{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T02:58:27Z","timestamp":1769741907618,"version":"3.49.0"},"reference-count":30,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.062801","type":"journal-article","created":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T05:03:11Z","timestamp":1742878991000},"page":"1607-1621","source":"Crossref","is-referenced-by-count":2,"title":["A New Cybersecurity Approach Enhanced by xAI-Derived Rules to Improve Network Intrusion Detection and SIEM"],"prefix":"10.32604","volume":"83","author":[{"given":"Federica","family":"Uccello","sequence":"first","affiliation":[]},{"given":"Marek","family":"Pawlicki","sequence":"additional","affiliation":[]},{"given":"Salvatore","family":"D'Antonio","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","series-title":"Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"1135","article-title":"\u201cWhy should I trust you?\u201d Explaining the predictions of any classifier","author":"Ribeiro","year":"2016"},{"key":"ref2","unstructured":"Doshi-Velez F, Kim B. Towards a rigorous science of interpretable machine learning. arXiv:1702.08608. 2017."},{"key":"ref3","series-title":"Joint European conference on Machine Learning and Knowledge Discovery in Databases","first-page":"417","article-title":"Interpretable machine learning-a brief history, state-of-the-art and challenges","author":"Molnar","year":"2020"},{"key":"ref4","doi-asserted-by":"crossref","unstructured":"Chora\u015b M, Pawlicki M, Puchalski D, Kozik R. Machine Learning-the results are not the only thing that matters! What about security, explainability and fairness? In: Computational Science-ICCS 2020: 20th International Conference; 2020 Jun 3\u20135; Amsterdam, The Netherlands. p. 615\u201328.","DOI":"10.1007\/978-3-030-50423-6_46"},{"key":"ref5","first-page":"167","author":"Chora\u015b","journal-title":"Computer Security. ESORICS, 2023 International Workshops"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"3079","DOI":"10.3390\/electronics11193079","article-title":"Explainable artificial intelligence for intrusion detection system","volume":"11","author":"Patil","year":"2022","journal-title":"Electronics"},{"key":"ref7","series-title":"Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence","first-page":"1","article-title":"The past, present, and prospective future of XAI: a comprehensive review","author":"Islam","year":"2022"},{"key":"ref8","unstructured":"Mendes C, Rios TN. Explainable artificial intelligence and cybersecurity: a systematic literature review. arXiv:230301259. 2023."},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1252","DOI":"10.3390\/app13031252","article-title":"Explainable artificial intelligence (XAI) for intrusion detection and mitigation in intelligent connected vehicles: a review","volume":"13","author":"Nwakanma","year":"2023","journal-title":"Appl Sci"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"4759","DOI":"10.3390\/s21144759","article-title":"Security information and event management (SIEM): Analysis, trends, and usage in critical infrastructures","volume":"21","author":"Gonz\u00e1lez-Granadillo","year":"2021","journal-title":"Sensors"},{"key":"ref11","first-page":"1","article-title":"Security Information and Event Management (SIEM).","author":"Vielberth","year":"2021","journal-title":"Security Information and Event Management (SIEM)"},{"key":"ref12","first-page":"1010","article-title":"Design and implementation of network security management system based on k-means algorithm","author":"Zhang","year":"2023","journal-title":"In: 2023 IEEE 3rd International Conference on Information Technology, Big Data and Artificial Intelligence (ICIBA)"},{"key":"ref13","doi-asserted-by":"crossref","unstructured":"Podzins O, Romanovs A. Why SIEM is irreplaceable in a secure IT environment? In: 2019 Open Conference of Electrical, Electronic and Information Sciences (eStream); 2019; Vilnius, Lithuania. p. 1\u20135. doi:10.1109\/eStream.2019.8732173.","DOI":"10.1109\/eStream.2019.8732173"},{"key":"ref14","series-title":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","first-page":"1537","article-title":"Ai\/ml for network security: the emperor has no clothes","author":"Jacobs","year":"2022"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1748","DOI":"10.1109\/COMST.2023.3273282","article-title":"Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives","volume":"25","author":"Sun","year":"2023","journal-title":"IEEE Commun Surv Tutorials"},{"key":"ref16","series-title":"2024 5th International Conference on Electronics and Sustainable Communication Systems (ICESC)","first-page":"749","article-title":"Research on constructing a network security event knowledge network based on multi-source data","author":"Lu","year":"2024"},{"key":"ref17","first-page":"70","author":"Uccello","year":"2024","journal-title":"Intelligent Information and Database Systems"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"6634811","DOI":"10.1155\/2021\/6634811","article-title":"Explainable artificial intelligence (XAI) to enhance trust management in intrusion detection systems using decision tree model","volume":"11","author":"Mahbooba","year":"2021","journal-title":"Complexity"},{"key":"ref19","first-page":"6","article-title":"Explainable prediction of features contributing to intrusion detection using ML algorithms and LIME","volume":"5","author":"Karna","year":"2023","journal-title":"Medicon Eng Themes"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"32","DOI":"10.3390\/computers12020032","article-title":"Explainable AI-based DDOS attack identification method for IoT networks","volume":"12","author":"Kalutharage","year":"2023","journal-title":"Computers"},{"key":"ref21","unstructured":"Zhou Q, Li R, Xu L, Nallanathan A, Yang J, Fu A. Towards explainable meta-learning for DDoS detection. arXiv:2204.02255. 2022."},{"key":"ref22","unstructured":"Das A, Rad P. Opportunities and challenges in explainable artificial intelligence (XAI): a survey. arXiv:2006.11371. 2020."},{"key":"ref23","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Mach Learn"},{"key":"ref24","series-title":"Proceedings of 3rd International Conference on Document Analysis and Recognition","first-page":"278","article-title":"Random decision forests","volume":"1","author":"Ho","year":"1995"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"4319","DOI":"10.3390\/s21134319","article-title":"The proposition and evaluation of the roedunet-SIMARGL2021 network intrusion detection dataset","volume":"21","author":"Mihailescu","year":"2021","journal-title":"Sensors"},{"key":"ref26","first-page":"108","article-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization","volume":"1","author":"Sharafaldin","year":"2018","journal-title":"In: Proceedings of the 4th International Conference on Information Systems Security and Privacy ICISSP"},{"key":"ref27","unstructured":"Zolanvari M, Teixeira MA, Gupta L, Khan KM, Jain R. WUSTL-IIOT-2021 dataset for IIoT cybersecurity research [Internet]. MO, USA: St. Louis; [cited 2025 Mar 4]. Available from: http:\/\/www.cse.wustl.edu\/\u223cjain\/iiot2\/index.html."},{"key":"ref28","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1613\/jair.953","article-title":"SMOTE: synthetic minority over-sampling technique","volume":"16","author":"Chawla","year":"2002","journal-title":"J Artif Intell Res"},{"key":"ref29","series-title":"Advances in Neural Information Processing Systems","first-page":"30","article-title":"A unified approach to interpreting model predictions","author":"Lundberg","year":"2017"},{"key":"ref30","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence","article-title":"Anchors: high-precision model-agnostic explanations","volume":"32","author":"Ribeiro","year":"2018"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-2\/TSP_CMC_62801\/TSP_CMC_62801.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:07:16Z","timestamp":1763341636000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n2\/60589"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":30,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.062801","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}