{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:36:16Z","timestamp":1771612576664,"version":"3.50.1"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T00:00:00Z","timestamp":1695772800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T00:00:00Z","timestamp":1695772800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,27]]},"DOI":"10.1109\/aipr60534.2023.10440708","type":"proceedings-article","created":{"date-parts":[[2024,2,22]],"date-time":"2024-02-22T14:19:17Z","timestamp":1708611557000},"page":"1-8","source":"Crossref","is-referenced-by-count":5,"title":["Towards a Domain-Agnostic Knowledge Graph-as-a-Service Infrastructure for Active Cyber Defense with Intelligent Agents"],"prefix":"10.1109","author":[{"given":"Prasad","family":"Calyam","sequence":"first","affiliation":[{"name":"University of Missouri-Columbia"}]},{"given":"Mayank","family":"Kejriwal","sequence":"additional","affiliation":[{"name":"University of Southern California"}]},{"given":"Praveen","family":"Rao","sequence":"additional","affiliation":[{"name":"University of Missouri-Columbia"}]},{"given":"Jianlin","family":"Cheng","sequence":"additional","affiliation":[{"name":"University of Missouri-Columbia"}]},{"given":"Weichao","family":"Wang","sequence":"additional","affiliation":[{"name":"University of North Carolina at Charlotte"}]},{"given":"Linquan","family":"Bai","sequence":"additional","affiliation":[{"name":"University of North Carolina at Charlotte"}]},{"given":"V. Sriram","family":"Siddhardh Nadendla","sequence":"additional","affiliation":[{"name":"Missouri S&#x0026;T"}]},{"given":"Sanjay","family":"Madria","sequence":"additional","affiliation":[{"name":"Missouri S&#x0026;T"}]},{"given":"Sajal K.","family":"Das","sequence":"additional","affiliation":[{"name":"Missouri S&#x0026;T"}]},{"given":"Rohit","family":"Chadha","sequence":"additional","affiliation":[{"name":"University of Missouri-Columbia"}]},{"given":"Khaza Anuarul","family":"Hoque","sequence":"additional","affiliation":[{"name":"University of Missouri-Columbia"}]},{"given":"Kannappan","family":"Palaniappan","sequence":"additional","affiliation":[{"name":"University of Missouri-Columbia"}]},{"given":"Kiran","family":"Neupane","sequence":"additional","affiliation":[{"name":"University of Missouri-Columbia"}]},{"given":"Roshan Lal","family":"Neupane","sequence":"additional","affiliation":[{"name":"University of Missouri-Columbia"}]},{"given":"Sankeerth","family":"Gandhari","sequence":"additional","affiliation":[{"name":"University of Missouri-Columbia"}]},{"given":"Mukesh","family":"Singhal","sequence":"additional","affiliation":[{"name":"University of California,Merced"}]},{"given":"Lotfi","family":"Othmane","sequence":"additional","affiliation":[{"name":"University of North Texas"}]},{"given":"Meng","family":"Yu","sequence":"additional","affiliation":[{"name":"University of West Florida"}]},{"given":"Vijay","family":"Anand","sequence":"additional","affiliation":[{"name":"University of Missouri-St. Louis"}]},{"given":"Bharat","family":"Bhargava","sequence":"additional","affiliation":[{"name":"Purdue University"}]},{"given":"Brett","family":"Robertson","sequence":"additional","affiliation":[{"name":"University of South Carolina"}]},{"given":"Kerk","family":"Kee","sequence":"additional","affiliation":[{"name":"Texas Tech University"}]},{"given":"Patrice","family":"Buzzanell","sequence":"additional","affiliation":[{"name":"University of South Florida"}]},{"given":"Natalie","family":"Bolton","sequence":"additional","affiliation":[{"name":"University of Missouri-St. Louis"}]},{"given":"Harsh","family":"Taneja","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana Champaign"}]}],"member":"263","reference":[{"key":"ref1","author":"Gil","year":"2019","journal-title":"A 20-year community roadmap for artificial intelligence research in the us"},{"key":"ref2","volume-title":"Artificial Intelligence in Cybersecurity Market Research"},{"key":"ref3","article-title":"The great ipwn: Journalists hacked with suspected nso group imessage \u2018zero-click\u2019 exploit","volume-title":"Technical report","author":"Marczak","year":"2020"},{"key":"ref4","volume-title":"North korea and the sony hack: Exporting instability through cyberspace","author":"Haggard","year":"2015"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102722"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3372823"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(21)00065-8"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1017\/aju.2017.5"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-35746-7_3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12375-8"},{"key":"ref11","author":"Liu","year":"2022","journal-title":"A review of knowledge graph application scenarios in cyber security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3175719"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103076"},{"key":"ref14","article-title":"Amazon neptune: Graph data management in the cloud","author":"Bebee","year":"2018","journal-title":"ISWC (P&D\/Industry\/BlueSky)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-023-01860-3"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2018.01.004"},{"key":"ref18","author":"Kurniawan","year":"2021","journal-title":"An att&ck-kg for linking cybersecurity attacks to adversary tactics and techniques"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2746266.2746278"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3389\/fenrg.2022.988280"},{"issue":"6","key":"ref21","first-page":"2092","article-title":"Construction and application of power grid fault handing knowledge graph","volume":"45","author":"Guo","year":"2021","journal-title":"Power System Technology"},{"issue":"3","key":"ref22","first-page":"66","article-title":"Intelligent fault diagnosis of substation equipment on the basis of deep learning and knowledge graph","volume":"43","author":"Xiao","year":"2022","journal-title":"Electric Power Construction"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.4108\/eetinis.v9i32.1268"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IFEEA51475.2020.00147"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3389\/fenrg.2022.896836"},{"issue":"6","key":"ref26","first-page":"24","article-title":"Research on grid fault handling knowledge graph construction and real-time auxiliary decision based on transfer learning","volume":"20","author":"Zhang","year":"2022","journal-title":"Electric Power Information and Communication Technology"},{"key":"ref27","article-title":"The whyis knowledge graph framework in action","author":"McCusker","year":"2018","journal-title":"ISWC (P&D\/Industry\/BlueSky)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.5194\/isprs-annals-VIII-4-W2-2021-175-2021"},{"key":"ref31","author":"Ye","year":"2023","journal-title":"A comprehensive capability analysis of gpt-3 and gpt-3.5 series models"},{"key":"ref32","article-title":"Ontology visualization prot\u00e9g\u00e9 tools\u2013 a review","volume":"1","author":"Sivakumar","year":"2011","journal-title":"International Journal of Advanced Information Technology (IJAIT)"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1186\/s40649-019-0069-y"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3430360"},{"key":"ref35","article-title":"Cybersecurity research datasets: taxonomy and empirical analysis","volume-title":"11th USENIX Workshop on Cyber Security Experimentation and Test (CSET 18)","author":"Zheng"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.07.206"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/768\/5\/052103"},{"key":"ref38","first-page":"1","article-title":"Standardizing cyber threat intelligence information with the structured threat information expression (stix)","volume":"11","author":"Barnum","year":"2012","journal-title":"Mitre Corporation"},{"key":"ref39","volume-title":"Power Grid System Ontology"},{"key":"ref40","first-page":"3","article-title":"Threat modeling of cyber-physical systems in practice","volume-title":"International Conference on Risks and Security of Internet and Systems","author":"Jamil"},{"key":"ref41","article-title":"Cybersecurity considerations for distributed energy resources on the u.s. electric grid","year":"2022","journal-title":"U.S. Department of Energy\u2019s Office of Cybersecurity, Energy Security, and Emergency Response and the Office of Energy Efficiency and Renewable Energy"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.2172\/1544954"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.23919\/INDIACom54597.2022.9763107"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/PEDG51384.2021.9494203"},{"key":"ref45","volume-title":"STRIDE Threat Model"},{"key":"ref46","volume-title":"Neo4j Graph Database"}],"event":{"name":"2023 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)","location":"St. Louis, MO, USA","start":{"date-parts":[[2023,9,27]]},"end":{"date-parts":[[2023,9,29]]}},"container-title":["2023 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10440654\/10440655\/10440708.pdf?arnumber=10440708","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T22:42:22Z","timestamp":1709246542000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10440708\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,27]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/aipr60534.2023.10440708","relation":{},"subject":[],"published":{"date-parts":[[2023,9,27]]}}}