{"id":"https://openalex.org/W4391529303","doi":"https://doi.org/10.1109/cist56084.2023.10409914","title":"A Review and Synthesis for Framing the Use of Artificial Intelligence in Cybersecurity","display_name":"A Review and Synthesis for Framing the Use of Artificial Intelligence in Cybersecurity","publication_year":2023,"publication_date":"2023-12-16","ids":{"openalex":"https://openalex.org/W4391529303","doi":"https://doi.org/10.1109/cist56084.2023.10409914"},"language":"en","primary_location":{"id":"doi:10.1109/cist56084.2023.10409914","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cist56084.2023.10409914","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 7th IEEE Congress on Information Science and Technology (CiSt)","raw_type":"proceedings-article"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093861090","display_name":"Tarik Guemmah","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Tarik Guemmah","raw_affiliation_strings":["Computer Sc. And Interdisc. Physics Laboratory &#x2013; LIPI"],"affiliations":[{"raw_affiliation_string":"Computer Sc. And Interdisc. Physics Laboratory &#x2013; LIPI","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091547773","display_name":"Hakim El Fadili","orcid":"https://orcid.org/0000-0002-3885-7662"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hakim El Fadili","raw_affiliation_strings":["Computer Sc. And Interdisc. Physics Laboratory &#x2013; LIPI"],"affiliations":[{"raw_affiliation_string":"Computer Sc. And Interdisc. Physics Laboratory &#x2013; LIPI","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067434415","display_name":"Said Hraoui","orcid":"https://orcid.org/0000-0001-6838-5734"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Said Hraoui","raw_affiliation_strings":["ENSA, USMBA, FEZ,LIASSE National School of Applied Sciences,Fez,Morocco","LIASSE National School of Applied Sciences, ENSA, USMBA, FEZ, Fez, Morocco"],"affiliations":[{"raw_affiliation_string":"ENSA, USMBA, FEZ,LIASSE National School of Applied Sciences,Fez,Morocco","institution_ids":[]},{"raw_affiliation_string":"LIASSE National School of Applied Sciences, ENSA, USMBA, FEZ, Fez, Morocco","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5093861090"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.4018,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.64460507,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"44","last_page":"49"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/framing","display_name":"Framing (construction)","score":0.7815501689910889},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6946519017219543},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.664659321308136},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3916156589984894},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.20868873596191406}],"concepts":[{"id":"https://openalex.org/C169087156","wikidata":"https://www.wikidata.org/wiki/Q2131593","display_name":"Framing (construction)","level":2,"score":0.7815501689910889},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6946519017219543},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.664659321308136},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3916156589984894},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.20868873596191406},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cist56084.2023.10409914","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cist56084.2023.10409914","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 7th IEEE Congress on Information Science and Technology (CiSt)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W77083600","https://openalex.org/W2744498396","https://openalex.org/W2911591396","https://openalex.org/W2914662937","https://openalex.org/W2918664583","https://openalex.org/W2971305836","https://openalex.org/W2999096842","https://openalex.org/W3002573977","https://openalex.org/W3023469104","https://openalex.org/W3025204993","https://openalex.org/W3037475701","https://openalex.org/W3046549628","https://openalex.org/W3055166465","https://openalex.org/W3091668953","https://openalex.org/W3108884672","https://openalex.org/W3109037135","https://openalex.org/W3127435689","https://openalex.org/W3146778731","https://openalex.org/W3156953641","https://openalex.org/W4211016117","https://openalex.org/W4224211479","https://openalex.org/W4285305938","https://openalex.org/W4285986905","https://openalex.org/W4294204356","https://openalex.org/W4308328479","https://openalex.org/W4315562685","https://openalex.org/W6603173816"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W4402327032","https://openalex.org/W2382290278"],"abstract_inverted_index":{"Cyberattacks":[0],"are":[1,91,110],"becoming":[2],"more":[3],"complex":[4],"and":[5,23,41,44,51,65,75,99,114],"impose":[6],"the":[7,56,67,81,96,103],"use":[8],"of":[9,39,69,84,102],"Artificial":[10],"Intelligence":[11],"(AI)":[12],"as":[13,116],"an":[14],"efficient":[15],"tool":[16],"helping":[17],"experts":[18],"to":[19,24,55,60,63,94],"manage":[20],"security":[21],"incidents":[22],"detect":[25,64],"Advanced":[26],"Persistent":[27],"Threats":[28],"(APT).":[29],"This":[30],"paper":[31],"is":[32],"our":[33],"State-of-the-Art":[34],"addressing":[35],"firstly,":[36],"a":[37,52,100],"memento":[38],"AI":[40],"cybersecurity":[42,104],"metrics":[43],"indicators":[45],"taking":[46],"into":[47],"consideration":[48],"recent":[49],"research":[50,89],"consolidated":[53],"reference":[54],"data":[57],"sources":[58],"likely":[59],"be":[61],"used":[62],"predict":[66],"behaviors":[68],"cyberattacks":[70,97],"in":[71],"Enterprise":[72],"devices,":[73],"mobile":[74],"Industrial":[76],"Control":[77],"System":[78],"(ICS)":[79],"using":[80,106],"version":[82],"13":[83],"MITRE":[85],"ATT&CK":[86],"framework.":[87],"Secondly,":[88],"reviews":[90],"carried":[92],"out":[93],"frame":[95],"frameworks":[98],"synthesis":[101],"fields":[105],"AI.":[107],"Finally,":[108],"discussions":[109],"followed":[111],"by":[112],"recommendations":[113],"perspectives":[115],"trends":[117],"for":[118],"future":[119],"works.":[120]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-25T21:42:39.735039","created_date":"2025-10-10T00:00:00"}
