February 22\u201323, 2024, Proceedings, volume 2195, page 154. Springer Nature (2025)","DOI":"10.1007\/978-3-031-73494-6_11"},{"key":"615_CR20","doi-asserted-by":"crossref","unstructured":"Wong, H.Y.: Shor\u2019s algorithm. In: Introduction to Quantum Computing: From a Layperson to a Programmer in 30 Steps, pages 289\u2013298. Springer (2023)","DOI":"10.1007\/978-3-031-36985-8_29"},{"key":"615_CR21","unstructured":"Yaseen, A.: Accelerating the soc: Achieve greater efficiency with ai-driven automation. Int. J. Responsible Artif. Intell 12(1), 1\u201319 (2022)"},{"key":"615_CR22","first-page":"4917","volume":"33","author":"K Zhou","year":"2020","unstructured":"Zhou, K., Huang, X., Li, Y., Zha, D., Chen, R., Xia, H.: Towards deeper graph neural networks with differentiable group normalization. Adv. Neural. Inf. Process. Syst. 33, 4917\u20134928 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-026-00615-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-026-00615-2","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-026-00615-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T17:04:40Z","timestamp":1773853480000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-026-00615-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,18]]},"references-count":22,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["615"],"URL":"https:\/\/doi.org\/10.1007\/s11416-026-00615-2","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,18]]},"assertion":[{"value":"6 January 2026","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 March 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}}],"article-number":"32"}}