{"id":"https://openalex.org/W4391876995","doi":"https://doi.org/10.1109/icaic60265.2024.10433845","title":"AI-Based Cybersecurity Policies and Procedures","display_name":"AI-Based Cybersecurity Policies and Procedures","publication_year":2024,"publication_date":"2024-02-07","ids":{"openalex":"https://openalex.org/W4391876995","doi":"https://doi.org/10.1109/icaic60265.2024.10433845"},"language":"en","primary_location":{"id":"doi:10.1109/icaic60265.2024.10433845","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icaic60265.2024.10433845","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112264613","display_name":"Shadi Jawhar","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Shadi Jawhar","raw_affiliation_strings":["Lionfish Cyber Security,Cyber Security Department,Fort Wayne,Indiana","Cyber Security Department, Lionfish Cyber Security, Fort Wayne, Indiana"],"affiliations":[{"raw_affiliation_string":"Lionfish Cyber Security,Cyber Security Department,Fort Wayne,Indiana","institution_ids":[]},{"raw_affiliation_string":"Cyber Security Department, Lionfish Cyber Security, Fort Wayne, Indiana","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004076257","display_name":"Jeremy A. Miller","orcid":"https://orcid.org/0000-0001-8918-9775"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jeremy Miller","raw_affiliation_strings":["Lionfish Cyber Security,Cyber Security Department,Westfield,Indiana","Cyber Security Department, Lionfish Cyber Security, Westfield, Indiana"],"affiliations":[{"raw_affiliation_string":"Lionfish Cyber Security,Cyber Security Department,Westfield,Indiana","institution_ids":[]},{"raw_affiliation_string":"Cyber Security Department, Lionfish Cyber Security, Westfield, Indiana","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033289993","display_name":"Zeina Bitar","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zeina Bitar","raw_affiliation_strings":["Lionfish Cyber Security,Research and Development,Ottawa,Canada","Research and Development, Lionfish Cyber Security, Ottawa, Canada"],"affiliations":[{"raw_affiliation_string":"Lionfish Cyber Security,Research and Development,Ottawa,Canada","institution_ids":[]},{"raw_affiliation_string":"Research and Development, Lionfish Cyber Security, Ottawa, Canada","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5112264613"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":7.254,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.96840722,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.727313220500946},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6512532830238342},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.32546716928482056}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.727313220500946},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6512532830238342},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.32546716928482056}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icaic60265.2024.10433845","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icaic60265.2024.10433845","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1922346655","https://openalex.org/W1971368595","https://openalex.org/W2036728771","https://openalex.org/W2087142541","https://openalex.org/W3004396001","https://openalex.org/W3036745110","https://openalex.org/W3214829562","https://openalex.org/W4285420639","https://openalex.org/W4312306882","https://openalex.org/W4318603189","https://openalex.org/W4380032449","https://openalex.org/W6783780438"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"The":[0],"use":[1,80],"of":[2,81,98,105,122,135],"artificial":[3],"intelligence":[4],"(AI)":[5,82],"in":[6,52,83,92,125,140],"cyber":[7,47],"security":[8,19],"[1]":[9,78],"has":[10,76],"proven":[11],"to":[12,35,38,50,65,145],"be":[13,90],"very":[14],"effective":[15],"as":[16,57,101],"it":[17],"helps":[18],"professionals":[20],"better":[21],"understand,":[22],"examine,":[23],"and":[24,28,41,54,56,74,87,96,112,144],"evaluate":[25],"possible":[26],"risks":[27],"mitigate":[29],"them.":[30],"It":[31],"also":[32],"provides":[33],"guidelines":[34],"implement":[36],"solutions":[37],"protect":[39],"assets":[40],"safeguard":[42],"the":[43,63,94,106,120,146],"technology":[44],"used.":[45],"As":[46],"threats":[48],"continue":[49],"evolve":[51],"complexity":[53],"scope,":[55],"international":[58],"standards":[59],"continuously":[60],"get":[61],"updated,":[62],"need":[64],"generate":[66],"new":[67],"policies":[68,86,100,142],"or":[69],"update":[70],"existing":[71],"ones":[72],"efficiently":[73],"easily":[75],"increased":[77],"[2].The":[79],"developing":[84],"cybersecurity":[85],"procedures":[88,129],"can":[89,138],"key":[91],"assuring":[93],"correctness":[95],"effectiveness":[97],"these":[99],"this":[102],"is":[103],"one":[104],"needs":[107],"for":[108],"both":[109],"private":[110],"organizations":[111],"governmental":[113],"agencies.":[114],"This":[115],"study":[116],"sheds":[117],"light":[118],"on":[119],"power":[121],"AI-driven":[123],"mechanisms":[124],"enhancing":[126],"digital":[127],"defense":[128],"by":[130],"providing":[131],"a":[132],"deep":[133],"implementation":[134],"how":[136],"AI":[137],"aid":[139],"generating":[141],"quickly":[143],"needed":[147],"level.":[148]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-12T08:34:05.389933","created_date":"2025-10-10T00:00:00"}
