{"id":"https://openalex.org/W4391877902","doi":"https://doi.org/10.1109/icaic60265.2024.10433829","title":"AI-Driven Customized Cyber Security Training and Awareness","display_name":"AI-Driven Customized Cyber Security Training and Awareness","publication_year":2024,"publication_date":"2024-02-07","ids":{"openalex":"https://openalex.org/W4391877902","doi":"https://doi.org/10.1109/icaic60265.2024.10433829"},"language":"en","primary_location":{"id":"doi:10.1109/icaic60265.2024.10433829","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icaic60265.2024.10433829","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112264613","display_name":"Shadi Jawhar","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Shadi Jawhar","raw_affiliation_strings":["Lionfish Cyber Security,Cyber Security Department,Fort Wayne,Indiana","Cyber Security Department, Lionfish Cyber Security, Fort Wayne, Indiana"],"affiliations":[{"raw_affiliation_string":"Lionfish Cyber Security,Cyber Security Department,Fort Wayne,Indiana","institution_ids":[]},{"raw_affiliation_string":"Cyber Security Department, Lionfish Cyber Security, Fort Wayne, Indiana","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004076257","display_name":"Jeremy A. Miller","orcid":"https://orcid.org/0000-0001-8918-9775"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jeremy Miller","raw_affiliation_strings":["Lionfish Cyber Security,Cyber Security Department,Westfield,Indiana","Cyber Security Department, Lionfish Cyber Security, Westfield, Indiana"],"affiliations":[{"raw_affiliation_string":"Lionfish Cyber Security,Cyber Security Department,Westfield,Indiana","institution_ids":[]},{"raw_affiliation_string":"Cyber Security Department, Lionfish Cyber Security, Westfield, Indiana","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033289993","display_name":"Zeina Bitar","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zeina Bitar","raw_affiliation_strings":["Lionfish Cyber Security,Research and Development,Ottawa,Canada","Research and Development, Lionfish Cyber Security, Ottawa, Canada"],"affiliations":[{"raw_affiliation_string":"Lionfish Cyber Security,Research and Development,Ottawa,Canada","institution_ids":[]},{"raw_affiliation_string":"Research and Development, Lionfish Cyber Security, Ottawa, Canada","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5112264613"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":12.246,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.98465444,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6840893030166626},{"id":"https://openalex.org/keywords/training","display_name":"Training (meteorology)","score":0.6776777505874634},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4755810499191284},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.32525634765625}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6840893030166626},{"id":"https://openalex.org/C2777211547","wikidata":"https://www.wikidata.org/wiki/Q17141490","display_name":"Training (meteorology)","level":2,"score":0.6776777505874634},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4755810499191284},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32525634765625},{"id":"https://openalex.org/C153294291","wikidata":"https://www.wikidata.org/wiki/Q25261","display_name":"Meteorology","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icaic60265.2024.10433829","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icaic60265.2024.10433829","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1922346655","https://openalex.org/W1971368595","https://openalex.org/W2036728771","https://openalex.org/W2087142541","https://openalex.org/W2110006972","https://openalex.org/W3004396001","https://openalex.org/W3036745110","https://openalex.org/W3211619342","https://openalex.org/W4285161115","https://openalex.org/W4285420639","https://openalex.org/W4312306882","https://openalex.org/W4318603189","https://openalex.org/W4318710913","https://openalex.org/W4380032449","https://openalex.org/W4385323568","https://openalex.org/W6783780438"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W230091440","https://openalex.org/W2390279801","https://openalex.org/W2233261550","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2810751659"],"abstract_inverted_index":{"Artificial":[0],"intelligence":[1,85],"(AI)":[2,86],"has":[3,50],"been":[4,51],"successfully":[5],"used":[6],"in":[7,24,32,34,87,94,109,115,133],"cyber":[8,16,22,61,70,73,137],"security":[9,64,138],"for":[10],"enhancing":[11],"comprehending,":[12],"investigating,":[13],"and":[14,40,46,57,63,66,72,97,112,114,119],"evaluating":[15],"threats.":[17],"It":[18],"can":[19,89],"effectively":[20],"anticipate":[21],"risks":[23],"a":[25,78,91],"more":[26],"efficient":[27],"way.":[28],"AI":[29,106],"also":[30],"helps":[31],"putting":[33],"place":[35],"strategies":[36],"to":[37,43,53,76,120],"safeguard":[38],"assets":[39],"data.":[41],"Due":[42],"their":[44],"complexity":[45],"constant":[47],"development,":[48],"it":[49],"difficult":[52],"comprehend":[54],"cybersecurity":[55,82,88,110],"controls":[56],"adopt":[58],"the":[59,121,128,135],"corresponding":[60],"training":[62],"policies":[65,117],"plans.Given":[67],"that":[68],"both":[69,95],"academics":[71],"practitioners":[74],"need":[75],"have":[77],"deep":[79],"comprehension":[80],"of":[81,104,130],"rules,":[83],"artificial":[84],"be":[90],"crucial":[92],"tool":[93],"education":[96,111,139],"awareness.":[98],"By":[99],"offering":[100],"an":[101],"in-depth":[102],"demonstration":[103],"how":[105],"may":[107],"help":[108],"awareness":[113],"creating":[116],"fast":[118],"needed":[122],"level,":[123],"this":[124],"study":[125],"focuses":[126],"on":[127],"efficiency":[129],"AI-driven":[131],"mechanisms":[132],"strengthening":[134],"entire":[136],"life":[140],"cycle.":[141]},"counts_by_year":[{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
