{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T09:36:50Z","timestamp":1761989810741,"version":"3.41.2"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,12]],"date-time":"2025-05-12T00:00:00Z","timestamp":1747008000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,12]],"date-time":"2025-05-12T00:00:00Z","timestamp":1747008000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,12]]},"DOI":"10.1109\/noms57970.2025.11073574","type":"proceedings-article","created":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T17:40:26Z","timestamp":1752601226000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Explainable Anomaly Detection in Network Traffic Using LLM"],"prefix":"10.1109","author":[{"given":"Kamil","family":"Jerabek","sequence":"first","affiliation":[{"name":"Brno University of Technology,Czech Republic"}]},{"given":"Josef","family":"Koumar","sequence":"additional","affiliation":[{"name":"Czech Technical University in Prague,Prague,Czech Republic"}]},{"given":"Ji\u0159\u00ed","family":"Setinsk\u00fd","sequence":"additional","affiliation":[{"name":"Brno University of Technology,Czech Republic"}]},{"given":"Jaroslav","family":"Pesek","sequence":"additional","affiliation":[{"name":"Czech Technical University in Prague,Prague,Czech Republic"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"2098","DOI":"10.1109\/BigData52589.2021.9671958","article-title":"Threat Hunting as a Similarity Search Problem on Multi-positive and Unlabeled Data","volume-title":"2021 IEEE International Conference on Big Data (Big Data)","author":"Komarek","year":"2021"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599934"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3627703.3629553"},{"key":"ref4","article-title":"Large language models can deliver accurate and interpretable time series anomaly detection","author":"Liu","year":"2024","journal-title":"arXiv preprint"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14778\/3476249.3476307"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.emnlp-industry.69"},{"key":"ref7","article-title":"Llm-assisted physical invariant extraction for cyber-physical systems anomaly detection","author":"Abshari","year":"2024","journal-title":"arXiv preprint"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/BDCAT63179.2024.00021"},{"issue":"1","key":"ref9","first-page":"2","article-title":"Chatids: Advancing explainable cybersecurity using generative ai","volume":"17","author":"H\u00fcttner","year":"2024","journal-title":"International Journal On Advances in Security"},{"key":"ref10","article-title":"Huntgpt: Integrating machine learning-based anomaly detection and explainable ai with large language models (llms)","author":"Ali","year":"2023","journal-title":"arXiv preprint"},{"key":"ref11","article-title":"Ids-agent: An llm agent for explainable intrusion detection in iot networks","volume-title":"NeurIPS 2024 Workshop on Open-World Agents","author":"Li","year":"2024"},{"key":"ref12","article-title":"Position: What can large language models tell us about time series analysis","volume-title":"Forty-first International Conference on Machine Learning","author":"Jin","year":"2024"},{"key":"ref13","article-title":"Ad-llm: Benchmarking large language models for anomaly detection","author":"Yang","year":"2024","journal-title":"arXiv preprint"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.15607\/RSS.2024.XX.114"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1038\/s41597-025-04603-x"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS57970.2025.11073727"}],"event":{"name":"NOMS 2025-2025 IEEE Network Operations and Management Symposium","start":{"date-parts":[[2025,5,12]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2025,5,16]]}},"container-title":["NOMS 2025-2025 IEEE Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11073532\/11073571\/11073574.pdf?arnumber=11073574","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T05:48:21Z","timestamp":1752644901000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11073574\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,12]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/noms57970.2025.11073574","relation":{},"subject":[],"published":{"date-parts":[[2025,5,12]]}}}