{"id":"https://openalex.org/W4404031434","doi":"https://doi.org/10.1109/icccnt61001.2024.10724084","title":"Artificial Intelligence in Cybersecurity: A Review of Solutions for APT-Exploited Vulnerabilities","display_name":"Artificial Intelligence in Cybersecurity: A Review of Solutions for APT-Exploited Vulnerabilities","publication_year":2024,"publication_date":"2024-06-24","ids":{"openalex":"https://openalex.org/W4404031434","doi":"https://doi.org/10.1109/icccnt61001.2024.10724084"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt61001.2024.10724084","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt61001.2024.10724084","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069813052","display_name":"Nachaat Mohamed","orcid":"https://orcid.org/0000-0002-4202-1294"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Nachaat Mohamed","raw_affiliation_strings":["Rabdan Academy,Homeland Ssecurity Department,Abu Dhabi,UAE"],"affiliations":[{"raw_affiliation_string":"Rabdan Academy,Homeland Ssecurity Department,Abu Dhabi,UAE","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5069813052"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.4653,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.83971573,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9778000116348267,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9778000116348267,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9322999715805054,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7079188227653503},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5974313020706177}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7079188227653503},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5974313020706177}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt61001.2024.10724084","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt61001.2024.10724084","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W2513712568","https://openalex.org/W2803831611","https://openalex.org/W2908954810","https://openalex.org/W2910711617","https://openalex.org/W3001275383","https://openalex.org/W3006097693","https://openalex.org/W3006249124","https://openalex.org/W3011381062","https://openalex.org/W3043610783","https://openalex.org/W3109725889","https://openalex.org/W3120438935","https://openalex.org/W3120450676","https://openalex.org/W3136638767","https://openalex.org/W3149084432","https://openalex.org/W3167089406","https://openalex.org/W3206160551","https://openalex.org/W4210434788","https://openalex.org/W4243826588","https://openalex.org/W4294068459","https://openalex.org/W4298000954","https://openalex.org/W4313331425","https://openalex.org/W4316658374","https://openalex.org/W4321510782","https://openalex.org/W4327499880","https://openalex.org/W4362474252","https://openalex.org/W4367180404","https://openalex.org/W4377704022","https://openalex.org/W4383333925","https://openalex.org/W4383878446","https://openalex.org/W4385190251","https://openalex.org/W4385192756","https://openalex.org/W4385192927","https://openalex.org/W4385193072","https://openalex.org/W4386425599"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"This":[0,83],"review":[1],"paper":[2,84],"provides":[3],"a":[4,28],"thorough":[5],"examination":[6],"of":[7,10,93],"the":[8,91,98],"role":[9],"Artificial":[11],"Intelligence":[12],"(AI)":[13],"in":[14,106],"countering":[15],"vulnerabilities":[16],"that":[17],"Advanced":[18],"Persistent":[19],"Threats":[20],"(APTs)":[21],"exploit":[22],"within":[23],"cybersecurity":[24],"frameworks.":[25],"APTs":[26],"pose":[27],"critical":[29],"and":[30,43,45,66,77,102],"growing":[31],"challenge,":[32],"often":[33],"outpacing":[34],"traditional":[35],"security":[36],"measures":[37],"like":[38],"Intrusion":[39],"Detection":[40],"Systems":[41],"(IDSs)":[42],"User":[44],"Entity":[46],"Behavior":[47],"Analytics":[48],"(UEBA).":[49],"By":[50],"analyzing":[51],"30":[52],"scholarly":[53],"articles,":[54],"we":[55],"delve":[56],"into":[57,95],"various":[58],"AI-powered":[59],"approaches,":[60],"particularly":[61],"focusing":[62],"on":[63,90],"machine":[64],"learning":[65,68],"deep":[67],"techniques,":[69],"which":[70],"have":[71],"been":[72],"employed":[73],"to":[74,86],"effectively":[75],"detect":[76],"neutralize":[78],"risks":[79],"associated":[80],"with":[81],"APTs.":[82],"aims":[85],"offer":[87],"insightful":[88],"perspectives":[89],"integration":[92],"AI":[94],"cybersecurity,":[96],"detailing":[97],"successes,":[99],"ongoing":[100],"challenges,":[101],"potential":[103],"future":[104],"directions":[105],"this":[107],"dynamic":[108],"field.":[109]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
