{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T01:39:26Z","timestamp":1772933966924,"version":"3.50.1"},"reference-count":53,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/bigdata66926.2025.11402393","type":"proceedings-article","created":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T20:57:57Z","timestamp":1772830677000},"page":"6616-6625","source":"Crossref","is-referenced-by-count":0,"title":["IRSDA: An Agent-Orchestrated Framework for Enterprise Intrusion Response"],"prefix":"10.1109","author":[{"given":"Damodar","family":"Panigrahi","sequence":"first","affiliation":[{"name":"Mississippi State University,MS,USA"}]},{"given":"Raj","family":"Patel","sequence":"additional","affiliation":[{"name":"The University of Alabama,AL,USA"}]},{"given":"Shaswata","family":"Mitra","sequence":"additional","affiliation":[{"name":"The University of Alabama,AL,USA"}]},{"given":"Sudip","family":"Mittal","sequence":"additional","affiliation":[{"name":"The University of Alabama,AL,USA"}]},{"given":"Shahram","family":"Rahimi","sequence":"additional","affiliation":[{"name":"The University of Alabama,AL,USA"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Number of internet and social media users worldwide as of February 2025.","year":"2025"},{"key":"ref2","volume-title":"Mobile Fact Sheet","year":"2024"},{"key":"ref3","volume-title":"Official Alerts & Statements - CISA","year":"2025"},{"key":"ref4","volume-title":"Cyber Security","year":"2025"},{"key":"ref5","volume-title":"11 biggest cybersecurity attacks in history.","author":"Cobalt","year":"2024"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.softx.2022.101120"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35813-5_1"},{"key":"ref8","first-page":"9459","article-title":"Retrievalaugmented generation for knowledge-intensive nlp tasks","volume":"33","author":"Lewis","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref9","volume-title":"What is Retrieval-Augmented Generation (RAG)?.","author":"Cloud","year":"2025"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.findings-naacl.3"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.07.033"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2014.09.009"},{"key":"ref14","first-page":"229","article-title":"Snort - lightweight intrusion detection for networks","volume-title":"USENIX Association","author":"Roesch","year":"1999"},{"key":"ref15","article-title":"Suricata","year":"2025","journal-title":"Open Information Security Foundation (OISF)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.03.018"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.12.006"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-29269-9"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.2977374"},{"issue":"8","key":"ref20","first-page":"9","article-title":"Language models are unsupervised multitask learners","volume":"1","author":"Radford","year":"2019","journal-title":"OpenAI blog"},{"key":"ref21","first-page":"1877","article-title":"Language models are few-shot learners","volume":"33","author":"Brown","year":"2020","journal-title":"Advances in neural information processing systems"},{"key":"ref22","article-title":"LLaMA: Open and Efficient Foundation Language Models","author":"Touvron","year":"2023","journal-title":"arXiv preprint"},{"issue":"1","key":"ref23","first-page":"5485","article-title":"Exploring the limits of transfer learning with a unified text-to-text transformer","volume":"21","author":"Raffel","year":"2020","journal-title":"The Journal of Machine Learning Research"},{"key":"ref24","volume-title":"Introducing PaLM 2.","year":"2023"},{"key":"ref25","volume-title":"Prompting Techniques.","year":"2025"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3991\/ijim.v14i06.14005"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.61137\/ijsret.vol.10.issue1.126"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCS.2014.6911384"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/BigData62323.2024.10825797"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-87496-3_5"},{"key":"ref31","article-title":"Use of graph neural networks in aiding defensive cyber operations","author":"Mitra","year":"2024","journal-title":"arXiv preprint"},{"key":"ref32","article-title":"garak: A framework for security probing large language models","author":"Derczynski","year":"2024","journal-title":"arXiv preprint"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3652594"},{"key":"ref34","volume-title":"Compare 20 lmm security tools & open-source frameworks in \u201924.","author":"\u015eim\u015fek","year":"2024"},{"key":"ref35","volume-title":"Large Language Models in Cybersecurity.","year":"2023"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/BigData52589.2021.9671824"},{"key":"ref37","article-title":"Lora: Low-rank adaptation of large language models","author":"Hu","year":"2021","journal-title":"arXiv preprint"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3637528.3671467"},{"key":"ref39","article-title":"Llmz+: Contextual prompt whitelist principles for agentic 11 ms","author":"Pawelek","year":"2025","journal-title":"arXiv preprint"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3744746"},{"key":"ref41","article-title":"Atlas: few-shot learning with retrieval augmented language models","volume":"24","author":"Izacard","year":"2023","journal-title":"J. Mach. Learn. Res."},{"key":"ref42","article-title":"Grag: Graph retrieval-augmented generation","author":"Hu","year":"2024","journal-title":"arXiv preprint"},{"key":"ref43","article-title":"From local to global: A graph rag approach to queryfocused summarization","author":"Edge","year":"2024","journal-title":"arXiv preprint"},{"key":"ref44","article-title":"Falcon: Autonomous cyber threat intelligence mining with 11 ms for ids rule generation","author":"Mitra","year":"2025","journal-title":"arXiv preprint"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/aixmm62960.2025.00008"},{"key":"ref46","volume-title":"Agent development kit","year":"2025"},{"key":"ref47","volume-title":"Online boutique (microservices-demo).","year":"2025"},{"key":"ref48","volume-title":"AICA framework.","author":"Blakely","year":"2022"},{"key":"ref49","volume-title":"Neo4j: Graphs for Everyone.","year":"2025"},{"key":"ref50","volume-title":"What is Graylog?.","year":"2025"},{"key":"ref51","volume-title":"OpenAIEmbeddings.","year":"2025"},{"key":"ref52","volume-title":"Node embeddings","year":"2025"},{"key":"ref53","article-title":"Towards secure mlops: Surveying attacks, mitigation strategies, and research challenges","author":"Patel","year":"2025","journal-title":"arXiv preprint"}],"event":{"name":"2025 IEEE International Conference on Big Data (BigData)","location":"Macau, China","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,11]]}},"container-title":["2025 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11400704\/11400712\/11402393.pdf?arnumber=11402393","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T06:56:22Z","timestamp":1772866582000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11402393\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1109\/bigdata66926.2025.11402393","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}