{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T06:03:59Z","timestamp":1775628239145,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,3]]},"DOI":"10.1109\/icmla66185.2025.00144","type":"proceedings-article","created":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T19:54:58Z","timestamp":1775591698000},"page":"960-965","source":"Crossref","is-referenced-by-count":0,"title":["Applying LLMs to the Classification of Cybersecurity Incident Tickets in a Few-Shot Scenario"],"prefix":"10.1109","author":[{"given":"Sebasti\u00e3o Alves","family":"de Jesus Filho","sequence":"first","affiliation":[{"name":"Federal University of Uberl&#x00E2;ndia (UFU),Faculty of Computing (FACOM),Brazil"}]},{"given":"Alvaro Santana","family":"Santos","sequence":"additional","affiliation":[{"name":"Federal University of Uberl&#x00E2;ndia (UFU),Faculty of Computing (FACOM),Brazil"}]},{"given":"Rafael Dias","family":"Ara\u00fajo","sequence":"additional","affiliation":[{"name":"Federal University of Uberl&#x00E2;ndia (UFU),Faculty of Computing (FACOM),Brazil"}]},{"given":"Rodrigo Sanches","family":"Miani","sequence":"additional","affiliation":[{"name":"Federal University of Uberl&#x00E2;ndia (UFU),Faculty of Computing (FACOM),Brazil"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Ticket-bert: Labeling incident management tickets with language models","author":"Liu","year":"2023"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104222"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-97-4892-1_1"},{"key":"ref4","article-title":"Towards ai-driven human-machine co-teaming for adaptive and agile cyber security operation centers","volume":"2505.06394","author":"Albanese","year":"2025"},{"key":"ref5","article-title":"Cost of a data breach report 2024","author":"Security","year":"2024"},{"key":"ref6","article-title":"Computer security incident handling guide \u2013 revision 3","volume-title":"National Institute of Standards and Technology, NIST Special Publication 800-61 Rev","volume":"3","author":"Scarfone","year":"2024"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1253"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-3223-4_4"},{"key":"ref9","article-title":"Gpt-4 technical report","year":"2023"},{"key":"ref10","article-title":"Gemini: A family of highly capable multimodal models","author":"DeepMind","year":"2023"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3769676"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-64171-8_17"},{"key":"ref13","first-page":"1877","article-title":"Language models are few-shot learners","volume":"33","author":"Brown","year":"2020","journal-title":"Advances in neural information processing systems"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.125509"},{"key":"ref15","article-title":"Cyber sentinel: Exploring conversational agents in streamlining security tasks with gpt-4","author":"Kaheh","year":"2023"},{"key":"ref16","article-title":"Sevenllm: Benchmarking, eliciting, and enhancing abilities of large language models in cyber threat intelligence","author":"Ji","year":"2024"},{"key":"ref17","article-title":"The llama 3 herd of models","author":"Grattafiori","year":"2024"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/fi17050207"},{"key":"ref19","article-title":"Mistral 7b","author":"Jiang","year":"2023"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/n19\u20131423"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00149"},{"key":"ref22","article-title":"Incidentes notificados ao cert.br","year":"2025"},{"key":"ref23","article-title":"Generalizing from a few examples: A survey on few-shot learning. arxiv","volume":"1","author":"Wang","year":"2019","journal-title":"Learning"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/app14052074"}],"event":{"name":"2025 International Conference on Machine Learning and Applications (ICMLA)","location":"Boca Raton, FL, USA","start":{"date-parts":[[2025,12,3]]},"end":{"date-parts":[[2025,12,5]]}},"container-title":["2025 International Conference on Machine Learning and Applications (ICMLA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471302\/11471304\/11471372.pdf?arnumber=11471372","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T05:24:59Z","timestamp":1775625899000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11471372\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,3]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icmla66185.2025.00144","relation":{},"subject":[],"published":{"date-parts":[[2025,12,3]]}}}