{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T03:48:59Z","timestamp":1775188139626,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["2416990,2346001"],"award-info":[{"award-number":["2416990,2346001"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100009226","name":"NSA","doi-asserted-by":"publisher","award":["H98230-24-1-0102"],"award-info":[{"award-number":["H98230-24-1-0102"]}],"id":[{"id":"10.13039\/100009226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/bigdata66926.2025.11401900","type":"proceedings-article","created":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T20:57:57Z","timestamp":1772830677000},"page":"6577-6586","source":"Crossref","is-referenced-by-count":2,"title":["RAG-Targeted Adversarial Attack on LLM-Based Threat Detection and Mitigation Framework"],"prefix":"10.1109","author":[{"given":"Seif","family":"Ikbarieh","sequence":"first","affiliation":[{"name":"Tennessee Tech University,Department of Computer Science,Cookeville,USA"}]},{"given":"Kshitiz","family":"Aryal","sequence":"additional","affiliation":[{"name":"School of Interdisciplinary Informatics, University of Nebraska Omaha,Omaha,USA"}]},{"given":"Maanak","family":"Gupta","sequence":"additional","affiliation":[{"name":"Tennessee Tech University,Department of Computer Science,Cookeville,USA"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"State of iot 2024: Number of connected iot devices growing 13 % to 18.8 billion globally","author":"Sinha","year":"2024"},{"key":"ref2","volume-title":"The next five years of iot: revenue opportunities and recommendations for growth","year":"2025"},{"key":"ref3","volume-title":"Smbs at critical risk, warns sonicwall as cyberattack speed surges","year":"2025"},{"key":"ref4","volume-title":"Cost of a data breach report 2025","year":"2025"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/GCAIoT68269.2025.11275542"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3663408.3663424"},{"key":"ref7","article-title":"Chatids: Explainable cybersecurity using generative ai","author":"J\u00fcttner","year":"2023","journal-title":"arXiv preprint"},{"key":"ref8","first-page":"3827","article-title":"{PoisonedRAG}: Knowledge corruption attacks to {Retrieval-Augmented} generation of large language models","volume-title":"34th USENIX Security Symposium (USENIX Security 25)","author":"Zou","year":"2025"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD61410.2024.10580402"},{"key":"ref10","volume-title":"Owasp top 10 for 11 m applications 2025","year":"2024"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.18653\/vl\/N19-142"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i05.6311"},{"key":"ref13","volume-title":"Introducing gpt-5","year":"2025"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3165809"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/s23135941"},{"key":"ref16","volume-title":"Suricata - high performance network threat detection engine","year":"2025"},{"key":"ref17","volume-title":"Snort - network intrusion detection & prevention system","year":"2025"},{"key":"ref18","volume-title":"Zeek - network security monitor","year":"2025"},{"key":"ref19","article-title":"Proverag: Provenance-driven vulnerability analysis with automated retrievalaugmented 11 ms","author":"Fayyazi","year":"2024","journal-title":"arXiv preprint"},{"key":"ref20","first-page":"5776","article-title":"Minilm: Deep self-attention distillation for task-agnostic compression of pretrained transformers","volume":"33","author":"Wang","year":"2020","journal-title":"Advances in neural information processing systems"},{"key":"ref21","volume-title":"Faiss: A library for efficient similarity search","year":"2017"},{"key":"ref22","first-page":"321","article-title":"Why do adversarial attacks transfer? explaining transferability of evasion and poisoning attacks","volume-title":"28th USENIX security symposium (USENIX security 19)","author":"Demontis","year":"2019"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-demos.16"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CSR61664.2024.10679494"},{"key":"ref25","volume-title":"Network service discovery (technique t1046)","year":"2025"}],"event":{"name":"2025 IEEE International Conference on Big Data (BigData)","location":"Macau, China","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,11]]}},"container-title":["2025 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11400704\/11400712\/11401900.pdf?arnumber=11401900","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T06:55:04Z","timestamp":1772866504000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11401900\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/bigdata66926.2025.11401900","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}