{"id":"https://openalex.org/W4406892493","doi":"https://doi.org/10.1109/fllm63129.2024.10852472","title":"Empowering Cyber Defense by Unveiling AI-Powered Expert Systems and Software Engineering","display_name":"Empowering Cyber Defense by Unveiling AI-Powered Expert Systems and Software Engineering","publication_year":2024,"publication_date":"2024-11-26","ids":{"openalex":"https://openalex.org/W4406892493","doi":"https://doi.org/10.1109/fllm63129.2024.10852472"},"language":"en","primary_location":{"id":"doi:10.1109/fllm63129.2024.10852472","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fllm63129.2024.10852472","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 2nd International Conference on Foundation and Large Language Models (FLLM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018011660","display_name":"Lo\u2019ai Tawalbeh","orcid":"https://orcid.org/0000-0002-2294-9829"},"institutions":[{"id":"https://openalex.org/I156983542","display_name":"Jordan University of Science and Technology","ror":"https://ror.org/03y8mtb59","country_code":"JO","type":"education","lineage":["https://openalex.org/I156983542"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Lo\u2019Ai Tawalbeh","raw_affiliation_strings":["Jordan University of Science and Technology,Department of Computer Engineering,Irbid,Jordan,22110"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Jordan University of Science and Technology,Department of Computer Engineering,Irbid,Jordan,22110","institution_ids":["https://openalex.org/I156983542"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011845681","display_name":"John A. Franklin","orcid":null},"institutions":[{"id":"https://openalex.org/I1335518801","display_name":"Texas A&M University \u2013 San Antonio","ror":"https://ror.org/0084njv03","country_code":"US","type":"education","lineage":["https://openalex.org/I1335518801"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"John Franklin","raw_affiliation_strings":["Texas A&#x0026;M University,Department of Computing and Cyber Security,San Antonio,USA,TX 78224"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Texas A&#x0026;M University,Department of Computing and Cyber Security,San Antonio,USA,TX 78224","institution_ids":["https://openalex.org/I1335518801"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Christian Ramirez","orcid":null},"institutions":[{"id":"https://openalex.org/I1335518801","display_name":"Texas A&M University \u2013 San Antonio","ror":"https://ror.org/0084njv03","country_code":"US","type":"education","lineage":["https://openalex.org/I1335518801"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Christian Ramirez","raw_affiliation_strings":["Texas A&#x0026;M University,Department of Computing and Cyber Security,San Antonio,USA,TX 78224"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Texas A&#x0026;M University,Department of Computing and Cyber Security,San Antonio,USA,TX 78224","institution_ids":["https://openalex.org/I1335518801"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jonathan Garcia","orcid":null},"institutions":[{"id":"https://openalex.org/I1335518801","display_name":"Texas A&M University \u2013 San Antonio","ror":"https://ror.org/0084njv03","country_code":"US","type":"education","lineage":["https://openalex.org/I1335518801"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jonathan Garcia","raw_affiliation_strings":["Texas A&#x0026;M University,Department of Computing and Cyber Security,San Antonio,USA,TX 78224"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Texas A&#x0026;M University,Department of Computing and Cyber Security,San Antonio,USA,TX 78224","institution_ids":["https://openalex.org/I1335518801"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116057042","display_name":"Abdelrahman Tawalbeh","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Abdelrahman Tawalbeh","raw_affiliation_strings":["Johnson High School,San Antonio,USA,TX, 78259"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Johnson High School,San Antonio,USA,TX, 78259","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014889807","display_name":"Fadi Muheidat","orcid":"https://orcid.org/0000-0002-0070-2331"},"institutions":[{"id":"https://openalex.org/I43369023","display_name":"California State University, San Bernardino","ror":"https://ror.org/02n651896","country_code":"US","type":"education","lineage":["https://openalex.org/I43369023"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fadi Muheidat","raw_affiliation_strings":["School of Computer Science and Engineering, California State University,San Bernardino,USA,CA 92407"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, California State University,San Bernardino,USA,CA 92407","institution_ids":["https://openalex.org/I43369023"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5018011660"],"corresponding_institution_ids":["https://openalex.org/I156983542"],"apc_list":null,"apc_paid":null,"fwci":0.7257,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.81936883,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"238","last_page":"243"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9027000069618225,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9027000069618225,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.573350191116333},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.48136574029922485},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.45795926451683044},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.44389209151268005},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.31756576895713806},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08878549933433533}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.573350191116333},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.48136574029922485},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.45795926451683044},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.44389209151268005},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.31756576895713806},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08878549933433533}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fllm63129.2024.10852472","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fllm63129.2024.10852472","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 2nd International Conference on Foundation and Large Language Models (FLLM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2008960969","https://openalex.org/W2022847609","https://openalex.org/W2163496225","https://openalex.org/W2526727864","https://openalex.org/W2792599578","https://openalex.org/W2890718808","https://openalex.org/W3001047098","https://openalex.org/W3017881119","https://openalex.org/W3082299611","https://openalex.org/W4220891756","https://openalex.org/W6744241621","https://openalex.org/W6787978174"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"People":[0],"all":[1],"over":[2],"the":[3,14,18,30,123,135],"world":[4],"are":[5,161],"subject":[6],"to":[7,20,29,43,62,82,96,112,133],"cyber-attacks.":[8],"The":[9,152],"abundance":[10],"of":[11,155],"information":[12],"on":[13],"internet":[15],"gives":[16],"hackers":[17],"tools":[19],"exploit":[21],"vulnerabilities":[22],"in":[23,65,71,105,148,158],"computer":[24,106],"systems,":[25],"from":[26,47],"home":[27],"desktops":[28],"most":[31],"considerable":[32],"servers":[33],"hosted":[34],"by":[35],"organizations.":[36],"Cyber":[37],"security":[38,51,160],"is":[39,73],"a":[40,74],"practice":[41],"dedicated":[42],"defending":[44],"electronic":[45],"devices":[46],"cybercrime.":[48],"Top":[49],"cyber":[50,128,149,159],"practices":[52],"apply":[53],"expert":[54,69,125,145],"systems":[55,126],"that":[56,77],"can":[57,93,109],"detect":[58],"patterns":[59],"and":[60,101,141,173],"adapt":[61],"changing":[63],"variables":[64],"hacking":[66],"methods.":[67],"An":[68],"system":[70],"computing":[72],"complex":[75],"program":[76],"utilizes":[78],"artificial":[79,139,156,174],"intelligence":[80,140,157],"(AI)":[81],"simulate":[83],"human":[84],"tasks":[85],"or":[86],"calculate":[87],"intricate":[88,153],"functions.":[89],"Artificial":[90],"Intelligence":[91],"techniques":[92],"be":[94,110],"used":[95,147],"determine":[97],"any":[98,117],"abnormal":[99],"activities":[100],"unusual":[102],"data":[103],"traffic":[104],"network":[107],"which":[108],"utilized":[111],"protect":[113],"these":[114],"networks":[115],"against":[116],"malicious":[118],"activities.":[119],"Today,":[120],"organizations":[121],"seek":[122],"latest":[124],"for":[127],"defense.":[129],"This":[130],"paper":[131],"aims":[132],"describe":[134],"software":[136],"engineering":[137],"behind":[138],"how":[142],"it":[143],"supports":[144],"machines":[146],"defense":[150],"systems.":[151,176],"functions":[154],"discussed,":[162],"such":[163],"as":[164],"deep":[165],"learning,":[166],"intrusion":[167],"detection":[168],"trees,":[169],"natural":[170],"language":[171],"processing,":[172],"immune":[175]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-05-10T08:33:47.465468","created_date":"2025-10-10T00:00:00"}
