{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T03:47:25Z","timestamp":1769917645801,"version":"3.49.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/vizsec.2018.8709231","type":"proceedings-article","created":{"date-parts":[[2019,5,9]],"date-time":"2019-05-09T18:11:43Z","timestamp":1557425503000},"page":"1-8","source":"Crossref","is-referenced-by-count":16,"title":["Building a Machine Learning Model for the SOC, by the Input from the SOC, and Analyzing it for the SOC"],"prefix":"10.1109","author":[{"given":"Awalin","family":"Sopan","sequence":"first","affiliation":[]},{"given":"Matthew","family":"Berninger","sequence":"additional","affiliation":[]},{"given":"Murali","family":"Mulakaluri","sequence":"additional","affiliation":[]},{"given":"Raj","family":"Katakam","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Folk Risk Analysis: Factors Influencing Security Analysts&#x2019; Interpretation of Risk","author":"m\u2019manga","year":"0","journal-title":"SOUPS 2017"},{"key":"ref11","article-title":"Explainable Security","author":"vigano\u2019","year":"2018","journal-title":"Workshop on Explainable Artificial Intelligence IJCAI-ECAI"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2494502"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2016.7739579"},{"key":"ref14","author":"agrawal","year":"2018","journal-title":"Prediction Machines The Simple Economics of Artificial Intelligence"},{"key":"ref15","year":"0","journal-title":"Tableau [Software]"},{"key":"ref16","year":"0","journal-title":"H2O ai [Software]"},{"key":"ref17","first-page":"431","article-title":"Understanding variable importances in forests of randomized trees","author":"louppe","year":"0","journal-title":"NIPS 13"},{"key":"ref18","year":"0"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-08624-8_1","article-title":"Malware and Machine Learning","author":"ledoux","year":"2015","journal-title":"Intelligent Methods for Cyber Warfare"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2016.2598829"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2017.2744878"},{"key":"ref5","article-title":"G-PARE: A Visual Analytic Tool for Comparative Analysis","author":"sharara","year":"2011","journal-title":"IEEE Vis"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/VAST.2017.8585720"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858529"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2011.6"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2017.8062199"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"}],"event":{"name":"2018 IEEE Symposium on Visualization for Cyber Security (VizSec)","location":"Berlin, Germany","start":{"date-parts":[[2018,10,22]]},"end":{"date-parts":[[2018,10,22]]}},"container-title":["2018 IEEE Symposium on Visualization for Cyber Security (VizSec)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8706256\/8709176\/08709231.pdf?arnumber=8709231","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T23:18:56Z","timestamp":1607728736000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8709231\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/vizsec.2018.8709231","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}