{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T21:20:32Z","timestamp":1758662432561,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,2,20]]},"DOI":"10.1145\/3731806.3731817","type":"proceedings-article","created":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T10:17:39Z","timestamp":1758622659000},"page":"60-66","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Evaluation Criteria for Explainable AI in Intrusion Detection to Ensure the Creation of High-Quality Threat Intelligence"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-3022-8055","authenticated-orcid":false,"given":"Noriyoshi","family":"Ozawa","sequence":"first","affiliation":[{"name":"Graduate School of Science and Technology, Chitose Institute of Science and Technology, Chitose, Hokkaido, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9021-2067","authenticated-orcid":false,"given":"Satoru","family":"Sunahara","sequence":"additional","affiliation":[{"name":"Department of Collaborative Education, Chitose Institute of Science and Technology, Chitose, Hokkaido, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9094-6398","authenticated-orcid":false,"given":"Shigeki","family":"Hagihara","sequence":"additional","affiliation":[{"name":"Department of Information Systems Engineering, Chitose Institute of Science and Technology, Chitose, Hokkaido, Japan"}]}],"member":"320","published-online":{"date-parts":[[2025,9,23]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Osvaldo Arreche Tanish\u00a0R. Guntur Jack\u00a0W. Roberts and Mustafa Abdallah. 2024. E-XAI: Evaluating Black-Box Explainable AI Frameworks for Network Intrusion Detection. IEEE Access 12 (2024) 23954\u201323988. https:\/\/doi.org\/10.1109\/ACCESS.2024.3365140","key":"e_1_3_3_1_2_2","DOI":"10.1109\/ACCESS.2024.3365140"},{"unstructured":"Sean Barnum. 2012. Standardizing cyber threat intelligence information with the structured threat information expression (stix). Mitre Corp. 11 (2012) 1\u201322.","key":"e_1_3_3_1_3_2"},{"unstructured":"The\u00a0MITRE Corporation. 2015 - 2024. Brute Force: Password Guessing. https:\/\/attack.mitre.org\/techniques\/T1110\/001\/ Accessed: 2024-10-16.","key":"e_1_3_3_1_4_2"},{"unstructured":"The\u00a0MITRE Corporation. 2015 - 2024. MITRE ATT&CK. https:\/\/attack.mitre.org\/ Accessed: 2024-10-16.","key":"e_1_3_3_1_5_2"},{"unstructured":"ISO\/IEC. 2008. ISO\/IEC 25012:2008 Systems and software engineering \u2013 Software product Quality Requirements and Evaluation (SQuaRE) \u2013 Data quality model. https:\/\/iso25000.com\/index.php\/en\/iso-25000-standards\/iso-25012 Accessed: 2024-10-16.","key":"e_1_3_3_1_6_2"},{"unstructured":"ISO\/IEC. 2011. ISO\/IEC 25010:2011 Systems and software engineering \u2013 Systems and software Quality Requirements and Evaluation (SQuaRE) \u2013 System and software quality models. https:\/\/iso25000.com\/index.php\/en\/iso-25000-standards\/iso-25010 Accessed: 2024-10-16.","key":"e_1_3_3_1_7_2"},{"unstructured":"ISO\/IEC. 2023. ISO\/IEC 25059:2023 Systems and software engineering \u2013 Systems and software Quality Requirements and Evaluation (SQuaRE) \u2013 Quality model for AI systems. https:\/\/iso25000.com\/index.php\/en\/iso-25000-standards\/iso-25059 Accessed: 2024-10-16.","key":"e_1_3_3_1_8_2"},{"unstructured":"Bret Jordan Rich Piazza and Trey Darley. 2021. STIX Version 2.1. OASIS Standard. https:\/\/docs.oasis-open.org\/cti\/stix\/v2.1\/os\/stix-v2.1-os.html Latest stage: https:\/\/docs.oasis-open.org\/cti\/stix\/v2.1\/stix-v2.1.html.","key":"e_1_3_3_1_9_2"},{"key":"e_1_3_3_1_10_2","volume-title":"The NIST Cybersecurity Framework (CSF) 2.0","author":"Standards National\u00a0Institute of","year":"2024","unstructured":"National\u00a0Institute of Standards and Technology. 2024. The NIST Cybersecurity Framework (CSF) 2.0. Technical Report. U.S. Department of Commerce, Washington, D.C.https:\/\/doi.org\/10.6028\/NIST.CSWP.29"},{"doi-asserted-by":"crossref","unstructured":"P.\u00a0Jonathon Phillips Carina Hahn Peter Fontana Amy Yates Kristen\u00a0K. Greene David Broniatowski and Mark\u00a0A. Przybocki. 2021. Four Principles of Explainable Artificial Intelligence. https:\/\/doi.org\/10.6028\/NIST.IR.8312","key":"e_1_3_3_1_11_2","DOI":"10.6028\/NIST.IR.8312"},{"doi-asserted-by":"publisher","key":"e_1_3_3_1_12_2","DOI":"10.1109\/ICCVW.2019.00516"},{"doi-asserted-by":"publisher","key":"e_1_3_3_1_13_2","DOI":"10.1109\/EuroSP48549.2020.00018"},{"doi-asserted-by":"crossref","unstructured":"Zhibo Zhang Hussam\u00a0Al Hamadi Ernesto Damiani Chan\u00a0Yeob Yeun and Fatma Taher. 2022. Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research. IEEE Access 10 (2022) 93104\u201393139. https:\/\/doi.org\/10.1109\/ACCESS.2022.3204051","key":"e_1_3_3_1_14_2","DOI":"10.1109\/ACCESS.2022.3204051"},{"doi-asserted-by":"crossref","unstructured":"Adam Zibak Clemens Sauerwein and Andrew\u00a0C. Simpson. 2022. Threat Intelligence Quality Dimensions for Research and Practice. Digital Threats 3 4 Article 44 (December 2022) 22\u00a0pages. https:\/\/doi.org\/10.1145\/3484202","key":"e_1_3_3_1_15_2","DOI":"10.1145\/3484202"}],"event":{"acronym":"ICSCA 2025","name":"ICSCA 2025: 2025 14th International Conference on Software and Computer Applications","location":"Kuala Lumpur Malaysia"},"container-title":["Proceedings of the 2025 14th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3731806.3731817","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T20:53:45Z","timestamp":1758660825000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3731806.3731817"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,20]]},"references-count":14,"alternative-id":["10.1145\/3731806.3731817","10.1145\/3731806"],"URL":"https:\/\/doi.org\/10.1145\/3731806.3731817","relation":{},"subject":[],"published":{"date-parts":[[2025,2,20]]},"assertion":[{"value":"2025-09-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}