{"id":"https://openalex.org/W4360585199","doi":"https://doi.org/10.1109/ic3i56241.2022.10073040","title":"Integration of AI with the Cybersecurity: A detailed Systematic review with the practical issues and challenges","display_name":"Integration of AI with the Cybersecurity: A detailed Systematic review with the practical issues and challenges","publication_year":2022,"publication_date":"2022-12-14","ids":{"openalex":"https://openalex.org/W4360585199","doi":"https://doi.org/10.1109/ic3i56241.2022.10073040"},"language":"en","primary_location":{"id":"doi:10.1109/ic3i56241.2022.10073040","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ic3i56241.2022.10073040","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079952243","display_name":"Melanie Lourens","orcid":"https://orcid.org/0000-0002-4288-8277"},"institutions":[{"id":"https://openalex.org/I177181097","display_name":"Durban University of Technology","ror":"https://ror.org/0303y7a51","country_code":"ZA","type":"education","lineage":["https://openalex.org/I177181097"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Melanie Lourens","raw_affiliation_strings":["Durban University of Technology,Faculty of Management Sciences,South Africa","Faculty of Management Sciences, Durban University of Technology, South Africa"],"affiliations":[{"raw_affiliation_string":"Durban University of Technology,Faculty of Management Sciences,South Africa","institution_ids":["https://openalex.org/I177181097"]},{"raw_affiliation_string":"Faculty of Management Sciences, Durban University of Technology, South Africa","institution_ids":["https://openalex.org/I177181097"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041930133","display_name":"Amar Prakash Dabral","orcid":null},"institutions":[{"id":"https://openalex.org/I60054993","display_name":"Graphic Era University","ror":"https://ror.org/03wqgqd89","country_code":"IN","type":"education","lineage":["https://openalex.org/I60054993"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Amar Prakash Dabral","raw_affiliation_strings":["Graphic Era Deemed to be University,Department of Hospitality Management,Dehradun,Uttarakhand,India","Department of Hospitality Management, Graphic Era Deemed to be University, Dehradun, Uttarakhand, India"],"affiliations":[{"raw_affiliation_string":"Graphic Era Deemed to be University,Department of Hospitality Management,Dehradun,Uttarakhand,India","institution_ids":["https://openalex.org/I60054993"]},{"raw_affiliation_string":"Department of Hospitality Management, Graphic Era Deemed to be University, Dehradun, Uttarakhand, India","institution_ids":["https://openalex.org/I60054993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023899172","display_name":"Durgaprasad Gangodkar\uf020","orcid":"https://orcid.org/0000-0002-4397-4919"},"institutions":[{"id":"https://openalex.org/I60054993","display_name":"Graphic Era University","ror":"https://ror.org/03wqgqd89","country_code":"IN","type":"education","lineage":["https://openalex.org/I60054993"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Durgaprasad Gangodkar","raw_affiliation_strings":["Graphic Era Deemed to be University,Department of Computer Science &#x0026; Engineering,Dehradun,Uttarakhand,India","Department of Computer Science & Engineering, Graphic Era Hill University, Dehradun, Uttarakhand, India"],"affiliations":[{"raw_affiliation_string":"Graphic Era Deemed to be University,Department of Computer Science &#x0026; Engineering,Dehradun,Uttarakhand,India","institution_ids":["https://openalex.org/I60054993"]},{"raw_affiliation_string":"Department of Computer Science & Engineering, Graphic Era Hill University, Dehradun, Uttarakhand, India","institution_ids":["https://openalex.org/I60054993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040906670","display_name":"Navjot Rathour","orcid":"https://orcid.org/0000-0002-7003-2257"},"institutions":[{"id":"https://openalex.org/I3132702812","display_name":"Uttaranchal University","ror":"https://ror.org/00ba6pg24","country_code":"IN","type":"education","lineage":["https://openalex.org/I3132702812"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Navjot Rathour","raw_affiliation_strings":["Uttaranchal Institute of Technology Uttaranchal University,Dehradun,Uttarakhand,India","Uttaranchal Institute of Technology Uttaranchal University, Dehradun, Uttarakhand, India"],"affiliations":[{"raw_affiliation_string":"Uttaranchal Institute of Technology Uttaranchal University,Dehradun,Uttarakhand,India","institution_ids":["https://openalex.org/I3132702812"]},{"raw_affiliation_string":"Uttaranchal Institute of Technology Uttaranchal University, Dehradun, Uttarakhand, India","institution_ids":["https://openalex.org/I3132702812"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065537935","display_name":"Cs Nagabhushanam Tida","orcid":null},"institutions":[{"id":"https://openalex.org/I875944469","display_name":"Koneru Lakshmaiah Education Foundation","ror":"https://ror.org/02k949197","country_code":"IN","type":"education","lineage":["https://openalex.org/I875944469"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Cs Nagabhushanam Tida","raw_affiliation_strings":["Koneru Lakshmaiah Education Foundation.,Department of Law,Guntur,Andhra Pradesh,India","Department of Law, Koneru Lakshmaiah Education Foundation., Guntur, Andhra Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Koneru Lakshmaiah Education Foundation.,Department of Law,Guntur,Andhra Pradesh,India","institution_ids":["https://openalex.org/I875944469"]},{"raw_affiliation_string":"Department of Law, Koneru Lakshmaiah Education Foundation., Guntur, Andhra Pradesh, India","institution_ids":["https://openalex.org/I875944469"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112626658","display_name":"Anupama Chadha","orcid":null},"institutions":[{"id":"https://openalex.org/I55016150","display_name":"Manav Rachna International Institute of Research and Studies","ror":"https://ror.org/02kf4r633","country_code":"IN","type":"education","lineage":["https://openalex.org/I4405253735","https://openalex.org/I55016150"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Anupama Chadha","raw_affiliation_strings":["Computer Applications MRIIRS,Faridabad","Computer Applications MRIIRS, Faridabad"],"affiliations":[{"raw_affiliation_string":"Computer Applications MRIIRS,Faridabad","institution_ids":["https://openalex.org/I55016150"]},{"raw_affiliation_string":"Computer Applications MRIIRS, Faridabad","institution_ids":["https://openalex.org/I55016150"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5079952243"],"corresponding_institution_ids":["https://openalex.org/I177181097"],"apc_list":null,"apc_paid":null,"fwci":0.5522,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.68937989,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1290","last_page":"1295"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.840754508972168},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.821439802646637},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7700470685958862},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7684354782104492},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.5787709355354309},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5014736652374268},{"id":"https://openalex.org/keywords/data-breach","display_name":"Data breach","score":0.43837660551071167},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.4245699644088745},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.18771031498908997},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.13065063953399658}],"concepts":[{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.840754508972168},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.821439802646637},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7700470685958862},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7684354782104492},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.5787709355354309},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5014736652374268},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.43837660551071167},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.4245699644088745},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.18771031498908997},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13065063953399658}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ic3i56241.2022.10073040","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/ic3i56241.2022.10073040","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7300000190734863}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1494255093","https://openalex.org/W1988245217","https://openalex.org/W2339490200","https://openalex.org/W2604252918","https://openalex.org/W2623293810","https://openalex.org/W2793130752","https://openalex.org/W2908954810","https://openalex.org/W3046382233","https://openalex.org/W3183459997","https://openalex.org/W4200566240","https://openalex.org/W4220863748","https://openalex.org/W4245137799","https://openalex.org/W4283582518","https://openalex.org/W4285157984","https://openalex.org/W4285274883","https://openalex.org/W4300778888"],"related_works":["https://openalex.org/W2921504876","https://openalex.org/W2149202530","https://openalex.org/W2183730421","https://openalex.org/W2807822918","https://openalex.org/W1982580243","https://openalex.org/W2921723332","https://openalex.org/W2551868243","https://openalex.org/W2945722434","https://openalex.org/W4252993459","https://openalex.org/W1856232276"],"abstract_inverted_index":{"Not":[0],"only":[1],"have":[2,14,45],"there":[3],"been":[4],"a":[5,22,33,128,141],"lot":[6],"more":[7,18],"cyberattacks":[8],"in":[9,138],"recent":[10],"years,":[11],"but":[12],"they":[13,123],"also":[15],"gotten":[16],"much":[17],"advanced.":[19],"Therefore,":[20],"developing":[21],"cyber-resilient":[23],"strategy":[24],"is":[25],"of":[26,32,49,64,72,130,136,143],"utmost":[27],"significance.":[28],"In":[29],"the":[30,47,62,70,134,144],"event":[31],"cyberattack,":[34],"traditional":[35],"security":[36,120],"measures":[37],"are":[38],"insufficient":[39],"to":[40,85,106],"prevent":[41],"data":[42,56,116],"leaks.":[43],"Cybercriminals":[44],"mastered":[46],"use":[48,63],"cutting-edge":[50],"methods":[51],"and":[52,59,101,113,118,140],"powerful":[53],"tools":[54],"for":[55,75],"intrusion,":[57],"hacking,":[58],"assault.":[60],"Fortunately,":[61],"artificial":[65],"intelligence":[66],"(AI)":[67],"technologies":[68,81],"has":[69,148],"creation":[71],"intelligent":[73],"models":[74],"securing":[76],"systems":[77],"against":[78],"attackers.":[79],"AI":[80,137,147],"can":[82,98],"quickly":[83],"advance":[84],"meet":[86],"complicated":[87],"problems,":[88],"making":[89],"them":[90],"useful":[91],"as":[92],"fundamental":[93],"cybersecurity":[94,139],"tools.":[95],"AI-based":[96],"solutions":[97],"provide":[99],"effective":[100],"robust":[102],"cyber":[103],"defense":[104],"capabilities":[105],"identify":[107],"malware":[108],"attacks,":[109],"network":[110],"intrusions,":[111],"phishing":[112],"spam":[114],"emails,":[115],"breaches,":[117],"alert":[119],"incidents":[121],"when":[122],"occur.":[124],"This":[125],"paper":[126],"provides":[127],"summary":[129],"existing":[131],"research":[132],"regarding":[133],"advantages":[135],"review":[142],"impact":[145],"that":[146],"had":[149],"on":[150],"cybersecurity.":[151]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2}],"updated_date":"2025-12-19T19:40:27.379048","created_date":"2025-10-10T00:00:00"}
