{"id":"https://openalex.org/W4404347281","doi":"https://doi.org/10.1145/3640471.3680444","title":"AuditNet: Conversational AI Security Assistant","display_name":"AuditNet: Conversational AI Security Assistant","publication_year":2024,"publication_date":"2024-09-21","ids":{"openalex":"https://openalex.org/W4404347281","doi":"https://doi.org/10.1145/3640471.3680444"},"language":"en","primary_location":{"id":"doi:10.1145/3640471.3680444","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3640471.3680444","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"26th International Conference on Mobile Human-Computer Interaction","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067657938","display_name":"Shohreh Deldari","orcid":"https://orcid.org/0000-0001-8150-120X"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Shohreh Deldari","raw_affiliation_strings":["School of Computer Science and Engineering, The University of New South Wales (UNSW Sydney), Australia and Cyber Security Cooperative Research Centre (CSCRC), Australia"],"raw_orcid":"https://orcid.org/0000-0001-8150-120X","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, The University of New South Wales (UNSW Sydney), Australia and Cyber Security Cooperative Research Centre (CSCRC), Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041589522","display_name":"Mohammad Goudarzi","orcid":"https://orcid.org/0000-0002-7178-3386"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Mohammad Goudarzi","raw_affiliation_strings":["School of Computer Science and Engineering, The University of New South Wales (UNSW Sydney), Australia and Cyber Security Cooperative Research Centre (CSCRC), Australia"],"raw_orcid":"https://orcid.org/0000-0002-7178-3386","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, The University of New South Wales (UNSW Sydney), Australia and Cyber Security Cooperative Research Centre (CSCRC), Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059529586","display_name":"Aditya Joshi","orcid":"https://orcid.org/0000-0003-2200-9703"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Aditya Joshi","raw_affiliation_strings":["The University of New South Wales (UNSW Sydney), Australia and Cyber Security Cooperative Research Centre (CSCRC), Australia"],"raw_orcid":"https://orcid.org/0000-0003-2200-9703","affiliations":[{"raw_affiliation_string":"The University of New South Wales (UNSW Sydney), Australia and Cyber Security Cooperative Research Centre (CSCRC), Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070360947","display_name":"Arash Shaghaghi","orcid":"https://orcid.org/0000-0001-6630-9519"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Arash Shaghaghi","raw_affiliation_strings":["School of Computer Science and Engineering (CSE), The University of New South Wales (UNSW Sydney), Australia and Cyber Security Cooperative Research Centre (CSCRC), Australia"],"raw_orcid":"https://orcid.org/0000-0001-6630-9519","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering (CSE), The University of New South Wales (UNSW Sydney), Australia and Cyber Security Cooperative Research Centre (CSCRC), Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104127904","display_name":"Simon Finn","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Simon Finn","raw_affiliation_strings":["Cisco, Australia"],"raw_orcid":"https://orcid.org/0009-0008-0668-9183","affiliations":[{"raw_affiliation_string":"Cisco, Australia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090893421","display_name":"Flora D. Salim","orcid":"https://orcid.org/0000-0002-1237-1664"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Flora D. Salim","raw_affiliation_strings":["School of Computer Science and Engineering, The University of New South Wales (UNSW Sydney), Australia and Cyber Security Cooperative Research Centre (CSCRC), Australia"],"raw_orcid":"https://orcid.org/0000-0002-1237-1664","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, The University of New South Wales (UNSW Sydney), Australia and Cyber Security Cooperative Research Centre (CSCRC), Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015261020","display_name":"Sanjay Jha","orcid":"https://orcid.org/0000-0002-1844-1520"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Sanjay Jha","raw_affiliation_strings":["School of Computer Science and Engineering, The University of New South Wales (UNSW Sydney), Australia and Cyber Security Cooperative Research Centre (CSCRC), Australia"],"raw_orcid":"https://orcid.org/0000-0002-1844-1520","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, The University of New South Wales (UNSW Sydney), Australia and Cyber Security Cooperative Research Centre (CSCRC), Australia","institution_ids":["https://openalex.org/I31746571"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5067657938"],"corresponding_institution_ids":["https://openalex.org/I31746571"],"apc_list":null,"apc_paid":null,"fwci":0.3311,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.67676629,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.9850999712944031,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.9850999712944031,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9825000166893005,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.975600004196167,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7192186117172241},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.3763728737831116},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.33962076902389526},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3396106958389282},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.33880871534347534}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7192186117172241},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.3763728737831116},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.33962076902389526},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3396106958389282},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.33880871534347534}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3640471.3680444","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3640471.3680444","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"26th International Conference on Mobile Human-Computer Interaction","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2970641574","https://openalex.org/W4385567900","https://openalex.org/W4389524022"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W3204019825"],"abstract_inverted_index":{"In":[0],"the":[1,11,54,86,96,112,146],"age":[2],"of":[3,13,17,91,98,131],"information":[4],"overload,":[5],"professionals":[6,126],"across":[7,36],"various":[8,37],"fields":[9],"face":[10],"challenge":[12],"navigating":[14],"vast":[15],"amounts":[16],"documentation":[18],"and":[19,27,72,89,104,123,133,143,167],"ever-evolving":[20],"standards.":[21],"Ensuring":[22],"compliance":[23,51,117,136],"with":[24],"standards,":[25,69,165],"regulations,":[26,71],"contractual":[28],"obligations":[29],"is":[30],"a":[31,42],"critical":[32],"yet":[33],"complex":[34],"task":[35],"professional":[38],"fields.":[39,140],"We":[40,141],"propose":[41,142],"versatile":[43],"conversational":[44,148],"AI":[45,107,149],"assistant":[46,108,151],"framework":[47,84],"designed":[48,152],"to":[49,63,101,153,163],"facilitate":[50],"checking":[52],"on":[53],"go,":[55],"in":[56,116,127,137],"diverse":[57],"domains,":[58],"including":[59],"but":[60,119],"not":[61,109],"limited":[62],"network":[64,156],"infrastructure,":[65],"legal":[66],"contracts,":[67],"educational":[68],"environmental":[70],"government":[73],"policies.":[74],"By":[75],"leveraging":[76],"retrieval-augmented":[77],"generation":[78],"using":[79],"large":[80],"language":[81],"models,":[82],"our":[83],"automates":[85],"review,":[87],"indexing,":[88],"retrieval":[90],"relevant,":[92],"context-aware":[93],"information,":[94],"streamlining":[95],"process":[97],"verifying":[99],"adherence":[100],"established":[102],"guidelines":[103],"requirements.":[105],"This":[106],"only":[110],"reduces":[111],"manual":[113],"effort":[114],"involved":[115],"checks":[118],"also":[120],"enhances":[121],"accuracy":[122],"efficiency,":[124],"supporting":[125],"maintaining":[128],"high":[129],"standards":[130],"practice":[132],"ensuring":[134],"regulatory":[135],"their":[138],"respective":[139],"demonstrate":[144],"AuditNet,":[145],"first":[147],"security":[150,157,164],"assist":[154],"IoT":[155],"experts":[158],"by":[159],"providing":[160],"instant":[161],"access":[162],"policies,":[166],"regulations.":[168]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
