{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T12:13:15Z","timestamp":1771330395334,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,5,28]]},"DOI":"10.1145\/3716489.3728439","type":"proceedings-article","created":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T09:19:24Z","timestamp":1749806364000},"page":"1-2","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Cyber Defense through Agentic AI Enabled Automation: An Approach to Reduce Cyber Risk"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-1285-6676","authenticated-orcid":false,"given":"Prashant","family":"Vajpayee","sequence":"first","affiliation":[{"name":"University of North Texas, Information Science, Denton, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8205-4939","authenticated-orcid":false,"given":"Gahangir","family":"Hossain","sequence":"additional","affiliation":[{"name":"University of North Texas, Information Science, Denton, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,6,13]]},"reference":[{"key":"e_1_3_3_1_1_2","doi-asserted-by":"publisher","DOI":"10.3390\/s21144759"},{"key":"e_1_3_3_1_2_2","volume-title":"Seven Questions to Ask before Buying SIEM Products. Online Research. Available online: http:\/\/searchsecurity.techtarget.com\/feature\/Seven-questions-to-ask-before-buying-SIEM-products (accessed on","author":"Scarfone K.","year":"2020","unstructured":"Scarfone, K. Seven Questions to Ask before Buying SIEM Products. Online Research. Available online: http:\/\/searchsecurity.techtarget.com\/feature\/Seven-questions-to-ask-before-buying-SIEM-products (accessed on 6 May 2020)."},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2012.048412"},{"key":"e_1_3_3_1_4_2","unstructured":"Barros A. SIEM Correlation Is Overrated. Gartner Blog. Available online: http:\/\/blogs.gartner.com\/augusto-barros\/2017\/03\/31\/siem-correlation-is-overrated\/"},{"key":"e_1_3_3_1_5_2","volume-title":"Advanced Persistent Threat (APT): Beyond the Hype","author":"Ask M.","year":"2013","unstructured":"Ask, M.; Bondarenko, P.; Rekdal, J.E.; Nordbo, A.; Ruthven, P.B.; Piatkivskyi, D. Advanced Persistent Threat (APT): Beyond the Hype; Project Report; IMT: Lucca, Italy, 2013."},{"key":"e_1_3_3_1_6_2","volume-title":"Towards GDPR-compliant data processing in modern SIEM systems. Comput. Secur","author":"Menges F.","year":"2021","unstructured":"Menges, F.; Latzo, T.; Vielberth, M.; Sobola, S.; P\u00f6hls, H.C.; Taubmann, B.; K\u00f6stler, J.; Puchta, A.; Freiling, F.; Reiser, H.P.; et al. Towards GDPR-compliant data processing in modern SIEM systems. Comput. Secur. 2021, 103."},{"key":"e_1_3_3_1_7_2","volume-title":"Research and Development Roadmap 2. Project deliverable (D4.4)","author":"Cyber Security for Europe Consortium","year":"2021","unstructured":"Cyber Security for Europe Consortium. Research and Development Roadmap 2. Project deliverable (D4.4). 2021. Available online: https:\/\/cybersec4europe.eu\/publications\/deliverables\/ (accessed on 1 June 2021)."},{"key":"e_1_3_3_1_8_2","volume-title":"The factor","author":"Jensen A. R.","year":"1998","unstructured":"Jensen, A. R. (1998). The factor. Westport, CT: Prager."},{"key":"e_1_3_3_1_9_2","volume-title":"2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE) (pp. 1-5). IEEE.","author":"Siddavatm I.","year":"2011","unstructured":"Siddavatm, I. (2011, February). Mapping of cognitive radio as intelligent agent architecture. In 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE) (pp. 1-5). IEEE."},{"key":"e_1_3_3_1_10_2","volume-title":"Autonomous artificial intelligent agents","author":"Florian R. V.","year":"2003","unstructured":"Florian, R. V. (2003). Autonomous artificial intelligent agents. Center for Cognitive and Neural Studies (Coneural), Cluj-Napoca, Romania."},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1080\/019697297126029"},{"key":"e_1_3_3_1_12_2","volume-title":"Modeling adaptive autonomous agents. Artificial life, 1(1_2), 135-162","author":"Maes P.","year":"1993","unstructured":"Maes, P. (1993). Modeling adaptive autonomous agents. Artificial life, 1(1_2), 135-162."}],"event":{"name":"SIGMIS-CPR '25: 2025 Computers and People Research Conference","location":"Waco Texas USA","acronym":"SIGMIS-CPR '25","sponsor":["SIGMIS ACM Special Interest Group on Management Information Systems"]},"container-title":["Proceedings of the 2025 Computers and People Research Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3716489.3728439","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T14:50:31Z","timestamp":1749826231000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3716489.3728439"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,28]]},"references-count":12,"alternative-id":["10.1145\/3716489.3728439","10.1145\/3716489"],"URL":"https:\/\/doi.org\/10.1145\/3716489.3728439","relation":{},"subject":[],"published":{"date-parts":[[2025,5,28]]},"assertion":[{"value":"2025-06-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}