{"id":"https://openalex.org/W4380685388","doi":"https://doi.org/10.1145/3600160.3600193","title":"SoK: Modeling Explainability in Security Analytics for Interpretability, Trustworthiness, and Usability","display_name":"SoK: Modeling Explainability in Security Analytics for Interpretability, Trustworthiness, and Usability","publication_year":2023,"publication_date":"2023-08-09","ids":{"openalex":"https://openalex.org/W4380685388","doi":"https://doi.org/10.1145/3600160.3600193"},"language":"en","primary_location":{"id":"doi:10.1145/3600160.3600193","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3600160.3600193","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014560362","display_name":"Dipkamal Bhusal","orcid":"https://orcid.org/0000-0003-1214-1954"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Dipkamal Bhusal","raw_affiliation_strings":["Department of Software Engineering, Rochester Institute of Technology, USA"],"affiliations":[{"raw_affiliation_string":"Department of Software Engineering, Rochester Institute of Technology, USA","institution_ids":["https://openalex.org/I155173764"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031637058","display_name":"Hyun Joo Shin","orcid":"https://orcid.org/0000-0002-6791-5681"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rosalyn Shin","raw_affiliation_strings":["Independent Researcher, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Independent Researcher, Republic of Korea","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092171405","display_name":"Ajay Ashok Shewale","orcid":"https://orcid.org/0009-0001-9256-1213"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ajay Ashok Shewale","raw_affiliation_strings":["Department of software engineering, Rochester Institute of Technology, USA"],"affiliations":[{"raw_affiliation_string":"Department of software engineering, Rochester Institute of Technology, USA","institution_ids":["https://openalex.org/I155173764"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092171406","display_name":"Monish K. Veerabhadran","orcid":"https://orcid.org/0009-0001-4903-8152"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Monish Kumar Manikya Veerabhadran","raw_affiliation_strings":["Department of Software Engineering, Rochester Institute of Technology, USA"],"affiliations":[{"raw_affiliation_string":"Department of Software Engineering, Rochester Institute of Technology, USA","institution_ids":["https://openalex.org/I155173764"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087219666","display_name":"Michael Clifford","orcid":"https://orcid.org/0000-0002-8316-4929"},"institutions":[{"id":"https://openalex.org/I4210093665","display_name":"Toyota Motor Corporation (United States)","ror":"https://ror.org/0076knn86","country_code":"US","type":"company","lineage":["https://openalex.org/I4210093665","https://openalex.org/I4210125472","https://openalex.org/I4210137853"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael Clifford","raw_affiliation_strings":["Toyota InfoTech Labs, Toyota Motor North America, USA"],"affiliations":[{"raw_affiliation_string":"Toyota InfoTech Labs, Toyota Motor North America, USA","institution_ids":["https://openalex.org/I4210093665"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085837723","display_name":"Sara Rampazzi","orcid":"https://orcid.org/0000-0002-3630-6269"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sara Rampazzi","raw_affiliation_strings":["Department of Computer and Information Science and Engineering, University of Florida, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Science and Engineering, University of Florida, USA","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001140269","display_name":"Nidhi Rastogi","orcid":"https://orcid.org/0000-0002-2002-3213"},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nidhi Rastogi","raw_affiliation_strings":["Department of Software Engineering, Rochester Institute of Technology, USA"],"affiliations":[{"raw_affiliation_string":"Department of Software Engineering, Rochester Institute of Technology, USA","institution_ids":["https://openalex.org/I155173764"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5014560362"],"corresponding_institution_ids":["https://openalex.org/I155173764"],"apc_list":null,"apc_paid":null,"fwci":1.5763,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.86120777,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interpretability","display_name":"Interpretability","score":0.9294273853302002},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.8119455575942993},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7889560461044312},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6116726398468018},{"id":"https://openalex.org/keywords/distrust","display_name":"Distrust","score":0.6005867123603821},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.5429068207740784},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.49463722109794617},{"id":"https://openalex.org/keywords/fidelity","display_name":"Fidelity","score":0.49188995361328125},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4631554186344147},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.43946966528892517},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4351327419281006},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.4348711669445038},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4149578809738159},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.23928946256637573},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22514715790748596}],"concepts":[{"id":"https://openalex.org/C2781067378","wikidata":"https://www.wikidata.org/wiki/Q17027399","display_name":"Interpretability","level":2,"score":0.9294273853302002},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.8119455575942993},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7889560461044312},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6116726398468018},{"id":"https://openalex.org/C2778321746","wikidata":"https://www.wikidata.org/wiki/Q621922","display_name":"Distrust","level":2,"score":0.6005867123603821},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.5429068207740784},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.49463722109794617},{"id":"https://openalex.org/C2776459999","wikidata":"https://www.wikidata.org/wiki/Q2119376","display_name":"Fidelity","level":2,"score":0.49188995361328125},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4631554186344147},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.43946966528892517},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4351327419281006},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4348711669445038},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4149578809738159},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.23928946256637573},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22514715790748596},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3600160.3600193","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3600160.3600193","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5899999737739563,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W1787224781","https://openalex.org/W1849277567","https://openalex.org/W2039157918","https://openalex.org/W2112796928","https://openalex.org/W2194775991","https://openalex.org/W2394669110","https://openalex.org/W2473418344","https://openalex.org/W2510508396","https://openalex.org/W2603766943","https://openalex.org/W2750779823","https://openalex.org/W2767094836","https://openalex.org/W2782290149","https://openalex.org/W2788403449","https://openalex.org/W2890991187","https://openalex.org/W2891813744","https://openalex.org/W2910705748","https://openalex.org/W2929803724","https://openalex.org/W2962843949","https://openalex.org/W2962858109","https://openalex.org/W2963560987","https://openalex.org/W2963857521","https://openalex.org/W2998142440","https://openalex.org/W2998600476","https://openalex.org/W3005086430","https://openalex.org/W3006064320","https://openalex.org/W3007960301","https://openalex.org/W3034710707","https://openalex.org/W3035264434","https://openalex.org/W3080189793","https://openalex.org/W3094828954","https://openalex.org/W3097001800","https://openalex.org/W3116286104","https://openalex.org/W3137125108","https://openalex.org/W3176203033","https://openalex.org/W3176390156","https://openalex.org/W3185442557","https://openalex.org/W3189843092","https://openalex.org/W3200583622","https://openalex.org/W3211484264","https://openalex.org/W4221159886","https://openalex.org/W4249616221","https://openalex.org/W4283032682","https://openalex.org/W4283820733","https://openalex.org/W4288083797","https://openalex.org/W4288091267","https://openalex.org/W4308410302","https://openalex.org/W4317859637"],"related_works":["https://openalex.org/W2152370238","https://openalex.org/W3160132286","https://openalex.org/W3193570178","https://openalex.org/W2136955267","https://openalex.org/W2712460288","https://openalex.org/W2016002482","https://openalex.org/W2352717624","https://openalex.org/W3099737524","https://openalex.org/W3198576301","https://openalex.org/W3030836721"],"abstract_inverted_index":{"Interpretability,":[0],"trustworthiness,":[1],"and":[2,36,53,89,109,125,132,138,164],"usability":[3],"are":[4,20,90],"key":[5],"considerations":[6],"in":[7,31,61,113,140,144],"high-stake":[8],"security":[9,116,154],"applications,":[10],"especially":[11,55],"when":[12,56],"utilizing":[13],"deep":[14,76],"learning":[15,77],"models.":[16,78],"While":[17],"these":[18],"models":[19],"known":[21],"for":[22,153,174],"their":[23,111],"high":[24],"accuracy,":[25],"they":[26],"behave":[27],"as":[28,160,171],"black":[29],"boxes":[30],"which":[32,95,168],"identifying":[33],"important":[34],"features":[35],"factors":[37],"that":[38,150],"led":[39],"to":[40,51,68,92],"a":[41,44,103],"classification":[42],"or":[43],"prediction":[45,59],"is":[46],"difficult.":[47],"This":[48,100],"can":[49,96],"lead":[50],"uncertainty":[52],"distrust,":[54],"an":[57],"incorrect":[58],"results":[60],"severe":[62],"consequences.":[63],"Thus,":[64],"explanation":[65,81,142,151,176],"methods":[66,82,108,143,152],"aim":[67],"provide":[69,83],"insights":[70],"into":[71],"the":[72,172],"inner":[73],"working":[74],"of":[75,106,127],"However,":[79],"most":[80],"inconsistent":[84],"explanations,":[85],"have":[86],"low":[87],"fidelity,":[88,162],"susceptible":[91],"adversarial":[93,128],"manipulation,":[94],"reduce":[97],"model":[98],"trustworthiness.":[99],"paper":[101],"provides":[102],"comprehensive":[104],"analysis":[105],"explainable":[107],"demonstrates":[110],"efficacy":[112],"three":[114,146],"distinct":[115,157],"applications:":[117],"anomaly":[118],"detection":[119,126],"using":[120],"system":[121],"logs,":[122],"malware":[123],"prediction,":[124],"images.":[129],"Our":[130],"quantitative":[131],"qualitative":[133],"analysis1":[134],"reveals":[135],"serious":[136],"limitations":[137],"concerns":[139],"state-of-the-art":[141],"all":[145],"applications.":[147],"We":[148],"show":[149],"applications":[155],"necessitate":[156],"characteristics,":[158],"such":[159],"stability,":[161],"robustness,":[163],"usability,":[165],"among":[166],"others,":[167],"we":[169],"outline":[170],"prerequisites":[173],"trustworthy":[175],"methods.":[177]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2023-06-15T00:00:00"}
