{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:13:22Z","timestamp":1767183202663,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3670438","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["NORIA UI: Efficient Incident Management on Large-Scale ICT Systems Represented as Knowledge Graphs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5887-899X","authenticated-orcid":false,"given":"Lionel","family":"Tailhardat","sequence":"first","affiliation":[{"name":"Orange, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5639-1504","authenticated-orcid":false,"given":"Yoan","family":"Chabot","sequence":"additional","affiliation":[{"name":"Orange, France"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5439-6753","authenticated-orcid":false,"given":"Antoine","family":"Py","sequence":"additional","affiliation":[{"name":"Orange, France"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-1131-3271","authenticated-orcid":false,"given":"Perrine","family":"Guillemette","sequence":"additional","affiliation":[{"name":"Orange, France"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Sabrina Kirrane, Sebastian Neumaier, Axel Polleres, Roberto Navigli, Axel-Cyrille Ngonga Ngomo, Sabbir M. Rashid, Anisa Rula, Lukas Schmelzeisen, Juan Sequeda, Steffen Staab, and Antoine Zimmermann.","author":"Hogan Aidan","year":"2020","unstructured":"Aidan Hogan, Eva Blomqvist, Michael Cochez, Claudia d\u2019Amato, Gerard de Melo, Claudio Gutierrez, Jos\u00e9 Emilio Labra Gayo, Sabrina Kirrane, Sebastian Neumaier, Axel Polleres, Roberto Navigli, Axel-Cyrille Ngonga Ngomo, Sabbir M. Rashid, Anisa Rula, Lukas Schmelzeisen, Juan Sequeda, Steffen Staab, and Antoine Zimmermann. 2020. Knowledge Graphs. arxiv:2003.02320\u00a0[cs]"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the ICPM Demo Track 2019, co-located with 1st International Conference on Process Mining (ICPM","author":"Berti Alessandro","year":"2019","unstructured":"Alessandro Berti, Sebastiaan van Zelst, and Wil van der Aalst. 2019. Process Mining for Python (pm4py): Bridging the Gap between Process-and Data Science. In Proceedings of the ICPM Demo Track 2019, co-located with 1st International Conference on Process Mining (ICPM 2019)."},{"volume-title":"Writing Effective Use Cases","author":"Cockburn Alistair","key":"e_1_3_2_1_3_1","unstructured":"Alistair Cockburn. 2012. Writing Effective Use Cases. Addison-Wesley."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC49498.2019.9108886"},{"key":"e_1_3_2_1_5_1","volume-title":"Determining what individual SUS scores mean: adding an adjective rating scale. Journal of Usability Studies archive","author":"Bangor Aaron","year":"2009","unstructured":"Aaron Bangor, Philip\u00a0T. Kortum, and James\u00a0T. Miller. 2009. Determining what individual SUS scores mean: adding an adjective rating scale. Journal of Usability Studies archive (2009)."},{"volume-title":"Engineering General Intelligence, Part 1: A Path to Advanced AGI via Embodied Learning and Cognitive Synergy","author":"Goertzel Ben","key":"e_1_3_2_1_6_1","unstructured":"Ben Goertzel, Cassio Pennachin, and Nil Geisweiller. 2014. Engineering General Intelligence, Part 1: A Path to Advanced AGI via Embodied Learning and Cognitive Synergy. Atlantis Press."},{"key":"e_1_3_2_1_7_1","volume-title":"NORIA: Network anomaly detection using knowledge graphs. https:\/\/hellofuture.orange.com\/en\/noria-network-anomaly-detection-using-knowledge-graphs\/. Blog article in Orange \u2013 Hello Future.","author":"Chabot Yoan","year":"2024","unstructured":"Yoan Chabot, Lionel Tailhardat, Perrine Guillemette, and Antoine Py. 2024. NORIA: Network anomaly detection using knowledge graphs. https:\/\/hellofuture.orange.com\/en\/noria-network-anomaly-detection-using-knowledge-graphs\/. Blog article in Orange \u2013 Hello Future."},{"key":"e_1_3_2_1_8_1","volume-title":"Freebase Parallax: A New Way to Browse and Explore Data. https:\/\/vimeo.com\/1513562.","author":"Huynh David","year":"2008","unstructured":"David Huynh. 2008. Freebase Parallax: A New Way to Browse and Explore Data. https:\/\/vimeo.com\/1513562."},{"volume-title":"A Practical Application of SIM\/SEM\/SIEM Automating Threat Identification. White Paper","author":"Swift David","key":"e_1_3_2_1_9_1","unstructured":"David Swift. 2007. A Practical Application of SIM\/SEM\/SIEM Automating Threat Identification. White Paper. SANS Institute."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2003.10.008"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1049\/icp.2023.2517"},{"key":"e_1_3_2_1_12_1","unstructured":"Dmitry Vengertsev and Hemal Thakkar. 2015. Anomaly Detection in Graph: Unsupervised Learning Graph-based Features and Deep Architecture. Technical Report. Department of Computer Science Stanford University."},{"key":"e_1_3_2_1_13_1","volume-title":"VOILA 2021, International Workshop on the Visualization and Interaction for Ontologies and Linked Data.","author":"Ehrhart Thibault","year":"2021","unstructured":"Thibault Ehrhart, Pasquale Lisena, and Rapha\u00ebl Troncy. 2021. KG Explorer: a Customisable Exploration Tool for Knowledge Graphs. In VOILA 2021, International Workshop on the Visualization and Interaction for Ontologies and Linked Data."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.3233\/SW-150208"},{"key":"e_1_3_2_1_15_1","unstructured":"Guillaume Gronier. 2021. F-SUS : La Traduction Fran\u00e7aise Du System Usability Scale. http:\/\/www.guillaumegronier.com\/cv\/blog\/files\/6545bc93a9d0952c2afac2581129ae7c-0.html."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","unstructured":"IEEE. 2018. ISO\/IEC\/IEEE International Standard - Systems and software engineering \u2013 Life cycle processes \u2013 Requirements engineering. Technical Report. https:\/\/doi.org\/10.1109\/IEEESTD.2018.8559686","DOI":"10.1109\/IEEESTD.2018.8559686"},{"key":"e_1_3_2_1_17_1","volume-title":"SUS: A Quick and Dirty Usability Scale. Usability Eval. Ind.","author":"Brooke John","year":"1995","unstructured":"John Brooke. 1995. SUS: A Quick and Dirty Usability Scale. Usability Eval. Ind. (1995)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2817912.2817913"},{"key":"e_1_3_2_1_19_1","unstructured":"Josh Chessman. 2020. Magic Quadrant for Network Performance Monitoring and Diagnostics. Technical Report G00463582. Gartner."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2886843"},{"key":"e_1_3_2_1_21_1","unstructured":"Kelly Kavanagh Toby Bussa and Gorka Sadowski. 2018. Magic Quadrant for Security Information and Event Management. Technical Report G00348811. Gartner."},{"key":"e_1_3_2_1_22_1","unstructured":"Kent Erickson. 2015. Layer 2 Network Connection Awareness Improves Root Cause Analysis. https:\/\/www.zenoss.com\/blog\/layer-2-network-connection-awareness-improves-root-cause-analysis."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487553.3524230"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3604991"},{"key":"e_1_3_2_1_25_1","volume-title":"4th International Workshop on Knowledge Graph Construction (KGCW). https:\/\/ceur-ws.org\/Vol-3471\/paper3.pdf","author":"Tailhardat Lionel","year":"2023","unstructured":"Lionel Tailhardat, Yoan Chabot, and Rapha\u00ebl Troncy. 2023. Designing NORIA: a Knowledge Graph-based Platform for Anomaly Detection and Incident Management in ICT Systems. In 4th International Workshop on Knowledge Graph Construction (KGCW). https:\/\/ceur-ws.org\/Vol-3471\/paper3.pdf"},{"key":"e_1_3_2_1_26_1","volume-title":"Easy Web API Development with SPARQL Transformer. In 18th International Semantic Web Conference (ISWC), In-Use Track","author":"Lisena Pasquale","year":"2019","unstructured":"Pasquale Lisena, Albert Mero\u00f1o-Pe\u00f1uela, Tobias Kuhn, and Rapha\u00ebl Troncy. 2019. Easy Web API Development with SPARQL Transformer. In 18th International Semantic Web Conference (ISWC), In-Use Track. Auckland, New Zealand."},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the ISWC 2018 Posters & Demonstrations, Industry and Blue Sky Ideas Tracks Co-Located with 17th International Semantic Web Conference (ISWC)","author":"Dragoni Mauro","year":"2018","unstructured":"Mauro Dragoni, Tania Bailoni, Rosa Maimone, Michele Marchesoni, and Claudio Eccher. 2018. HORUS.AI \u2013 A Knowledge-Based Solution Supporting Health Persuasive Self-Monitoring. In Proceedings of the ISWC 2018 Posters & Demonstrations, Industry and Blue Sky Ideas Tracks Co-Located with 17th International Semantic Web Conference (ISWC). Monterey, USA."},{"key":"e_1_3_2_1_28_1","unstructured":"Maxime Lefran\u00e7ois Jarmo Kalaoja Takoua Ghariani and Antoine Zimmermann. 2016. SEAS Knowledge Model. Deliverable 2.2. ITEA2 12004 Smart Energy Aware Systems."},{"key":"e_1_3_2_1_29_1","unstructured":"Jos\u00e9 Moreno-Vega and Aidan Hogan. 2018. GraFa: Faceted Search & Browsing for the Wikidata Knowledge Graph.. In ISWC (P&D\/Industry\/BlueSky)."},{"key":"e_1_3_2_1_30_1","unstructured":"Mozilla. 2023. Recommended Web Performance Timings: How Long Is Too Long?https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/Performance\/How_long_is_too_long."},{"key":"e_1_3_2_1_31_1","volume-title":"Ontology-Based Adaptive Systems of Cyber Defense. In 10th Conference on Semantic Technology for Intelligence, Defense, and Security (STIDS).","author":"Ben-Asher Noam","year":"2015","unstructured":"Noam Ben-Asher, A. Oltramari, R. Erbacher, and Cleotilde Gonz\u00e1lez. 2015. Ontology-Based Adaptive Systems of Cyber Defense. In 10th Conference on Semantic Technology for Intelligence, Defense, and Security (STIDS)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88361-4_26"},{"key":"e_1_3_2_1_33_1","unstructured":"Pankaj Prasad and Josh Chessman. 2019. Market Guide for IT Infrastructure Monitoring Tools. Technical Report G00450400. Gartner."},{"key":"e_1_3_2_1_34_1","volume-title":"Smith","author":"Kaloroumakis Peter E.","year":"2021","unstructured":"Peter E. Kaloroumakis and Michael J. Smith. 2021. Toward a Knowledge Graph of Cybersecurity Countermeasures. Technical Report. The MITRE Corporation."},{"key":"e_1_3_2_1_35_1","unstructured":"Riverbed Technology. 2017. Application Performance Monitoring for Microservices-Based Applications. https:\/\/www.aternity.com\/blogs\/monitoring-a-microservices-based-application\/."},{"key":"e_1_3_2_1_36_1","unstructured":"Rob Bolton. 2019. Anomaly Detection and Root Cause Analysis with AppDynamics Cognition Engine. https:\/\/www.appdynamics.com\/blog\/product\/anomaly-detection-root-cause-analysis-appdynamics-cognition-engine\/."},{"volume-title":"Architectural Styles and the Design of Network-based Software Architectures. Ph.\u00a0D. Dissertation","author":"Fielding Roy Thomas","key":"e_1_3_2_1_37_1","unstructured":"Roy Thomas Fielding. 2000. Architectural Styles and the Design of Network-based Software Architectures. Ph.\u00a0D. Dissertation. University of California, Irvine."},{"key":"e_1_3_2_1_38_1","unstructured":"Scaled Agile Inc.2022. SAFe \u2013 Story. https:\/\/scaledagileframework.com\/story\/."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5724"},{"key":"e_1_3_2_1_40_1","unstructured":"Osma Suominen Henri Ylikotila Sini Pessala Mikko Lappalainen Matias Frosterus Jouni Tuominen Thomas Baker Caterina Caracciolo and Armin Retterath. 2015. Publishing SKOS Vocabularies with Skosmos. http:\/\/www.skosmos.org\/publishing-skos-vocabularies-with-skosmos.pdf."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-60635-9_2"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589335.3651447"},{"key":"e_1_3_2_1_43_1","unstructured":"Tomas Fredberg Gen Xu Zhaojuan Bian Illia Cremer and Mike Riess. 2017. Intel CoFluent Technology Optimizes Ericsson Cloud Solutions. https:\/\/www.intel.com\/content\/www\/us\/en\/cofluent\/cofluent-ericsson-big-data-paper.html."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07443-6_50"},{"key":"e_1_3_2_1_45_1","volume-title":"UCO: A Unified Cybersecurity Ontology. In AAAI Workshop on Artificial Intelligence for Cyber Security. AAAI Press.","author":"Syed Zareen","year":"2016","unstructured":"Zareen Syed, Ankur Padia, M. Lisa Mathews, Tim Finin, and Anupam Joshi. 2016. UCO: A Unified Cybersecurity Ontology. In AAAI Workshop on Artificial Intelligence for Cyber Security. AAAI Press."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE55515.2023.00265"}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","acronym":"ARES 2024","location":"Vienna Austria"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670438","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3670438","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:52:50Z","timestamp":1755881570000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670438"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":46,"alternative-id":["10.1145\/3664476.3670438","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3670438","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}