{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T01:50:49Z","timestamp":1772934649364,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/bigdata66926.2025.11401968","type":"proceedings-article","created":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T20:57:57Z","timestamp":1772830677000},"page":"7027-7036","source":"Crossref","is-referenced-by-count":0,"title":["Cognitive SOC: Evidence-Backed Narrative Generation for Security Operations with Multi-Agent LLM Architecture"],"prefix":"10.1109","author":[{"given":"Saeid","family":"Sheikhi","sequence":"first","affiliation":[{"name":"University of Oulu,Center for Ubiquitous Computing, Faculty of Information Technology and Electrical Engineering,Oulu,Finland,90014"}]},{"given":"Panos","family":"Kostakos","sequence":"additional","affiliation":[{"name":"University of Oulu,Center for Ubiquitous Computing, Faculty of Information Technology and Electrical Engineering,Oulu,Finland,90014"}]},{"given":"Lauri","family":"Loven","sequence":"additional","affiliation":[{"name":"University of Oulu,Center for Ubiquitous Computing, Faculty of Information Technology and Electrical Engineering,Oulu,Finland,90014"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354239"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CSR57506.2023.10224990"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3723158"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.103"},{"key":"ref5","first-page":"347","article-title":"A human capital model for mitigating security analyst burnout","volume-title":"Eleventh symposium on usable privacy and security (SOUPS 2015)","author":"Sundaramurthy","year":"2015"},{"key":"ref6","volume-title":"Cybersecurity operations center","author":"Zimmerman","year":"2014"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103201"},{"key":"ref8","article-title":"Large language models in cybersecurity: State-of-the-art","author":"Motlagh","year":"2024","journal-title":"arXiv preprint"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179420"},{"key":"ref10","article-title":"Llm4vuln: A unified evaluation framework for decoupling and enhancing 11 ms \u2019 vulnerability reasoning","author":"Sun","year":"2024","journal-title":"arXiv preprint"},{"key":"ref11","article-title":"Llm agents can autonomously hack websites","author":"Fang","year":"2024","journal-title":"arXiv preprint"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CSNet64211.2024.10851755"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/GACLM67198.2025.11231874"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CCGridW59191.2023.00018"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2019.1598608"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3582700.3583955"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3532951"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23349"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30719-6_9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CSR61664.2024.10679491"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CSCN67557.2025.11230755"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2024.3380511"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.emnlp-main.470"},{"key":"ref24","article-title":"Autogen: Enabling next-gen 11 m applications via multi-agent conversations","volume-title":"First Conference on Language Modeling","author":"Wu","year":"2024"},{"key":"ref25","article-title":"Mad-sherlock: Multi-agent debate for visual misinformation detection","volume-title":"ICML 2025 Workshop on Collaborative and Federated Agentic Workflows","author":"Lakara"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3586183.3606763"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"}],"event":{"name":"2025 IEEE International Conference on Big Data (BigData)","location":"Macau, China","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,11]]}},"container-title":["2025 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11400704\/11400712\/11401968.pdf?arnumber=11401968","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T07:13:38Z","timestamp":1772867618000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11401968\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/bigdata66926.2025.11401968","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}