{"id":"https://openalex.org/W4360585343","doi":"https://doi.org/10.1109/ic3i56241.2022.10072877","title":"The Empirical Analysis of Artificial Intelligence Approaches for Enhancing the Cyber Security for Better Quality","display_name":"The Empirical Analysis of Artificial Intelligence Approaches for Enhancing the Cyber Security for Better Quality","publication_year":2022,"publication_date":"2022-12-14","ids":{"openalex":"https://openalex.org/W4360585343","doi":"https://doi.org/10.1109/ic3i56241.2022.10072877"},"language":"en","primary_location":{"id":"doi:10.1109/ic3i56241.2022.10072877","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3i56241.2022.10072877","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042539344","display_name":"Bhupender Singh Rawat","orcid":"https://orcid.org/0000-0002-6682-0648"},"institutions":[{"id":"https://openalex.org/I154851008","display_name":"Indian Institute of Technology Roorkee","ror":"https://ror.org/00582g326","country_code":"IN","type":"education","lineage":["https://openalex.org/I154851008"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Bhupender Singh Rawat","raw_affiliation_strings":["COER University Roorkee,Uttarakhand","COER University Roorkee, Uttarakhand"],"affiliations":[{"raw_affiliation_string":"COER University Roorkee,Uttarakhand","institution_ids":["https://openalex.org/I154851008"]},{"raw_affiliation_string":"COER University Roorkee, Uttarakhand","institution_ids":["https://openalex.org/I154851008"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023899172","display_name":"Durgaprasad Gangodkar\uf020","orcid":"https://orcid.org/0000-0002-4397-4919"},"institutions":[{"id":"https://openalex.org/I60054993","display_name":"Graphic Era University","ror":"https://ror.org/03wqgqd89","country_code":"IN","type":"education","lineage":["https://openalex.org/I60054993"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Durgaprasad Gangodkar","raw_affiliation_strings":["Graphic Era Deemed to be University Dehradun,Department of Computer Science &#x0026; Engineering,Uttarakhand,India"],"affiliations":[{"raw_affiliation_string":"Graphic Era Deemed to be University Dehradun,Department of Computer Science &#x0026; Engineering,Uttarakhand,India","institution_ids":["https://openalex.org/I60054993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015271317","display_name":"Veera Talukdar","orcid":"https://orcid.org/0000-0002-9204-5825"},"institutions":[{"id":"https://openalex.org/I332121957","display_name":"Kaziranga University","ror":"https://ror.org/00vadgf54","country_code":"IN","type":"education","lineage":["https://openalex.org/I332121957"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Veera Talukdar","raw_affiliation_strings":["The Assam Kaziranga University Jorhat,Assam,India","The Assam Kaziranga University Jorhat, Assam, India"],"affiliations":[{"raw_affiliation_string":"The Assam Kaziranga University Jorhat,Assam,India","institution_ids":["https://openalex.org/I332121957"]},{"raw_affiliation_string":"The Assam Kaziranga University Jorhat, Assam, India","institution_ids":["https://openalex.org/I332121957"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068190044","display_name":"Komal Saxena","orcid":"https://orcid.org/0000-0001-5070-8355"},"institutions":[{"id":"https://openalex.org/I191972202","display_name":"Amity University","ror":"https://ror.org/02n9z0v62","country_code":"IN","type":"education","lineage":["https://openalex.org/I191972202"]},{"id":"https://openalex.org/I4210126505","display_name":"Amity University","ror":"https://ror.org/02exxtn84","country_code":"AE","type":"education","lineage":["https://openalex.org/I191972202","https://openalex.org/I4210126505"]}],"countries":["AE","IN"],"is_corresponding":false,"raw_author_name":"Komal Saxena","raw_affiliation_strings":["Amity institute of Information Technology,Amity University,Uttar Pradesh,Noida","Amity institute of Information Technology,Amity University, Uttar Pradesh, Noida"],"affiliations":[{"raw_affiliation_string":"Amity institute of Information Technology,Amity University,Uttar Pradesh,Noida","institution_ids":["https://openalex.org/I4210126505","https://openalex.org/I191972202"]},{"raw_affiliation_string":"Amity institute of Information Technology,Amity University, Uttar Pradesh, Noida","institution_ids":["https://openalex.org/I4210126505"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008780980","display_name":"Chamandeep Kaur","orcid":"https://orcid.org/0000-0002-9520-3411"},"institutions":[{"id":"https://openalex.org/I91450128","display_name":"Jazan University","ror":"https://ror.org/02bjnq803","country_code":"SA","type":"education","lineage":["https://openalex.org/I91450128"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Chamandeep Kaur","raw_affiliation_strings":["Jazan University,Department of CS &#x0026; IT,Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Jazan University,Department of CS &#x0026; IT,Saudi Arabia","institution_ids":["https://openalex.org/I91450128"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042698352","display_name":"Suryabhan Pratap Singh","orcid":"https://orcid.org/0000-0002-0463-4911"},"institutions":[{"id":"https://openalex.org/I886702836","display_name":"Deen Dayal Upadhyaya Gorakhpur University","ror":"https://ror.org/004wf8x96","country_code":"IN","type":"education","lineage":["https://openalex.org/I886702836"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Suryabhan Pratap Singh","raw_affiliation_strings":["Institute of Engineering and Technology Deen Dayal Upadhyaya,Gorakhpur University,Department of Information Technology,Gorakhpur,India","Department of Information Technology, Institute of Engineering and Technology Deen Dayal Upadhyaya,Gorakhpur University, Gorakhpur, India"],"affiliations":[{"raw_affiliation_string":"Institute of Engineering and Technology Deen Dayal Upadhyaya,Gorakhpur University,Department of Information Technology,Gorakhpur,India","institution_ids":["https://openalex.org/I886702836"]},{"raw_affiliation_string":"Department of Information Technology, Institute of Engineering and Technology Deen Dayal Upadhyaya,Gorakhpur University, Gorakhpur, India","institution_ids":["https://openalex.org/I886702836"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5042539344"],"corresponding_institution_ids":["https://openalex.org/I154851008"],"apc_list":null,"apc_paid":null,"fwci":2.7263,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.92229184,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"247","last_page":"250"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.739800751209259},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6317855715751648},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.56745445728302},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5316131114959717},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.49058952927589417},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.46251073479652405}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.739800751209259},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6317855715751648},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.56745445728302},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5316131114959717},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.49058952927589417},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.46251073479652405},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ic3i56241.2022.10072877","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ic3i56241.2022.10072877","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1505768656","https://openalex.org/W1961623891","https://openalex.org/W1976420017","https://openalex.org/W2019267322","https://openalex.org/W2042742130","https://openalex.org/W2048887528","https://openalex.org/W2093726743","https://openalex.org/W2111877895","https://openalex.org/W2131725908","https://openalex.org/W2142502415","https://openalex.org/W2157604883","https://openalex.org/W2174610657","https://openalex.org/W2181712456","https://openalex.org/W2186393072","https://openalex.org/W2532967838","https://openalex.org/W2790864385","https://openalex.org/W4244495049","https://openalex.org/W4248631640","https://openalex.org/W6685922622","https://openalex.org/W6686673128","https://openalex.org/W7045787128"],"related_works":["https://openalex.org/W2140798747","https://openalex.org/W2948169060","https://openalex.org/W2730112582","https://openalex.org/W2110696645","https://openalex.org/W2358580169","https://openalex.org/W2111347279","https://openalex.org/W4399426197","https://openalex.org/W2487211728","https://openalex.org/W2357879326","https://openalex.org/W4210648132"],"abstract_inverted_index":{"In":[0,10],"the":[1,17,34,66,79,103,117,136,153,161],"world":[2],"of":[3,50,78,119,135,163],"information":[4,15],"technology,":[5],"cyber":[6,164],"security":[7,32,63],"is":[8,16,33,114,123,138],"crucial.":[9],"this":[11],"technological":[12],"age,":[13],"when":[14],"primary":[18,133],"resource":[19],"for":[20,68,84],"every":[21],"firm":[22],"to":[23,61,72,100,125,139],"preserve":[24],"and":[25,64,105,156],"produce":[26],"results":[27],"in":[28,41,54],"accordance":[29],"with":[30],"requirements,":[31],"key":[35],"concern":[36],"that":[37,89,116,145,158],"must":[38],"be":[39],"resolved":[40],"each":[42],"case.":[43],"This":[44],"study":[45,137],"offers":[46],"a":[47],"succinct":[48],"review":[49],"artificial":[51,58,142],"intelligence":[52,143],"applications":[53,91],"different":[55],"cybersecurity":[56,74],"utilizing":[57],"neural":[59],"networks":[60],"analyze":[62],"assesses":[65],"potential":[67],"upgrading":[69],"defense":[70],"mechanisms":[71],"increase":[73],"capabilities.":[75],"The":[76,132],"examination":[77],"latest":[80],"man-made":[81,120],"brainpower":[82,121],"programming":[83],"online":[85,108],"protection":[86,109,130],"might":[87],"recommend":[88],"valuable":[90],"are":[92,159],"now":[93],"being":[94],"used.":[95],"They":[96],"utilize":[97],"brain":[98],"organizations":[99],"initially":[101],"get":[102],"edge":[104],"numerous":[106],"other":[107],"areas.":[110],"Then":[111],"again,":[112],"it":[113,150],"apparent":[115],"utilization":[118],"advancements":[122],"important":[124],"actually":[126],"address":[127],"some":[128],"network":[129],"issues.":[131],"goal":[134],"provide":[140],"an":[141],"strategy":[144],"can":[146],"offer":[147],"security.":[148,165],"Additionally,":[149],"focuses":[151],"on":[152],"methods,":[154],"values,":[155],"trends":[157],"reshaping":[160],"field":[162]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5}],"updated_date":"2026-02-27T16:54:17.756197","created_date":"2025-10-10T00:00:00"}
