{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T18:08:20Z","timestamp":1778782100858,"version":"3.51.4"},"reference-count":56,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T00:00:00Z","timestamp":1774656000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004233","name":"Universitat Polit\u00e8cnica de Val\u00e8ncia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004233","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Engineering Applications of Artificial Intelligence"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.engappai.2026.114647","type":"journal-article","created":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T13:08:15Z","timestamp":1774703295000},"page":"114647","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Artificial intelligence based framework for cognitive domain analysis"],"prefix":"10.1016","volume":"175","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8278-3947","authenticated-orcid":false,"given":"Mario","family":"Aragon\u00e9s Lozano","sequence":"first","affiliation":[]},{"given":"Israel","family":"P\u00e9rez Llopis","sequence":"additional","affiliation":[]},{"given":"Antonio Jos\u00e9","family":"Caballero Morcillo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9374-9277","authenticated-orcid":false,"given":"Antonio","family":"Le\u00f3n Fern\u00e1ndez","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.engappai.2026.114647_b1","series-title":"2019 13th International Symposium on Medical Information and Communication Technology","first-page":"1","article-title":"Cognitive cybersecurity for CPS-IoT enabled healthcare ecosystems","author":"Abie","year":"2019"},{"key":"10.1016\/j.engappai.2026.114647_b2","article-title":"Power to the edge: Command... control... in the information age","author":"Alberts","year":"2003","journal-title":"D\u00e9f. Tech. Inf. Cent."},{"issue":"4","key":"10.1016\/j.engappai.2026.114647_b3","doi-asserted-by":"crossref","first-page":"665","DOI":"10.1016\/S0022-5193(84)80150-2","article-title":"Seasonality and period-doubling bifurcations in an epidemic model","volume":"110","author":"Aron","year":"1984","journal-title":"J. Theoret. Biol."},{"key":"10.1016\/j.engappai.2026.114647_b4","series-title":"European Conference on Modelling Foundations and Applications","first-page":"3","article-title":"Hierarchical clustering of metamodels for comparative analysis and visualization","author":"Babur","year":"2016"},{"key":"10.1016\/j.engappai.2026.114647_b5","article-title":"A cognitive platform for collecting cyber threat intelligence and real-time detection using cloud computing","volume":"14","author":"Balasubramanian","year":"2025","journal-title":"Decis. Anal. J."},{"issue":"2","key":"10.1016\/j.engappai.2026.114647_b6","first-page":"32","article-title":"The likert scale what it is and how to use it","volume":"50","author":"Batterton","year":"2017","journal-title":"Phalanx"},{"key":"10.1016\/j.engappai.2026.114647_b7","series-title":"Unearthing a billion telegram posts about the 2024 US presidential election: Development of a public dataset","author":"Blas","year":"2024"},{"issue":"2","key":"10.1016\/j.engappai.2026.114647_b8","first-page":"557","article-title":"Decision-making based on an improved visual analytics approach for emotion prediction","volume":"17","author":"Bouazizi","year":"2023","journal-title":"Intell. Decis. Technol."},{"key":"10.1016\/j.engappai.2026.114647_b9","doi-asserted-by":"crossref","first-page":"81555","DOI":"10.1109\/ACCESS.2019.2923736","article-title":"Visual analytics: A comprehensive overview","volume":"7","author":"Cui","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2026.114647_b10","series-title":"LocalAI: The free, open source openai alternative","author":"Di Giacinto","year":"2023"},{"key":"10.1016\/j.engappai.2026.114647_b11","article-title":"Challenging the application of PMESII-PT in a complex environment","author":"Ducote","year":"2010","journal-title":"A Monograph Kansas Fort Leavenworth: School Advanc Militarfr Studi UnitedStates Army Command General Staff College"},{"key":"10.1016\/j.engappai.2026.114647_b12","doi-asserted-by":"crossref","unstructured":"Feltwell, T., Cielniak, G., Dickinson, P., Kirman, B.J., Lawson, S., 2015. Dendrogram visualization as a game design tool. In: Proceedings of the 2015 Annual Symposium on Computer-Human Interaction in Play. pp. 505\u2013510.","DOI":"10.1145\/2793107.2810284"},{"issue":"1\u20132","key":"10.1016\/j.engappai.2026.114647_b13","first-page":"173","article-title":"The military interest in narrative","volume":"37","author":"Finlayson","year":"2013","journal-title":"Sprache Datenverarb."},{"issue":"1","key":"10.1016\/j.engappai.2026.114647_b14","doi-asserted-by":"crossref","first-page":"6","DOI":"10.3390\/soc15010006","article-title":"AI tools in society: Impacts on cognitive offloading and the future of critical thinking","volume":"15","author":"Gerlich","year":"2025","journal-title":"Societies"},{"key":"10.1016\/j.engappai.2026.114647_b15","series-title":"Advancements in Open Source Intelligence (OSINT) Techniques and the role of artificial intelligence in Cyber Threat Intelligence (CTI)","author":"Gioti","year":"2024"},{"issue":"1","key":"10.1016\/j.engappai.2026.114647_b16","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1109\/TVCG.2017.2743959","article-title":"Bubble treemaps for uncertainty visualization","volume":"24","author":"G\u00f6rtler","year":"2017","journal-title":"IEEE Trans. Vis. Comput. Graphics"},{"key":"10.1016\/j.engappai.2026.114647_b17","first-page":"1","article-title":"What is an ontology?","author":"Guarino","year":"2009","journal-title":"Handb. Ontol."},{"key":"10.1016\/j.engappai.2026.114647_b18","first-page":"80","article-title":"A survey of tools and resources for the next generation analyst","volume":"vol. 9499","author":"Hall","year":"2015"},{"key":"10.1016\/j.engappai.2026.114647_b19","first-page":"72","article-title":"Overcoming social media API restrictions: Building an effective web scraper","volume":"vol. 2024","author":"Harrell","year":"2024"},{"key":"10.1016\/j.engappai.2026.114647_b20","series-title":"A survey on quality metrics for text-to-image generation","author":"Hartwig","year":"2024"},{"key":"10.1016\/j.engappai.2026.114647_b21","series-title":"Proceedings of the First IEEE Conference on Visualization: Visualization90","first-page":"361","article-title":"Parallel coordinates: a tool for visualizing multi-dimensional geometry","author":"Inselberg","year":"1990"},{"issue":"1","key":"10.1016\/j.engappai.2026.114647_b22","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1177\/14738716231212568","article-title":"Strategies for evaluating visual analytics systems: A systematic review and new perspectives","volume":"23","author":"Islam","year":"2024","journal-title":"Inf. Vis."},{"issue":"9","key":"10.1016\/j.engappai.2026.114647_b23","doi-asserted-by":"crossref","first-page":"190","DOI":"10.3390\/fi11090190","article-title":"Deep learning-based sentimental analysis for large-scale imbalanced twitter data","volume":"11","author":"Jamal","year":"2019","journal-title":"Futur. Internet"},{"key":"10.1016\/j.engappai.2026.114647_b24","series-title":"2024 IEEE Conference on Artificial Intelligence","first-page":"979","article-title":"Navigating the EU AI act: A methodological approach to compliance for safety-critical products","author":"Kelly","year":"2024"},{"key":"10.1016\/j.engappai.2026.114647_b25","first-page":"97","article-title":"Hootsuite","author":"Kelsey","year":"2017","journal-title":"Introd. Soc. Media Mark.: A Guid. Absol. Beginners"},{"key":"10.1016\/j.engappai.2026.114647_b26","series-title":"International Conference on Communications and Cyber Physical Engineering 2018","first-page":"545","article-title":"Fighting fake visual media: a study of current and emerging methods for detecting image and video tampering","author":"Khan","year":"2024"},{"key":"10.1016\/j.engappai.2026.114647_b27","series-title":"Computational Collective Intelligence: 7th International Conference, ICCCI 2015, Madrid, Spain, September 21-23, 2015, Proceedings, Part II","first-page":"275","article-title":"Network visualization survey","author":"Komarek","year":"2015"},{"issue":"5","key":"10.1016\/j.engappai.2026.114647_b28","doi-asserted-by":"crossref","first-page":"627","DOI":"10.1093\/bib\/bbr069","article-title":"Hive plots\u2014rational approach to visualizing networks","volume":"13","author":"Krzywinski","year":"2012","journal-title":"Brief. Bioinform."},{"issue":"1","key":"10.1016\/j.engappai.2026.114647_b29","doi-asserted-by":"crossref","first-page":"5723","DOI":"10.1038\/s41598-017-06182-3","article-title":"Universal mechanism for hybrid percolation transitions","volume":"7","author":"Lee","year":"2017","journal-title":"Sci. Rep."},{"issue":"17","key":"10.1016\/j.engappai.2026.114647_b30","doi-asserted-by":"crossref","first-page":"9585","DOI":"10.3390\/app13179585","article-title":"Intelligent information system for product promotion in internet market","volume":"13","author":"Lipianina-Honcharenko","year":"2023","journal-title":"Appl. Sci."},{"key":"10.1016\/j.engappai.2026.114647_b31","series-title":"Natural Language Analytics with Generative Large-Language Models: A Practical Approach with Ollama and Open-Source LLMs","first-page":"23","article-title":"Using ollama","author":"Marcondes","year":"2025"},{"key":"10.1016\/j.engappai.2026.114647_b32","series-title":"2017 European Intelligence and Security Informatics Conference","first-page":"91","article-title":"Cyber threat intelligence model: an evaluation of taxonomies, sharing standards, and ontologies within cyber threat intelligence","author":"Mavroeidis","year":"2017"},{"key":"10.1016\/j.engappai.2026.114647_b33","article-title":"Ten UNESCO recommendations on the ethics of artificial intelligence","author":"Morand\u00edn-Ahuerma","year":"2023","journal-title":"Concytep"},{"key":"10.1016\/j.engappai.2026.114647_b34","doi-asserted-by":"crossref","DOI":"10.3389\/fdata.2023.1169636","article-title":"Review OSINT tool for social engineering","volume":"6","author":"Nobili","year":"2023","journal-title":"Front. Big Data"},{"issue":"1","key":"10.1016\/j.engappai.2026.114647_b35","doi-asserted-by":"crossref","first-page":"68","DOI":"10.3390\/educsci14010068","article-title":"Social media and artificial intelligence: critical conversations and where do we go from here?","volume":"14","author":"Parra","year":"2024","journal-title":"Educ. Sci."},{"key":"10.1016\/j.engappai.2026.114647_b36","doi-asserted-by":"crossref","first-page":"10282","DOI":"10.1109\/ACCESS.2020.2965257","article-title":"The not yet exploited goldmine of OSINT: Opportunities, open challenges and future trends","volume":"8","author":"Pastor-Galindo","year":"2020","journal-title":"IEEE Access"},{"issue":"14","key":"10.1016\/j.engappai.2026.114647_b37","doi-asserted-by":"crossref","first-page":"1717","DOI":"10.1177\/0278364916684382","article-title":"Hilbert maps: Scalable continuous occupancy mapping with stochastic gradient descent","volume":"35","author":"Ramos","year":"2016","journal-title":"Int. J. Robot. Res."},{"key":"10.1016\/j.engappai.2026.114647_b38","doi-asserted-by":"crossref","unstructured":"Rossetti, G., Milli, L., Rinzivillo, S., 2018. NDlib: a python library to model and analyze diffusion processes over complex networks. In: Companion Proceedings of the the Web Conference 2018. pp. 183\u2013186.","DOI":"10.1145\/3184558.3186974"},{"key":"10.1016\/j.engappai.2026.114647_b39","series-title":"2017 IEEE International Conference on Data Science and Advanced Analytics","first-page":"155","article-title":"Ndlib: Studying network diffusion dynamics","author":"Rossetti","year":"2017"},{"issue":"21","key":"10.1016\/j.engappai.2026.114647_b40","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevLett.115.218702","article-title":"Kinetics of social contagion","volume":"115","author":"Ruan","year":"2015","journal-title":"Phys. Rev. Lett."},{"key":"10.1016\/j.engappai.2026.114647_b41","series-title":"Will LLMs scaling hit the wall? Breaking barriers via distributed resources on massive edge devices","author":"Shen","year":"2025"},{"key":"10.1016\/j.engappai.2026.114647_b42","series-title":"The Craft of Information Visualization","first-page":"364","article-title":"The eyes have it: A task by data type taxonomy for information visualizations","author":"Shneiderman","year":"2003"},{"key":"10.1016\/j.engappai.2026.114647_b43","series-title":"The Furniture of the World: Essays in Ontology and Metaphysics","first-page":"47","article-title":"Ontology","author":"Smith","year":"2012"},{"key":"10.1016\/j.engappai.2026.114647_b44","doi-asserted-by":"crossref","unstructured":"Song, Y., Mi, Z., Xie, H., Chen, H., 2024. Powerinfer: Fast large language model serving with a consumer-grade gpu. In: Proceedings of the ACM SIGOPS 30th Symposium on Operating Systems Principles. pp. 590\u2013606.","DOI":"10.1145\/3694715.3695964"},{"issue":"1","key":"10.1016\/j.engappai.2026.114647_b45","first-page":"52","article-title":"An approach for evaluation of social media monitoring tools","volume":"52","author":"Stavrakantonakis","year":"2012","journal-title":"Common Value Manag."},{"issue":"8","key":"10.1016\/j.engappai.2026.114647_b46","doi-asserted-by":"crossref","first-page":"9727","DOI":"10.1007\/s13369-022-07321-3","article-title":"Deep fake video detection using transfer learning approach","volume":"48","author":"Suratkar","year":"2023","journal-title":"Arab. J. Sci. Eng."},{"key":"10.1016\/j.engappai.2026.114647_b47","unstructured":"Syed, Z., Padia, A., Mathews, M.L., Finin, T., Joshi, A., et al., 2016. UCO: A unified cybersecurity ontology. In: Proceedings of the AAAI Workshop on Artificial Intelligence for Cyber Security. pp. 195\u2013202."},{"issue":"1","key":"10.1016\/j.engappai.2026.114647_b48","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1109\/TVCG.2012.108","article-title":"Enhanced spatial stability with hilbert and moore treemaps","volume":"19","author":"Tak","year":"2012","journal-title":"IEEE Trans. Vis. Comput. Graphics"},{"key":"10.1016\/j.engappai.2026.114647_b49","article-title":"APIcalypse now: Redefining data access regimes in the face of the digital services act","author":"Trans","year":"2024","journal-title":"Winter Sch. 2024"},{"key":"10.1016\/j.engappai.2026.114647_b50","series-title":"Hunting Cyber Criminals: A Hacker\u2019s Guide To Online Intelligence Gathering Tools and Techniques","first-page":"83","article-title":"Automated tools for network discovery","author":"Troia","year":"2020"},{"key":"10.1016\/j.engappai.2026.114647_b51","series-title":"Social Sensing: Building Reliable Systems on Unreliable Data","author":"Wang","year":"2015"},{"key":"10.1016\/j.engappai.2026.114647_b52","doi-asserted-by":"crossref","unstructured":"Wang, W., Wang, H., Dai, G., Wang, H., 2006. Visualization of large hierarchical data by circle packing. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. pp. 517\u2013520.","DOI":"10.1145\/1124772.1124851"},{"issue":"1","key":"10.1016\/j.engappai.2026.114647_b53","doi-asserted-by":"crossref","DOI":"10.1038\/sdata.2016.18","article-title":"The FAIR Guiding Principles for scientific data management and stewardship","volume":"3","author":"Wilkinson","year":"2016","journal-title":"Sci. Data"},{"issue":"1","key":"10.1016\/j.engappai.2026.114647_b54","doi-asserted-by":"crossref","first-page":"1014","DOI":"10.1186\/s12889-021-11019-w","article-title":"Capability, opportunity, and motivation: an across contexts empirical examination of the COM-B model","volume":"21","author":"Willmott","year":"2021","journal-title":"BMC Public Health"},{"key":"10.1016\/j.engappai.2026.114647_b55","volume":"vol. 236","author":"Wohlin","year":"2012"},{"issue":"11","key":"10.1016\/j.engappai.2026.114647_b56","doi-asserted-by":"crossref","first-page":"12407","DOI":"10.1007\/s10462-023-10454-y","article-title":"Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security","volume":"56","author":"Yadav","year":"2023","journal-title":"Artif. Intell. Rev."}],"container-title":["Engineering Applications of Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0952197626009292?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0952197626009292?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T17:13:42Z","timestamp":1778778822000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0952197626009292"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":56,"alternative-id":["S0952197626009292"],"URL":"https:\/\/doi.org\/10.1016\/j.engappai.2026.114647","relation":{},"ISSN":["0952-1976"],"issn-type":[{"value":"0952-1976","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Artificial intelligence based framework for cognitive domain analysis","name":"articletitle","label":"Article Title"},{"value":"Engineering Applications of Artificial Intelligence","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.engappai.2026.114647","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Authors. Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"114647"}}