{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:42:42Z","timestamp":1775745762331,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T00:00:00Z","timestamp":1746662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,5,8]]},"DOI":"10.1145\/3701716.3715171","type":"proceedings-article","created":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T16:09:41Z","timestamp":1748016581000},"page":"2851-2854","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["CyberAlly: Leveraging LLMs and Knowledge Graphs to Empower Cyber Defenders"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6161-7982","authenticated-orcid":false,"given":"Minjune","family":"Kim","sequence":"first","affiliation":[{"name":"CSIRO's Data61, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5809-0780","authenticated-orcid":false,"given":"Jeff","family":"Wang","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9962-5080","authenticated-orcid":false,"given":"Kristen","family":"Moore","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8212-8793","authenticated-orcid":false,"given":"Diksha","family":"Goel","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1388-7715","authenticated-orcid":false,"given":"Derui","family":"Wang","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9023-0851","authenticated-orcid":false,"given":"Ahmad","family":"Mohsin","sequence":"additional","affiliation":[{"name":"Edith Cowan University, Perth, WA, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4760-3533","authenticated-orcid":false,"given":"Ahmed","family":"Ibrahim","sequence":"additional","affiliation":[{"name":"Edith Cowan University, Perth, WA, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6143-6850","authenticated-orcid":false,"given":"Robin","family":"Doss","sequence":"additional","affiliation":[{"name":"Deakin University, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6353-8359","authenticated-orcid":false,"given":"Seyit","family":"Camtepe","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1345-2829","authenticated-orcid":false,"given":"Helge","family":"Janicke","sequence":"additional","affiliation":[{"name":"Edith Cowan University, Perth, WA, Australia"}]}],"member":"320","published-online":{"date-parts":[[2025,5,23]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Le Nguyen, Ashim Mahara, Zachary Lightcap, Rodney Frazier, Romy Fieblinger, Grace Long Torales, and Nidhi Rastogi.","author":"Bhusal Dipkamal","year":"2024","unstructured":"Dipkamal Bhusal, Md Tanvirul Alam, Le Nguyen, Ashim Mahara, Zachary Lightcap, Rodney Frazier, Romy Fieblinger, Grace Long Torales, and Nidhi Rastogi. 2024. SECURE: Benchmarking Generative Large Language Models for Cybersecurity Advisory. arXiv preprint arXiv:2405.20441 (2024)."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings - International Conference on Software Engineering","author":"Nengwen","year":"2020","unstructured":"Nengwen et al. 2020. Understanding and handling alert storm for online service systems. Proceedings - International Conference on Software Engineering (2020)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3001374"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS57517.2022.00037"},{"key":"e_1_3_2_1_5_1","first-page":"9459","article-title":"Retrieval-augmented generation for knowledge-intensive nlp tasks","volume":"33","author":"Lewis Patrick","year":"2020","unstructured":"Patrick Lewis, Ethan Perez, Aleksandra Piktus, Fabio Petroni, Vladimir Karpukhin, Naman Goyal, Heinrich K\u00fcttler, Mike Lewis, Wen-tau Yih, Tim Rockt\u00e4schel, et al. 2020. Retrieval-augmented generation for knowledge-intensive nlp tasks. Advances in Neural Information Processing Systems 33 (2020), 9459--9474.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623360"},{"key":"e_1_3_2_1_7_1","volume-title":"Cyberbench: A multi-task benchmark for evaluating large language models in cybersecurity.","author":"Liu Zefang","year":"2024","unstructured":"Zefang Liu, Jialei Shi, and John F Buford. 2024. Cyberbench: A multi-task benchmark for evaluating large language models in cybersecurity."},{"key":"e_1_3_2_1_8_1","series-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 8300 LNCS","volume-title":"Alert correlation algorithms: A survey and taxonomy","author":"Mirheidari Seyed Ali","year":"2013","unstructured":"Seyed Ali Mirheidari, Sajjad Arshad, and Rasool Jalili. 2013. Alert correlation algorithms: A survey and taxonomy. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 8300 LNCS (2013), 183--197."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41278-023-00276-8"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2014.6925787"},{"key":"e_1_3_2_1_11_1","volume-title":"Ridhi Jain, and Merouane Debbah.","author":"Tihanyi Norbert","year":"2024","unstructured":"Norbert Tihanyi, Mohamed Amine Ferrag, Ridhi Jain, and Merouane Debbah. 2024. Cybermetric: A benchmark dataset for evaluating large language models knowledge in cybersecurity. arXiv preprint arXiv:2402.07688 (2024)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSR51186.2021.9527926"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2010.5691262"},{"key":"e_1_3_2_1_14_1","unstructured":"Braden K Webb Sumit Purohit and Rounak Meyur. 2024. Cyber Knowledge Completion Using Large Language Models. arXiv preprint arXiv:2409.16176"}],"event":{"name":"WWW '25: The ACM Web Conference 2025","location":"Sydney NSW Australia","acronym":"WWW '25","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Companion Proceedings of the ACM on Web Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3701716.3715171","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3701716.3715171","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T02:02:21Z","timestamp":1759888941000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3701716.3715171"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,8]]},"references-count":14,"alternative-id":["10.1145\/3701716.3715171","10.1145\/3701716"],"URL":"https:\/\/doi.org\/10.1145\/3701716.3715171","relation":{},"subject":[],"published":{"date-parts":[[2025,5,8]]},"assertion":[{"value":"2025-05-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}