{"id":"https://openalex.org/W2997294654","doi":"https://doi.org/10.1109/ithet46829.2019.8937373","title":"Curriculum for Hands-on Artificial Intelligence Cybersecurity","display_name":"Curriculum for Hands-on Artificial Intelligence Cybersecurity","publication_year":2019,"publication_date":"2019-09-01","ids":{"openalex":"https://openalex.org/W2997294654","doi":"https://doi.org/10.1109/ithet46829.2019.8937373","mag":"2997294654"},"language":"en","primary_location":{"id":"doi:10.1109/ithet46829.2019.8937373","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ithet46829.2019.8937373","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 18th International Conference on Information Technology Based Higher Education and Training (ITHET)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016784958","display_name":"Gordon W. Romney","orcid":"https://orcid.org/0009-0005-1361-7725"},"institutions":[{"id":"https://openalex.org/I160856358","display_name":"University of San Diego","ror":"https://ror.org/03jbbze48","country_code":"US","type":"education","lineage":["https://openalex.org/I160856358"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Gordon W. Romney","raw_affiliation_strings":["Center for Cyberscurity Engineering and Technology, University of San Diego, San Diego, CA, USA"],"affiliations":[{"raw_affiliation_string":"Center for Cyberscurity Engineering and Technology, University of San Diego, San Diego, CA, USA","institution_ids":["https://openalex.org/I160856358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078579231","display_name":"James Guymon","orcid":null},"institutions":[{"id":"https://openalex.org/I160856358","display_name":"University of San Diego","ror":"https://ror.org/03jbbze48","country_code":"US","type":"education","lineage":["https://openalex.org/I160856358"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"James Guymon","raw_affiliation_strings":["Center for Cyberscurity Engineering and Technology, University of San Diego, San Diego, CA, USA"],"affiliations":[{"raw_affiliation_string":"Center for Cyberscurity Engineering and Technology, University of San Diego, San Diego, CA, USA","institution_ids":["https://openalex.org/I160856358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031240065","display_name":"Miles David Romney","orcid":"https://orcid.org/0009-0008-6101-9107"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Miles D. Romney","raw_affiliation_strings":["eVisit Inc., Mesa, AZ, USA"],"affiliations":[{"raw_affiliation_string":"eVisit Inc., Mesa, AZ, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060474523","display_name":"Dennis A. Carlson","orcid":null},"institutions":[{"id":"https://openalex.org/I160856358","display_name":"University of San Diego","ror":"https://ror.org/03jbbze48","country_code":"US","type":"education","lineage":["https://openalex.org/I160856358"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dennis A. Carlson","raw_affiliation_strings":["Center for Cyberscurity Engineering and Technology, University of San Diego, San Diego, CA, USA"],"affiliations":[{"raw_affiliation_string":"Center for Cyberscurity Engineering and Technology, University of San Diego, San Diego, CA, USA","institution_ids":["https://openalex.org/I160856358"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5016784958"],"corresponding_institution_ids":["https://openalex.org/I160856358"],"apc_list":null,"apc_paid":null,"fwci":0.7074,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.74645346,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9886999726295471,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6632091999053955},{"id":"https://openalex.org/keywords/curriculum","display_name":"Curriculum","score":0.6369339823722839},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5506706237792969},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5018253326416016},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.06475657224655151}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6632091999053955},{"id":"https://openalex.org/C47177190","wikidata":"https://www.wikidata.org/wiki/Q207137","display_name":"Curriculum","level":2,"score":0.6369339823722839},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5506706237792969},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5018253326416016},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.06475657224655151},{"id":"https://openalex.org/C19417346","wikidata":"https://www.wikidata.org/wiki/Q7922","display_name":"Pedagogy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ithet46829.2019.8937373","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ithet46829.2019.8937373","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 18th International Conference on Information Technology Based Higher Education and Training (ITHET)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.46000000834465027,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W2136922672","https://openalex.org/W2334853001","https://openalex.org/W2625602624","https://openalex.org/W2884745705"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W4391913857","https://openalex.org/W2350741829","https://openalex.org/W2530322880"],"abstract_inverted_index":{"Interest":[0],"and":[1,14,94,123,129,156,182],"awareness":[2],"of":[3,24,31,97,131,191,202,208],"Artificial":[4],"Intelligence":[5],"(AI)":[6],"grows":[7],"at":[8],"such":[9],"a":[10,87,100,116,174,192,199],"rate":[11],"that":[12,29],"academia":[13],"higher":[15],"education":[16],"struggle":[17],"keeping":[18],"up":[19],"with":[20],"the":[21,50,81,111,127,154,188,209],"accelerating":[22],"demand":[23],"industry.":[25],"It":[26,171],"is":[27,147],"forecast":[28],"75%":[30],"enterprise":[32],"applications":[33],"will":[34],"use":[35],"AI,":[36],"Machine":[37],"Learning":[38,41],"or":[39],"Deep":[40],"technology":[42],"by":[43,161],"2021,":[44],"yet":[45],"university":[46],"programs":[47,78],"commonly":[48],"place":[49],"burden":[51],"on":[52,135,198],"students":[53,76,125,160],"to":[54,86,126,141],"obtain":[55],"their":[56],"data":[57,139,195,203],"science":[58,68,122,196],"educations":[59],"through":[60],"elective":[61],"coursework":[62],"spanning":[63],"multiple":[64],"disparate":[65],"departments.":[66],"Data":[67],"requires":[69],"specific":[70],"mathematics":[71,85],"preparation":[72],"especially":[73],"for":[74,83,159],"cybersecurity":[75,124,193],"whose":[77],"have":[79],"reduced":[80],"requirements":[82],"advance":[84],"bare":[88],"minimum.":[89],"To":[90],"facilitate":[91],"curricula":[92],"preparation,":[93],"hands-on":[95],"usage":[96],"AI":[98,106],"tools,":[99],"notebook":[101],"(\u201cA":[102],"Trellis":[103,152],"For":[104],"Novice":[105],"Practitioners\u201d)":[107],"was":[108],"prepared":[109],"in":[110,119,149,187,205],"R":[112],"programming":[113],"language":[114],"as":[115,173],"first":[117],"step":[118],"introducing":[120],"computer":[121],"concepts":[128],"capabilities":[130],"AI.":[132],"A":[133],"focus":[134],"an":[136,163],"intrusion":[137,166],"detection":[138],"set":[140],"mitigate":[142],"nine":[143],"common":[144],"cyber":[145],"vulnerabilities":[146],"used":[148],"this":[150],"analysis.":[151],"bridges":[153],"theoretical":[155],"practical":[157],"chasm":[158],"building":[162],"ANN":[164],"network":[165],"predictive":[167],"model":[168],"from":[169],"scratch.":[170],"serves":[172],"template":[175],"but":[176],"also":[177],"encourages":[178],"heavy":[179],"contextual":[180],"modification,":[181],"may":[183],"be":[184],"relied":[185],"upon":[186],"beginning":[189],"stages":[190],"practitioner's":[194],"activities":[197],"wide":[200],"variety":[201],"sets":[204],"all":[206],"areas":[207],"discipline.":[210]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
