{"id":"https://openalex.org/W4405113860","doi":"https://doi.org/10.1016/j.procs.2024.11.112","title":"Applying AI and Machine Learning to Enhance Automated Cybersecurity and Network Threat Identification","display_name":"Applying AI and Machine Learning to Enhance Automated Cybersecurity and Network Threat Identification","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4405113860","doi":"https://doi.org/10.1016/j.procs.2024.11.112"},"language":"en","primary_location":{"id":"doi:10.1016/j.procs.2024.11.112","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.procs.2024.11.112","pdf_url":null,"source":{"id":"https://openalex.org/S120348307","display_name":"Procedia Computer Science","issn_l":"1877-0509","issn":["1877-0509"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Procedia Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.1016/j.procs.2024.11.112","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014889807","display_name":"Fadi Muheidat","orcid":"https://orcid.org/0000-0002-0070-2331"},"institutions":[{"id":"https://openalex.org/I43369023","display_name":"California State University, San Bernardino","ror":"https://ror.org/02n651896","country_code":"US","type":"education","lineage":["https://openalex.org/I43369023"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Fadi Muheidat","raw_affiliation_strings":["California State University- San Bernardino, CA, 92407, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"California State University- San Bernardino, CA, 92407, USA","institution_ids":["https://openalex.org/I43369023"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041840692","display_name":"Mohammed Abu Mallouh","orcid":"https://orcid.org/0000-0001-6349-4181"},"institutions":[{"id":"https://openalex.org/I156983542","display_name":"Jordan University of Science and Technology","ror":"https://ror.org/03y8mtb59","country_code":"JO","type":"education","lineage":["https://openalex.org/I156983542"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Moayyad Abu Mallouh","raw_affiliation_strings":["Computer Engineering Department, Jordan University of Science and Technology, Irbid, 22110, Jordan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer Engineering Department, Jordan University of Science and Technology, Irbid, 22110, Jordan","institution_ids":["https://openalex.org/I156983542"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041408026","display_name":"Omar Alsaleh","orcid":null},"institutions":[{"id":"https://openalex.org/I156983542","display_name":"Jordan University of Science and Technology","ror":"https://ror.org/03y8mtb59","country_code":"JO","type":"education","lineage":["https://openalex.org/I156983542"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Omar Al-Saleh","raw_affiliation_strings":["Computer Engineering Department, Jordan University of Science and Technology, Irbid, 22110, Jordan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer Engineering Department, Jordan University of Science and Technology, Irbid, 22110, Jordan","institution_ids":["https://openalex.org/I156983542"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115031911","display_name":"Omar Al-Khasawneh","orcid":null},"institutions":[{"id":"https://openalex.org/I156983542","display_name":"Jordan University of Science and Technology","ror":"https://ror.org/03y8mtb59","country_code":"JO","type":"education","lineage":["https://openalex.org/I156983542"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Omar Al-Khasawneh","raw_affiliation_strings":["Computer Engineering Department, Jordan University of Science and Technology, Irbid, 22110, Jordan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer Engineering Department, Jordan University of Science and Technology, Irbid, 22110, Jordan","institution_ids":["https://openalex.org/I156983542"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018011660","display_name":"Lo\u2019ai Tawalbeh","orcid":"https://orcid.org/0000-0002-2294-9829"},"institutions":[{"id":"https://openalex.org/I156983542","display_name":"Jordan University of Science and Technology","ror":"https://ror.org/03y8mtb59","country_code":"JO","type":"education","lineage":["https://openalex.org/I156983542"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Lo'ai A. Tawalbeh","raw_affiliation_strings":["Computer Engineering Department, Jordan University of Science and Technology, Irbid, 22110, Jordan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer Engineering Department, Jordan University of Science and Technology, Irbid, 22110, Jordan","institution_ids":["https://openalex.org/I156983542"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5014889807"],"corresponding_institution_ids":["https://openalex.org/I43369023"],"apc_list":null,"apc_paid":null,"fwci":2.959,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.91948671,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"251","issue":null,"first_page":"287","last_page":"294"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9186701774597168},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6927844882011414},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.667792797088623},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4366624057292938},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.40976688265800476}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9186701774597168},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6927844882011414},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.667792797088623},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4366624057292938},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.40976688265800476},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/j.procs.2024.11.112","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.procs.2024.11.112","pdf_url":null,"source":{"id":"https://openalex.org/S120348307","display_name":"Procedia Computer Science","issn_l":"1877-0509","issn":["1877-0509"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Procedia Computer Science","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1016/j.procs.2024.11.112","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.procs.2024.11.112","pdf_url":null,"source":{"id":"https://openalex.org/S120348307","display_name":"Procedia Computer Science","issn_l":"1877-0509","issn":["1877-0509"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Procedia Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W23242426","https://openalex.org/W1648885110","https://openalex.org/W2081904411","https://openalex.org/W2087067643","https://openalex.org/W2104692292","https://openalex.org/W2122646361","https://openalex.org/W2142889610","https://openalex.org/W2162969618","https://openalex.org/W2320204756","https://openalex.org/W2531967557","https://openalex.org/W2540187791","https://openalex.org/W2564147261","https://openalex.org/W2756489700","https://openalex.org/W2765426316","https://openalex.org/W2783741806","https://openalex.org/W2795995661","https://openalex.org/W2807786182","https://openalex.org/W2911964244","https://openalex.org/W2919115771","https://openalex.org/W2962700793","https://openalex.org/W3020687048","https://openalex.org/W3026902969","https://openalex.org/W3041286073","https://openalex.org/W3098622648","https://openalex.org/W3138819813","https://openalex.org/W3204683301","https://openalex.org/W4205947740","https://openalex.org/W4224233018","https://openalex.org/W4234472883","https://openalex.org/W4234917611","https://openalex.org/W4247200422","https://openalex.org/W4281693361","https://openalex.org/W4285006516","https://openalex.org/W4293499149","https://openalex.org/W4302314771","https://openalex.org/W4386918683","https://openalex.org/W4394645559","https://openalex.org/W4398165763","https://openalex.org/W6600897621","https://openalex.org/W6636944375","https://openalex.org/W6678155843","https://openalex.org/W6704558514","https://openalex.org/W6748881466","https://openalex.org/W6752679721","https://openalex.org/W6799259860","https://openalex.org/W6853546818"],"related_works":["https://openalex.org/W2961085424","https://openalex.org/W4306674287","https://openalex.org/W4387369504","https://openalex.org/W3046775127","https://openalex.org/W4394896187","https://openalex.org/W3170094116","https://openalex.org/W4386462264","https://openalex.org/W3107602296","https://openalex.org/W4364306694","https://openalex.org/W4312192474"],"abstract_inverted_index":{"Artificial":[0],"intelligence":[1,25,93],"(AI)":[2],"is":[3,15,18,112,121],"now":[4],"used":[5,59],"in":[6,60,133],"many":[7],"sectors":[8],"but":[9],"its":[10],"transformative":[11],"impact":[12],"on":[13,23],"cybersecurity":[14,78,123],"unmatched.":[16],"Cybersecurity":[17],"seen":[19],"to":[20,113,125],"rely":[21],"heavily":[22],"artificial":[24],"(AI),":[26],"which":[27],"has":[28],"brought":[29],"about":[30],"automation":[31],"of":[32,35,68,98,109,118],"responses,":[33],"detection":[34],"network":[36],"threats":[37],"and":[38,52,66,80,124,131],"security":[39,92],"consciousness.":[40],"This":[41],"paper":[42,111],"examines":[43],"various":[44],"modern":[45],"techniques":[46],"involving":[47],"deep":[48],"learning,":[49],"machine":[50],"learning":[51],"behavior":[53],"analysis":[54],"among":[55],"others":[56],"that":[57],"are":[58],"dealing":[61],"with":[62],"the":[63,107],"increasing":[64],"number":[65],"complexity":[67],"cyber":[69],"threats.":[70],"The":[71],"research":[72,130],"also":[73,89],"looks":[74],"at":[75],"how":[76,119],"automated":[77],"response":[79],"decision-making":[81],"capacities":[82],"have":[83],"been":[84],"transformed":[85],"through":[86],"AI.":[87],"It":[88],"investigates":[90],"into":[91],"modeling":[94],"as":[95],"a":[96,115],"means":[97],"offering":[99],"actionable":[100],"insights":[101],"towards":[102],"strengthening":[103],"organizational":[104],"resilience.":[105],"Additionally,":[106],"goal":[108],"this":[110,134],"provide":[114],"nuanced":[116],"understanding":[117],"AI":[120],"reshaping":[122],"outline":[126],"future":[127],"pathways":[128],"for":[129],"development":[132],"dynamic":[135],"field.":[136]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":1}],"updated_date":"2026-05-08T15:41:06.802602","created_date":"2025-10-10T00:00:00"}
