{"id":"https://openalex.org/W7139953963","doi":"https://doi.org/10.1016/j.procs.2026.01.097","title":"Elevating Cybersecurity Strategies with the Insights of Explainable AI","display_name":"Elevating Cybersecurity Strategies with the Insights of Explainable AI","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7139953963","doi":"https://doi.org/10.1016/j.procs.2026.01.097"},"language":"en","primary_location":{"id":"doi:10.1016/j.procs.2026.01.097","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.procs.2026.01.097","pdf_url":null,"source":{"id":"https://openalex.org/S120348307","display_name":"Procedia Computer Science","issn_l":"1877-0509","issn":["1877-0509"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Procedia Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.1016/j.procs.2026.01.097","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010221850","display_name":"Hayder Makki Shakir","orcid":null},"institutions":[{"id":"https://openalex.org/I4210126504","display_name":"University of Al-Qadisiyah","ror":"https://ror.org/02ewzwr87","country_code":"IQ","type":"education","lineage":["https://openalex.org/I4210126504"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Hayder Makki Shakir","raw_affiliation_strings":["Department Computer Science and Information Technology, University of Al-Qadisiyah, Al-Qadisiyah, Iraq"],"affiliations":[{"raw_affiliation_string":"Department Computer Science and Information Technology, University of Al-Qadisiyah, Al-Qadisiyah, Iraq","institution_ids":["https://openalex.org/I4210126504"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5128803409","display_name":"Doaa I Hasan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210126504","display_name":"University of Al-Qadisiyah","ror":"https://ror.org/02ewzwr87","country_code":"IQ","type":"education","lineage":["https://openalex.org/I4210126504"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Doaa I. Hasan","raw_affiliation_strings":["Department Intelligent medical systems, College of Computer Science and Information Technology,University of Al-Qadisiyah, Al-Qadisiyah, Iraq"],"affiliations":[{"raw_affiliation_string":"Department Intelligent medical systems, College of Computer Science and Information Technology,University of Al-Qadisiyah, Al-Qadisiyah, Iraq","institution_ids":["https://openalex.org/I4210126504"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130234980","display_name":"Mustafa Hamid Abd Alsadh","orcid":null},"institutions":[{"id":"https://openalex.org/I3040621137","display_name":"Alsalam University College","ror":"https://ror.org/0047hkh43","country_code":"IQ","type":"education","lineage":["https://openalex.org/I3040621137"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Mustafa Hamid Abd Alsadh","raw_affiliation_strings":["Department of Computer Technical Engineering,Imam Al-Kadhim University College(IKC), Al-Diwaniyah, Iraq"],"affiliations":[{"raw_affiliation_string":"Department of Computer Technical Engineering,Imam Al-Kadhim University College(IKC), Al-Diwaniyah, Iraq","institution_ids":["https://openalex.org/I3040621137"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002040454","display_name":"Amjed Abbas Ahmed","orcid":"https://orcid.org/0000-0001-6069-2967"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Amjed Abbas Ahmed","raw_affiliation_strings":["Center for Artificial Intelligent Technology, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Malaysia, Imam Al Kadhum College (IKC), Department of Computer Science, University of Technology, Baghdad, Iraq"],"affiliations":[{"raw_affiliation_string":"Center for Artificial Intelligent Technology, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Malaysia, Imam Al Kadhum College (IKC), Department of Computer Science, University of Technology, Baghdad, Iraq","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130253921","display_name":"Hamsa Emad Mahmood","orcid":null},"institutions":[{"id":"https://openalex.org/I135120706","display_name":"University of Baghdad","ror":"https://ror.org/007f1da21","country_code":"IQ","type":"education","lineage":["https://openalex.org/I135120706"]}],"countries":["IQ"],"is_corresponding":true,"raw_author_name":"Hamsa E. Mahmood","raw_affiliation_strings":["Head of Information Technology Unit, College of Political Science, University of Baghdad, Baghdad, Iraq"],"affiliations":[{"raw_affiliation_string":"Head of Information Technology Unit, College of Political Science, University of Baghdad, Baghdad, Iraq","institution_ids":["https://openalex.org/I135120706"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073467974","display_name":"Nuha Jameel Ibrahim","orcid":"https://orcid.org/0000-0002-1681-9884"},"institutions":[{"id":"https://openalex.org/I171256487","display_name":"University of Technology - Iraq","ror":"https://ror.org/01w1ehb86","country_code":"IQ","type":"education","lineage":["https://openalex.org/I171256487"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Nuha Jameel Ibrahim","raw_affiliation_strings":["Computer Sciences college,University of Technology, Baghdad, Iraq"],"affiliations":[{"raw_affiliation_string":"Computer Sciences college,University of Technology, Baghdad, Iraq","institution_ids":["https://openalex.org/I171256487"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037528486","display_name":"Taher M. Ghazal","orcid":"https://orcid.org/0000-0003-0672-7924"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Taher M. Ghazal","raw_affiliation_strings":["Faculty of Computing and IT, Sohar University, Oman, Department of Networks and Cybersecurity, Hourani Center for Applied Scientific Research, Al-Ahliyya Amman University, Amman, Jordan. Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia (UKM), 43600 Bangi, Selangor"],"affiliations":[{"raw_affiliation_string":"Faculty of Computing and IT, Sohar University, Oman, Department of Networks and Cybersecurity, Hourani Center for Applied Scientific Research, Al-Ahliyya Amman University, Amman, Jordan. Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia (UKM), 43600 Bangi, Selangor","institution_ids":["https://openalex.org/I885383172"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5130253921"],"corresponding_institution_ids":["https://openalex.org/I135120706"],"apc_list":null,"apc_paid":null,"fwci":35.9412,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.99442481,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"275","issue":null,"first_page":"843","last_page":"854"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.7839999794960022,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.7839999794960022,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.03830000013113022,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.02889999933540821,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.25119999051094055}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.878000020980835},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.602400004863739},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.32989999651908875},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3093999922275543},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.2736000120639801},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.26750001311302185},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2524999976158142},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.25119999051094055},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.24819999933242798},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.23350000381469727}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/j.procs.2026.01.097","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.procs.2026.01.097","pdf_url":null,"source":{"id":"https://openalex.org/S120348307","display_name":"Procedia Computer Science","issn_l":"1877-0509","issn":["1877-0509"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Procedia Computer Science","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1016/j.procs.2026.01.097","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.procs.2026.01.097","pdf_url":null,"source":{"id":"https://openalex.org/S120348307","display_name":"Procedia Computer Science","issn_l":"1877-0509","issn":["1877-0509"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Procedia Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W3154786901","https://openalex.org/W3204683301","https://openalex.org/W3207844425","https://openalex.org/W3215572174","https://openalex.org/W3216527361","https://openalex.org/W4285058242","https://openalex.org/W4293192745","https://openalex.org/W4293525406","https://openalex.org/W4294691140","https://openalex.org/W4297200214","https://openalex.org/W4297904486","https://openalex.org/W4307571902","https://openalex.org/W4316590938","https://openalex.org/W4317859637","https://openalex.org/W4377094293","https://openalex.org/W4378365142","https://openalex.org/W4379382625","https://openalex.org/W4385412351","https://openalex.org/W4385502743","https://openalex.org/W4386122566","https://openalex.org/W4386213871","https://openalex.org/W4386350828","https://openalex.org/W4387587708","https://openalex.org/W4390670372","https://openalex.org/W4394929443","https://openalex.org/W4395675494","https://openalex.org/W4396553703","https://openalex.org/W4399468713","https://openalex.org/W4399563613","https://openalex.org/W4400526454","https://openalex.org/W4400733770","https://openalex.org/W4402568227","https://openalex.org/W4403104615","https://openalex.org/W4403111444","https://openalex.org/W4403111451","https://openalex.org/W4403372109","https://openalex.org/W4403426680","https://openalex.org/W4403938618"],"related_works":[],"abstract_inverted_index":{"Technological":[0],"innovations":[1],"have":[2,95],"shifted":[3],"the":[4,16,43,48,53,69,77,83,104,111,124,128],"nature":[5],"of":[6,15,37,50,55,71,86],"cyber":[7],"threats":[8],"from":[9],"being":[10],"simple":[11],"to":[12,42,96,122],"complex.":[13],"One":[14],"inventive":[17],"methods":[18],"in":[19,29,73,102,113],"this":[20],"direction":[21],"is":[22,33,81,106],"Explainable":[23],"Artificial":[24],"Intelligence":[25],"(XAI)":[26],"whose":[27],"embedding":[28],"IT":[30],"security":[31,91,118],"systems":[32,101],"a":[34,114],"hopeful":[35],"way":[36],"proper":[38],"recognition":[39],"and":[40,108],"reaction":[41],"threats.":[44],"This":[45],"paper":[46],"investigates":[47],"association":[49],"XAI":[51,80],"with":[52,98],"field":[54],"cybersecurity,":[56],"focusing":[57],"on":[58],"AI":[59,72,87],"explainability,":[60],"through":[61,127],"which":[62,103],"cybersecurity":[63],"workers":[64],"can":[65],"be":[66],"surer":[67],"about":[68],"part":[70],"their":[74],"field.":[75],"Besides":[76],"fact":[78],"that":[79,131],"making":[82],"decision":[84],"processes":[85],"engines":[88],"totally":[89],"clear,":[90],"analysts":[92],"do":[93],"not":[94],"deal":[97],"\"black":[99],"box\"":[100],"team":[105],"told":[107],"they":[109,132],"use":[110],"data":[112],"practical":[115],"way,":[116],"thus,":[117],"teams":[119],"are":[120],"able":[121],"apply":[123],"right":[125],"decisions":[126],"actual":[129],"insights":[130],"get.":[133]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2026-03-21T00:00:00"}
