{"id":"https://openalex.org/W7133295438","doi":"https://doi.org/10.48550/arxiv.2603.00200","title":"LiaisonAgent: An Multi-Agent Framework for Autonomous Risk Investigation and Governance","display_name":"LiaisonAgent: An Multi-Agent Framework for Autonomous Risk Investigation and Governance","publication_year":2026,"publication_date":"2026-02-27","ids":{"openalex":"https://openalex.org/W7133295438","doi":"https://doi.org/10.48550/arxiv.2603.00200"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2603.00200","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.00200","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2603.00200","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5127883549","display_name":"Chuanming Tang","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Tang, Chuanming","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5128008528","display_name":"Ling Qing","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qing, Ling","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Chen, Shifeng","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chen, Shifeng","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5127883549"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.28349998593330383,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.28349998593330383,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.0763000026345253,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.05999999865889549,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.6794000267982483},{"id":"https://openalex.org/keywords/bridge","display_name":"Bridge (graph theory)","score":0.5885000228881836},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5861999988555908},{"id":"https://openalex.org/keywords/corporate-governance","display_name":"Corporate governance","score":0.5027999877929688},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.49399998784065247},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4490000009536743},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.37779998779296875},{"id":"https://openalex.org/keywords/risk-management","display_name":"Risk management","score":0.3625999987125397}],"concepts":[{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.6794000267982483},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.6480000019073486},{"id":"https://openalex.org/C100776233","wikidata":"https://www.wikidata.org/wiki/Q2532492","display_name":"Bridge (graph theory)","level":2,"score":0.5885000228881836},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5861999988555908},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5679000020027161},{"id":"https://openalex.org/C39389867","wikidata":"https://www.wikidata.org/wiki/Q380767","display_name":"Corporate governance","level":2,"score":0.5027999877929688},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.49399998784065247},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48980000615119934},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4490000009536743},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.4228000044822693},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.37779998779296875},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.3625999987125397},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.35199999809265137},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.3005000054836273},{"id":"https://openalex.org/C12174686","wikidata":"https://www.wikidata.org/wiki/Q1058438","display_name":"Risk assessment","level":2,"score":0.29829999804496765},{"id":"https://openalex.org/C2778221768","wikidata":"https://www.wikidata.org/wiki/Q8964474","display_name":"Risk governance","level":3,"score":0.2922999858856201},{"id":"https://openalex.org/C145804949","wikidata":"https://www.wikidata.org/wiki/Q478123","display_name":"Situation awareness","level":2,"score":0.2709999978542328},{"id":"https://openalex.org/C539667460","wikidata":"https://www.wikidata.org/wiki/Q2414942","display_name":"Management science","level":1,"score":0.26829999685287476},{"id":"https://openalex.org/C11489865","wikidata":"https://www.wikidata.org/wiki/Q944806","display_name":"Operational risk","level":3,"score":0.2653999924659729},{"id":"https://openalex.org/C127627568","wikidata":"https://www.wikidata.org/wiki/Q1639361","display_name":"Sociotechnical system","level":2,"score":0.2644999921321869},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.25870001316070557},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.2563000023365021},{"id":"https://openalex.org/C20162079","wikidata":"https://www.wikidata.org/wiki/Q1151406","display_name":"Case-based reasoning","level":2,"score":0.2547000050544739},{"id":"https://openalex.org/C33954974","wikidata":"https://www.wikidata.org/wiki/Q486494","display_name":"Sensor fusion","level":2,"score":0.2506999969482422}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2603.00200","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.00200","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2603.00200","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.00200","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,91],"rapid":[1],"evolution":[2],"of":[3,29,138,145],"sophisticated":[4],"cyberattacks":[5],"has":[6],"strained":[7],"modern":[8],"Security":[9],"Operations":[10],"Centers":[11],"(SOC),":[12],"which":[13],"traditionally":[14],"rely":[15],"on":[16,108],"rule-based":[17],"or":[18],"signature-driven":[19],"detection":[20,60],"systems.":[21],"These":[22],"legacy":[23],"frameworks":[24],"often":[25],"generate":[26],"high":[27],"volumes":[28],"technical":[30,58],"alerts":[31],"that":[32,98],"lack":[33],"organizational":[34],"context,":[35],"leading":[36],"to":[37,53,112],"analyst":[38],"fatigue":[39],"and":[40,61,83,128,140,156],"delayed":[41],"incident":[42],"responses.":[43],"This":[44],"paper":[45],"presents":[46],"LiaisonAgent,":[47],"an":[48,133],"autonomous":[49,105],"multi-agent":[50],"system":[51,92,149],"designed":[52],"bridge":[54],"the":[55,67,109,148],"gap":[56],"between":[57],"risk":[59,63,142],"business-level":[62],"governance.":[64],"Built":[65],"upon":[66],"QWQ-32B":[68],"large":[69],"reasoning":[70,106],"model,":[71],"LiaisonAgent":[72],"integrates":[73],"specialized":[74],"sub-agents,":[75],"including":[76],"human-computer":[77],"interaction":[78],"agents,":[79,82],"comprehensive":[80],"judgment":[81,143],"automated":[84],"disposal":[85],"agents-to":[86],"execute":[87],"end-to-end":[88,134],"investigation":[89,167],"workflows.":[90],"leverages":[93],"a":[94,141,162],"hybrid":[95],"planning":[96],"architecture":[97],"combines":[99],"deterministic":[100],"workflows":[101],"for":[102],"compliance":[103],"with":[104],"based":[107],"ReAct":[110],"paradigm":[111],"handle":[113],"ambiguous":[114],"operational":[115],"scenarios.":[116],"Experimental":[117],"evaluations":[118],"across":[119],"diverse":[120],"security":[121],"contexts,":[122],"such":[123],"as":[124],"large-scale":[125],"data":[126],"exfiltration":[127],"unauthorized":[129],"account":[130],"borrowing,":[131],"achieve":[132],"tool-calling":[135],"success":[136],"rate":[137],"97.8%":[139],"accuracy":[144],"95%.":[146],"Furthermore,":[147],"exhibits":[150],"significant":[151],"resilience":[152],"against":[153],"out-of-distribution":[154],"noise":[155],"adversarial":[157],"prompt":[158],"injections,":[159],"while":[160],"achieving":[161],"92.7%":[163],"reduction":[164],"in":[165],"manual":[166],"overhead.":[168]},"counts_by_year":[],"updated_date":"2026-03-25T23:56:10.502304","created_date":"2026-03-04T00:00:00"}
