<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Toward Dynamic Human Knowledge Assessment to Tailor Network Traffic Visual Platform Interfaces</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Bernardo</forename><surname>Breve</surname></persName>
							<email>bbreve@unisa.it</email>
							<affiliation key="aff0">
								<orgName type="institution">University of Salerno</orgName>
								<address>
									<addrLine>Via Giovanni Paolo II, 132</addrLine>
									<postCode>84084</postCode>
									<settlement>Fisciano, Salerno</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Vincenzo</forename><surname>Deufemia</surname></persName>
							<email>deufemia@unisa.it</email>
							<affiliation key="aff0">
								<orgName type="institution">University of Salerno</orgName>
								<address>
									<addrLine>Via Giovanni Paolo II, 132</addrLine>
									<postCode>84084</postCode>
									<settlement>Fisciano, Salerno</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Toward Dynamic Human Knowledge Assessment to Tailor Network Traffic Visual Platform Interfaces</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">56B23B1FD4E06ABE5080D7FA9837E3D6</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:25+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Cybersecurity</term>
					<term>Network traffic</term>
					<term>Human Assessment</term>
					<term>Usable Security and Privacy</term>
					<term>Large Language Models (V. Deufemia) 0000-0002-3898-7512 (B. Breve); 0000-0002-6711-3590 (V. Deufemia)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Nowadays, a vast amount of data flows through networks, with many users inadvertently agreeing to their personal data being processed by network providers, frequently lacking comprehension regarding its management or sharing among various entities. Various network data analytics tools have been introduced in recent years, aiming to simplify visual representations for network traffic analysis. However, these platforms often fail to account for the diverse technical knowledge and cyber risk awareness levels of modern Internet users. To address this issue, we propose the introduction of a Large Language Model (LLM)-based conversational agent with a dynamically structured visual platform. This combination allows for the assessment of users' comprehension through adaptive questioning, enabling personalized interface adaptations that enhance user comprehension and engagement. In this paper, we discuss the architecture and components of the proposed solution, emphasizing the importance of adaptive interfaces in enhancing user experience and fostering security awareness. Through the incorporation of LLMs for human knowledge assessment, our approach endeavors to craft a more personalized and efficient visual platform for analyzing network traffic and cyber threats.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The exponential proliferation of Internet-connected devices has precipitated a monumental surge in the daily volume of data generated. The advent of the Internet of Things (IoT) has not only expanded the sheer quantity of networked devices but has also diversified their types and functions. From ubiquitous smartphones and smartwatches to cutting-edge smart cars, these devices incessantly produce data packets stemming from everyday interactions, seamlessly transmitting them across the vast expanse of the Internet to network providers that serve as nodes of the intricate web of connectivity. According to the latest statistical analysis 1 , 328.77 million terabytes of data is produced daily, culminating in 120 zettabytes annually.</p><p>This data contains valuable insights into user behavior, providing a fingerprint of their activities, preferences, and desires. Although nowadays most network traffic is encrypted utilizing several techniques, such as TLS, SSL, HTTPS, etc. <ref type="bibr" target="#b0">[1]</ref>, there are still approaches that can extract knowledge from the traffic by extrapolating patterns <ref type="bibr" target="#b1">[2]</ref>. By analyzing the information extracted from the traffic, providers can better tailor needs by promoting personalized advertisements that have a higher probability of convincing the user to navigate toward those pages <ref type="bibr" target="#b2">[3]</ref>. Thus, the vast amounts of data generated can potentially serve as a significant source of revenue for network providers <ref type="bibr" target="#b3">[4]</ref>, at the expense of users' privacy <ref type="bibr" target="#b4">[5]</ref>. In addition, online activities can often expose users to the wide range of cyber-attacks that characterize the web, making the user who approaches it particularly vulnerable. Malware <ref type="bibr" target="#b5">[6]</ref>, DDOS attacks <ref type="bibr" target="#b6">[7]</ref>, port scanning/mapping <ref type="bibr" target="#b7">[8]</ref>, IP spoofing, phishing <ref type="bibr" target="#b8">[9]</ref>, are just some of the types of cyber threats that an Internet user may encounter on a daily basis.</p><p>In this scenario, it is crucial to provide users with solutions that can properly assess and hopefully increase their level of awareness regarding how easily online activities could affect their privacy and make them susceptible to cyber-attacks. To this end, the literature has seen the rise of several platforms whose purpose is to monitor their activities and alert users to the risks associated with the improper use of Internet-connected devices <ref type="bibr" target="#b9">[10]</ref> and the network anomalies to which they are exposed <ref type="bibr" target="#b10">[11]</ref>. These approaches primarily use visual metaphors and/or the introduction of layers of abstraction to present users with the progress of their online activities <ref type="bibr" target="#b11">[12]</ref> and be alerted to any attack that may be targeted at them <ref type="bibr" target="#b12">[13,</ref><ref type="bibr" target="#b13">14]</ref>.</p><p>Such platforms could significantly play a role in enhancing users' awareness; however, all of them considerably lack tailorability with respect to the mental model of the user approaching them. In fact, with the enormous expansion of the Internet and the introduction of connected features in devices of all kinds, the pool of users who need to use these devices has grown considerably, and with it the different types of technical knowledge base, awareness of cyber risks, and so on. In fact, the difference between novice and expert users, and the need to adapt the interaction process accordingly, has been the subject of recent research in the literature <ref type="bibr" target="#b14">[15]</ref>. This diversity of mental models is not reflected in visual platforms, which maintain the same structure and presentation style regardless of the type of user approaching them. Therefore, it is necessary to develop dynamic solutions that ensure adaptability in terms of the information to be displayed and the way in which it is displayed, based on the knowledge level of the end user.</p><p>Visual interfaces that adapt to user needs are an emerging area of research aimed at enhancing user experience and performance <ref type="bibr" target="#b15">[16]</ref>. These interfaces leverage various inputs and contextual information to tailor the user experience to individual preferences, behaviors, and requirements. Adaptive algorithms within user interface design environments show promise in improving automated design system performance by considering stylistic preferences and flexible success standards <ref type="bibr" target="#b16">[17]</ref>. User inputs such as physiological, behavioral, qualitative, or multimodal data are being utilized to adapt visualizations and interfaces, with research trends focusing on mixed reality, physiological computing, visual analytics, and proficiency-aware systems <ref type="bibr" target="#b17">[18]</ref>. Logical frameworks using formal knowledge and reasoning components, like Answer Set Programming (ASP), enable the generation of web user interfaces that adapt to user needs, including those of older individuals, by adjusting visual aspects like element sizes and colors <ref type="bibr" target="#b18">[19]</ref>. Adaptive interfaces in smart environments can self-improve by observing user behavior, using user modeling algorithms to draw conclusions from user-system interactions, and triggering adaptations through an ontology-based semantic layer <ref type="bibr" target="#b19">[20]</ref>. In addition, a range of methods and tools exist for adapting user interfaces to improve accessibility, including built-in adaptation mechanisms within applications and external transformation approaches <ref type="bibr" target="#b20">[21]</ref>. To achieve the tailoring we advise for our interfaces, Large Language Models (LLMs) at the base of a conversational agent could provide a valuable medium to perform the assessment of the user's mental model. The use of LLMs instead of more traditional interaction approaches may be able to ensure sufficient dynamism in the assessment phase by formulating questions whose specificity results as a function of the answers obtained to previous questions. Once the type of user has been defined, along with his or her needs and gaps, the subsequent visual platform should display information in accordance with what the user's level of knowledge allows him or her to understand.</p><p>In this position paper, we present an overall architecture of an LLM-based conversational agent for human knowledge assessment in conjunction with a dynamically structured visual platform to assist users in analyzing network traffic and the attacks to which they may be susceptible.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related Work</head><p>In this section, we present several network data analytics tools presented in the literature whose purposes are to visualize and summarize network traffic through simplified visual metaphors.</p><p>One of the pioneering approaches documented in literature is FlowScan <ref type="bibr" target="#b21">[22]</ref>, which scrutinizes and presents insights from flow data extracted by Internet Protocol routers. It comprises Perl scripts and modules, serving as the cohesive element integrating various freely available components, including a flow collection engine, a high-performance database, and a visualization tool. Once integrated, the FlowScan system generates graphical images suitable for web pages, offering a continuous, nearly real-time depiction of network traffic across a network's perimeter.</p><p>In <ref type="bibr" target="#b11">[12]</ref>, the authors propose CHRAVAT, a visual platform focused on monitoring network traffic during normal web browsing. The tool tracks incoming and outgoing traffic from the computer and identifies the providers that receive requests made while web pages are loading. Each provider is then represented by a node in a graph, colored differently depending on the type of provider, and populated in real-time, as well as a set of quantitative data showing the number of providers contacted.</p><p>Nfsight <ref type="bibr" target="#b22">[23]</ref> is a tool aimed at enhancing network awareness with three main features: passive identification of client and server assets, a web interface for querying and visualizing network activity, and a heuristic-based intrusion detection and alerting system. The Service Detector identifies endpoints using heuristics and Bayesian inference from NetFlow flows, while the Intrusion Detector flags suspicious activity with graphlet-based signatures.</p><p>NetMod <ref type="bibr" target="#b23">[24]</ref> is a tool offering detailed analysis of system performances for designers working on large interconnected local area networks. Tested on a campus-wide network, NetMod employs simple analytical models and a user-friendly interface.</p><p>MVSec, as described in <ref type="bibr" target="#b24">[25]</ref>, is a visual analytics system assisting analysts in comprehending information flows over secure networks. This system facilitates data fusion activities among heterogeneous datasets using various visual metaphors. The authors established multiple coordinated views to enable analysts to characterize loud events, uncover subtle events, and explore relationships within datasets. Case studies demonstrate MVSec's capability in constructing analytical storylines of networking and understanding network changes.</p><p>The study by Attipoe et al. <ref type="bibr" target="#b25">[26]</ref> examined 13 network visualization tools to delineate their strengths and weaknesses. Employing qualitative coding as part of their research methodology, they extracted metrics from the advantages and disadvantages of these tools. Their aim is to aid analysts in constructing evaluation methodologies for measuring visualization tool effectiveness via usability studies.</p><p>In <ref type="bibr" target="#b26">[27]</ref>, Constantinescu et al. introduce a prototype 3D visualization system for real-time monitoring of networked devices' status (wired, wireless, IoT devices) and network dynamics ("pulse"), including configuration, load, traffic, abnormal events, and suspicious connections. Users can intuitively visualize network status from any location on the Internet, including mobile devices, and receive alerts via short text or instant messages for significant network events.</p><p>Other approaches reviewed in the literature proposed solutions to increase awareness by alerting users to phishing attacks, the type of attack to which end users are more susceptible. For example, the authors in <ref type="bibr" target="#b27">[28]</ref> propose the development of a real-time tool to detect and distinguish phishing websites from safe ones using machine learning techniques, mainly linear regression, multinomial NB and logistic regression. The aim is to increase cybersecurity awareness by preventing users from accessing risky URLs and protecting their personal data. <ref type="bibr" target="#b13">[14]</ref> introduce an approach for generating warning dialogs in response to phishing attacks. Unlike traditional solutions that simply alert users about the attack, this technique provides explanations concerning why a website is deemed suspicious. The underlying premise is that offering these explanations helps users comprehend the presented information, instills trust in the communicated message, and enhances awareness of the situation.</p><p>Although all of the tools discussed in this section provide important support in improving the level of user awareness and knowledge of risks, none of them contemplates the possibility of preemptively assessing the end user's level of knowledge, and subsequently making the decision to adapt the content of the information shown based on the user's assessment, which limits the use of the platforms exclusively to that group of users who can understand them when shown. In the following, we propose the addition of a dynamic assessment module with consequent adaptability of the tools to the user's level of knowledge.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Dynamic human knowledge assessment using Large-Language-Models</head><p>In this section, we describe the features we envisage in our proposal regarding the introduction of a module that should interpose between the user and the network traffic visualization platform. In our vision, the purpose of this module is to provide a mechanism to dynamically assess the level of basic technical knowledge, i.e., to present the user who approaches it with a series of questions of different natures to determine the level of knowledge he or she has. The dynamic nature of the approach lies in its adaptability to the type of questions asked, based on the answers given by the user. In fact, a series of wrong and/or inaccurate answers is an indication of important lacks in that particular aspect, which is why certain features of the platform need to be removed or simplified to make the user's experience easier. For example, if the user responds "I don't know" or gives an incorrect answer to the question "What is a graph?", this may be sufficient to provide sufficient guidance not to use such a visual metaphor to present such information to the user. However, such an approach runs the risk of reducing the assessment process to a checklist, where a set of questions about a particular concept is associated with a particular answer and an interface adaptation. This poses the danger of oversimplifying the assessment process, potentially resulting in inaccurate evaluations. In fact, to return to the graph example, the user may not even be aware of the term "graph, " but he or she may still be able to interpret the visual metaphor correctly. Verifying this possibility is something that can be done if, for example, the user's ability to understand the representation of connected nodes and arcs has been inferred from the previous questions.</p><p>For this reason, the knowledge assessment is based on the need for something that is necessarily non-deterministic, and for which the determination of the next question to be asked for the evaluation phase takes into account the direction of the interaction. In this scenario, the use of complex natural language models turns out to be a particularly suitable choice for accomplishing this kind of task. In fact, it may be possible to set up the evaluation phase as a simple conversation between the user and what is essentially an LLM-based conversational agent. Conversational agents powered by LLMs are increasingly sophisticated tools that simulate human-like interactions and support a variety of applications, from language learning to mental well-being. LLMs are used in language learning, acting as virtual teachers or conversational partners to enhance vocabulary, pronunciation, and conversational skills <ref type="bibr" target="#b28">[29]</ref>. For instance, fine-tuned LLMs demonstrated the ability to perceive and generate multimodal content, indicating a move towards models that can handle multiple modalities seamlessly <ref type="bibr" target="#b29">[30]</ref>. LLMs have been used for conversational interaction with mobile UIs, allowing for language-based mobile interactions without the need for task-specific datasets and models <ref type="bibr" target="#b30">[31]</ref>. Moreover, personality traits can be measured and shaped in LLM outputs, which is important for the effectiveness of communication in conversational agents <ref type="bibr" target="#b31">[32]</ref>. Finally, in conversational recommender systems, LLMs can provide personalized recommendations and engage in multi-turn dialogues, despite challenges in understanding and controlling complex conversations <ref type="bibr" target="#b32">[33]</ref>. To seek our goal, in this manuscript, we will discuss a way to achieve the human knowledge assessment inspired by the type of approach pursued in <ref type="bibr" target="#b31">[32]</ref>, where the authors used LLMs to conduct an assessment of a user's personal traits. They did this by instructing LLMs through a prompt engineering activity. Subsequently, they pinpointed basic components that specify the behavioral requirements for LLMs to fulfill the given task. In this position paper, we outline the primary components that a prompt should encompass for effective assessment:</p><p>• Task Description -Describes the type of analysis to be performed, for example, assessing the level of knowledge of a particular term, assessing the level of awareness of a particular cyber-attack, and so on. • Target Topic -Indicates the domain of terms, or aspects, on which the assessment is to be carried out. • Test Instruction -Summarizes the features of which the test is to be composed, particularly the manner in which it is to be administered, the number of questions to be asked, and the manner in which the result of the test administered is to be reported. In the following, we outline an example of a preliminary engineered prompt for assessing the user's knowledge about graphs as a visual metaphor for a specific task.</p><p>"Your task is to assess my ability to understand graphs as a medium to represent how packets are transferred between network providers. Ask questions that can become easier or harder according to how I answer each question. After 5 questions, output your decision about my knowledge level."</p><p>An initial analysis of the interaction process resulting from this prompt reveals the LLM's adeptness (in this specific case ChatGPT) in conducting evaluations by posing diverse questions to grasp the potential representations of nodes and arcs in depicting the exchange of network packets between providers.</p><p>Figure <ref type="figure" target="#fig_0">1</ref> provides an overview of the pipeline of components engaged in the proposed approach. Initially, the process starts with the assessment phase, wherein an interaction, whether voice or text-based, occurs between the user and the LLM-based Human Knowledge Assessment Module <ref type="bibr" target="#b0">(1)</ref>. Following the assessment phase, the generated report determining the user's level of knowledge and understanding is transmitted to the Tailoring Module (2), which adapts and refines the interface mechanism of the visual platform based on the insights derived from the report <ref type="bibr" target="#b2">(3)</ref>. Subsequently, the user gains access to a platform featuring visual elements and interfaces aligned with their comprehension level, fostering a more effective user experience (4). Additionally, we envision ongoing communication between the platform and the tailoring module during the user-platform interaction, enabling further interface modifications based on the user's interactions with the platform (5).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Conclusion</head><p>In conclusion, our proposal outlines a dynamic approach to assessing users' technical knowledge through an intermediary module that engages users in a conversational evaluation. By leveraging sophisticated language models, such as ChatGPT, this module can adaptively pose questions based on previous user responses, enabling a nuanced understanding of user capabilities beyond mere checklist assessments. This approach aims to enhance user experiences with visualization platforms by tailoring interface adaptations to individual skill levels, ensuring effective and user-friendly interactions. Through prompt engineering activities inspired by prior work in personality assessment, we advocate for thoughtful integration of language models into knowledge assessment processes, fostering more personalized and engaging user interactions in diverse applications.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Pipeline of the proposed approach.</figDesc><graphic coords="5,147.59,130.00,248.66,102.56" type="bitmap" /></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>This work has been supported by the Italian Ministry of University and Research (MUR) and by the European Union -NextGenerationEU, under grant PRIN 2022 PNRR "DAMOCLES: Detection And Mitigation Of Cyber attacks that exploit human vuLnerabilitiES" (Grant P2022FXP5B).</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">A systematic approach to developing and evaluating website fingerprinting defenses</title>
		<author>
			<persName><forename type="first">X</forename><surname>Cai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Nithyanand</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Johnson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Goldberg</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security</title>
				<meeting>the 2014 ACM SIGSAC Conference on Computer and Communications Security</meeting>
		<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="227" to="238" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Relationship privacy leakage in network traffics</title>
		<author>
			<persName><forename type="first">J</forename><surname>Hu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Lin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Li</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 25th International Conference on Computer Communication and Networks (ICCCN), IEEE</title>
				<meeting>the 25th International Conference on Computer Communication and Networks (ICCCN), IEEE</meeting>
		<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="1" to="9" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">The influence of consumer-brand relationship on the personalized advertising privacy calculus in social media</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">L</forename><surname>Hayes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">H</forename><surname>Brinson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">J</forename><surname>Bott</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">M</forename><surname>Moeller</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Interactive Marketing</title>
		<imprint>
			<biblScope unit="volume">55</biblScope>
			<biblScope unit="page" from="16" to="30" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">The data provision game: researching revenue sharing in collaborative data networks</title>
		<author>
			<persName><forename type="first">W</forename><surname>Badewitz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kloker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Weinhardt</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 22nd IEEE Conference on Business Informatics (CBI)</title>
				<meeting>the 22nd IEEE Conference on Business Informatics (CBI)</meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="191" to="200" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Privacy concerns in online recommender systems: influences of control and user data input</title>
		<author>
			<persName><forename type="first">B</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Jin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 10th Symposium On Usable Privacy and Security (SOUPS 2014)</title>
				<meeting>the 10th Symposium On Usable Privacy and Security (SOUPS 2014)</meeting>
		<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="159" to="173" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">A study of trojan propagation in online social networks</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">R</forename><surname>Faghani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Matrawy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C.-H</forename><surname>Lung</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 5th International Conference on New Technologies, Mobility and Security (NTMS), IEEE</title>
				<meeting>the 5th International Conference on New Technologies, Mobility and Security (NTMS), IEEE</meeting>
		<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="1" to="5" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">DDoS in IoT: a roadmap towards security &amp; countermeasures</title>
		<author>
			<persName><forename type="first">A</forename><surname>Roohi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Adeel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Shah</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 25th International Conference on Automation and Computing (ICAC), IEEE</title>
				<meeting>the 25th International Conference on Automation and Computing (ICAC), IEEE</meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">A review of port scanning techniques</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">De</forename><surname>Vivo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Carrasco</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Isern</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">O</forename><surname>De</surname></persName>
		</author>
		<author>
			<persName><surname>Vivo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM SIGCOMM Computer Communication Review</title>
		<imprint>
			<biblScope unit="volume">29</biblScope>
			<biblScope unit="page" from="41" to="48" />
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">An assessment of end-user vulnerability to phishing attacks</title>
		<author>
			<persName><forename type="first">A</forename><surname>Karakasiliotis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Furnell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Papadaki</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Information Warfare</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="17" to="28" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">An evaluation framework for network security visualizations</title>
		<author>
			<persName><forename type="first">I</forename><surname>Sharafaldin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">H</forename><surname>Lashkari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Ghorbani</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computers &amp; Security</title>
		<imprint>
			<biblScope unit="volume">84</biblScope>
			<biblScope unit="page" from="70" to="92" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">A survey of network anomaly visualization</title>
		<author>
			<persName><forename type="first">T</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Guo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Ma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Chen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Science China Information Sciences</title>
		<imprint>
			<biblScope unit="volume">60</biblScope>
			<biblScope unit="page" from="1" to="17" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Chravat-chronology awareness visual analytic tool</title>
		<author>
			<persName><forename type="first">B</forename><surname>Breve</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Cirillo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Desiato</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 23rd International Conference Information Visualisation (IV)</title>
				<meeting>the 23rd International Conference Information Visualisation (IV)</meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="255" to="260" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">An end-user development approach to secure smart environments</title>
		<author>
			<persName><forename type="first">B</forename><surname>Breve</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Desolda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Deufemia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Greco</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Matera</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Symposium on End User Development (ISEUD&apos;21)</title>
				<meeting>the International Symposium on End User Development (ISEUD&apos;21)</meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="36" to="52" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Explanations in warning dialogs to help users defend against phishing attacks</title>
		<author>
			<persName><forename type="first">G</forename><surname>Desolda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Aneke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Ardito</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Lanzilotti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">F</forename><surname>Costabile</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Human-Computer Studies</title>
		<imprint>
			<biblScope unit="volume">176</biblScope>
			<biblScope unit="page">103056</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Democratizing cybersecurity in smart environments: Investigating the mental models of novices and experts</title>
		<author>
			<persName><forename type="first">B</forename><surname>Breve</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Desolda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Greco</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Deufemia</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Symposium on End User Development (ISEUD&apos;23)</title>
				<meeting>the International Symposium on End User Development (ISEUD&apos;23)</meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="145" to="161" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Supporting interface customization using a mixed-initiative approach</title>
		<author>
			<persName><forename type="first">A</forename><surname>Bunt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Conati</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Mcgrenere</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 12th International Conference on Intelligent User Interfaces</title>
				<meeting>the 12th International Conference on Intelligent User Interfaces</meeting>
		<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="92" to="101" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Adaptation in automated user-interface design</title>
		<author>
			<persName><forename type="first">J</forename><surname>Eisenstein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Puerta</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 5th International Conference on Intelligent User Interfaces</title>
				<meeting>the 5th International Conference on Intelligent User Interfaces</meeting>
		<imprint>
			<date type="published" when="2000">2000</date>
			<biblScope unit="page" from="74" to="81" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Adapting visualizations and interfaces to the user</title>
		<author>
			<persName><forename type="first">F</forename><surname>Chiossi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Zagermann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Karolus</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Rodrigues</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Balestrucci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Weiskopf</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">V</forename><surname>Ehinger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">M</forename><surname>Feuchtner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Reiterer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">L</forename><surname>Chuang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ernst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Bulling</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Mayer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Schmidt</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">it -Information Technology</title>
		<imprint>
			<biblScope unit="volume">64</biblScope>
			<biblScope unit="page" from="133" to="143" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">A logical approach to web user interface adaptation</title>
		<author>
			<persName><forename type="first">J</forename><surname>Zakraoui</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Zagler</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Information Quality in e-Health</title>
				<editor>
			<persName><forename type="first">A</forename><surname>Holzinger</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K.-M</forename><surname>Simonic</surname></persName>
		</editor>
		<imprint>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="645" to="656" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">User interface adaptability for all users</title>
		<author>
			<persName><forename type="first">M</forename><surname>Akazue</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Ojeme</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Ogini</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Natural and Applied Sciences</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<title level="m" type="main">User Interface Adaptation for Accessibility</title>
		<author>
			<persName><forename type="first">S</forename><surname>Firmenich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Garrido</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Paternò</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Rossi</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="547" to="568" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">FlowScan: A network traffic flow reporting and visualization tool</title>
		<author>
			<persName><forename type="first">D</forename><surname>Plonka</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 14th Systems Administration Conference</title>
				<meeting>the 14th Systems Administration Conference<address><addrLine>LISA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2000">2000. 2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Nfsight: netflow-based network awareness tool</title>
		<author>
			<persName><forename type="first">R</forename><surname>Berthier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Cukier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Hiltunen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Kormann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Vesonder</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Sheleheda</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 24th International Conference on Large Installation System Administration</title>
				<meeting>the 24th International Conference on Large Installation System Administration</meeting>
		<imprint>
			<publisher>USENIX Association</publisher>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="1" to="8" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Netmod: A design tool for large-scale heterogeneous campus networks</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">W</forename><surname>Bachmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">E</forename><surname>Segal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">M</forename><surname>Srinivasan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">J</forename><surname>Teorey</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Journal on Selected Areas in Communications</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="15" to="24" />
			<date type="published" when="1991">1991</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Mvsec: multi-perspective and deductive visual analytics on heterogeneous network security data</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Liang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Fan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Zhou</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Visualization</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="page" from="181" to="196" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Visualization tools for network security</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">E</forename><surname>Attipoe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Yan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Turner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Richards</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Electronic Imaging</title>
		<imprint>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="page" from="1" to="8" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Viznet-dynamic visualization of networks and internet of things</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Constantinescu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Vlădoiu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Moise</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 15th RoEduNet Conference: Networking in Education and Research, IEEE</title>
				<meeting>the 15th RoEduNet Conference: Networking in Education and Research, IEEE</meeting>
		<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Intelligent phishing website detection using machine learning</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">K</forename><surname>Jha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Muthalagu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">M</forename><surname>Pawar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Multimedia Tools and Applications</title>
		<imprint>
			<biblScope unit="volume">82</biblScope>
			<biblScope unit="page" from="29431" to="29456" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Conversational agents in language learning</title>
		<author>
			<persName><forename type="first">F</forename><surname>Xiao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Zhao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Sha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Warschauer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of China Computer-Assisted Language Learning</title>
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">SpeechGPT: Empowering large language models with intrinsic cross-modal conversational abilities</title>
		<author>
			<persName><forename type="first">D</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Zhan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Qiu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Findings of the Association for Computational Linguistics: EMNLP 2023</title>
				<editor>
			<persName><forename type="first">H</forename><surname>Bouamor</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Pino</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><surname>Bali</surname></persName>
		</editor>
		<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="15757" to="15773" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">Enabling conversational interaction with mobile UI using large language models</title>
		<author>
			<persName><forename type="first">B</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Li</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, CHI &apos;23</title>
				<meeting>the 2023 CHI Conference on Human Factors in Computing Systems, CHI &apos;23</meeting>
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<monogr>
		<title level="m" type="main">Personality traits in large language models</title>
		<author>
			<persName><forename type="first">M</forename><surname>Safdari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Serapio-Garcia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Crepy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Fitz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Romero</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Sun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Abdulhai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Faust</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Matari'c</surname></persName>
		</author>
		<idno type="DOI">10.48550/arXiv.2307.00184</idno>
		<idno>doi:10.48550/</idno>
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<monogr>
		<title level="m" type="main">Leveraging large language models in conversational recommender systems</title>
		<author>
			<persName><forename type="first">L</forename><surname>Friedman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ahuja</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Allen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Tan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Sidahmed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Long</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Xie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Schubiner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Patel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Lara</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Chu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Tiwari</surname></persName>
		</author>
		<idno type="DOI">10.48550/arXiv.2305.07961</idno>
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
