Search dblp for Publications

export results for "stream:streams/conf/icaic2:"

 download as .bib file

@inproceedings{DBLP:conf/icaic2/AbiramiZS24,
  author       = {K. Rama Abirami and
                  Tiago Zonta and
                  Mithileysh Sathiyanarayanan},
  title        = {A Holistic Review on Detection of Malicious Browser Extensions and
                  Links using Deep Learning},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433842},
  doi          = {10.1109/ICAIC60265.2024.10433842},
  timestamp    = {Tue, 05 Mar 2024 21:04:39 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/AbiramiZS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/AhmadiN24,
  author       = {Mojtaba Ahmadi and
                  Reza Nourmohammadi},
  title        = {zkFDL: An efficient and privacy-preserving decentralized federated
                  learning with zero knowledge proof},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433831},
  doi          = {10.1109/ICAIC60265.2024.10433831},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/AhmadiN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/AzumahAEEO24,
  author       = {Sylvia Worlali Azumah and
                  Victor Adewopo and
                  Zag ElSayed and
                  Nelly Elsayed and
                  Murat Ozer},
  title        = {A Secure Open-Source Intelligence Framework For Cyberbullying Investigation},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433832},
  doi          = {10.1109/ICAIC60265.2024.10433832},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/AzumahAEEO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/ChauhanAJSSRV24,
  author       = {Aadi Chauhan and
                  Taran Anand and
                  Tanisha Jauhari and
                  Arjav Shah and
                  Rudransh Singh and
                  Arjun Rajaram and
                  Rithvik Vanga},
  title        = {Identifying Race and Gender Bias in Stable Diffusion {AI} Image Generation},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433840},
  doi          = {10.1109/ICAIC60265.2024.10433840},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/ChauhanAJSSRV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/ChuJG24,
  author       = {Wenhui Chu and
                  Aobo Jin and
                  Hardik A. Gohel},
  title        = {A Novel Deep Learning Method for Segmenting the Left Ventricle in
                  Cardiac Cine {MRI}},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433830},
  doi          = {10.1109/ICAIC60265.2024.10433830},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/ChuJG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/ChuJG24a,
  author       = {Wenhui Chu and
                  Aobo Jin and
                  Hardik A. Gohel},
  title        = {Simulations and Advancements in MRI-Guided Power-Driven Ferric Tools
                  for Wireless Therapeutic Interventions},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433835},
  doi          = {10.1109/ICAIC60265.2024.10433835},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/ChuJG24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/Chung24,
  author       = {Bryan Chung},
  title        = {Addressing Data Imbalance in Plant Disease Recognition through Contrastive
                  Learning},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433841},
  doi          = {10.1109/ICAIC60265.2024.10433841},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/Chung24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/FuhnwiRI24,
  author       = {Gerard Shu Fuhnwi and
                  Matthew Revelle and
                  Clemente Izurieta},
  title        = {Improving Network Intrusion Detection Performance : An Empirical Evaluation
                  Using Extreme Gradient Boosting (XGBoost) with Recursive Feature Elimination},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433805},
  doi          = {10.1109/ICAIC60265.2024.10433805},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/FuhnwiRI24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/GrimshawLPC24,
  author       = {Charlie Grimshaw and
                  Brian Lachine and
                  Taylor Perkins and
                  Emilie Coote},
  title        = {Link-based Anomaly Detection with Sysmon and Graph Neural Networks},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433846},
  doi          = {10.1109/ICAIC60265.2024.10433846},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/GrimshawLPC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/JamaliAR24,
  author       = {Ahamadali Jamali and
                  Shahin Alipour and
                  Audrey Rah},
  title        = {Leveraging Weak Supervision and BiGRU Neural Networks for Sentiment
                  Analysis on Label-Free News Headlines},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433844},
  doi          = {10.1109/ICAIC60265.2024.10433844},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/JamaliAR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/JawharMB24,
  author       = {Shadi Jawhar and
                  Jeremy R. Miller and
                  Zeina Bitar},
  title        = {AI-Driven Customized Cyber Security Training and Awareness},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433829},
  doi          = {10.1109/ICAIC60265.2024.10433829},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/JawharMB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/JawharMB24a,
  author       = {Shadi Jawhar and
                  Jeremy R. Miller and
                  Zeina Bitar},
  title        = {AI-Based Cybersecurity Policies and Procedures},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433845},
  doi          = {10.1109/ICAIC60265.2024.10433845},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/JawharMB24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/JeyarajSYJG24,
  author       = {Rathinaraja Jeyaraj and
                  Barathi Subramanian and
                  Karnam Yogesh and
                  Aobo Jin and
                  Hardik A. Gohel},
  title        = {{YSAF:} Yolo with Spatial Attention and {FFT} to Detect Face Spoofing
                  Attacks},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433802},
  doi          = {10.1109/ICAIC60265.2024.10433802},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/JeyarajSYJG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/Khoje24,
  author       = {Mandar Khoje},
  title        = {Navigating Data Privacy and Analytics: The Role of Large Language
                  Models in Masking conversational data in data platforms},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433801},
  doi          = {10.1109/ICAIC60265.2024.10433801},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/Khoje24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/KumarVSK24,
  author       = {Priyan Malarvizhi Kumar and
                  Kavya Vedantham and
                  Jeeva Selvaraj and
                  Balasubramanian Prabhu Kavin},
  title        = {Enhanced Network Intrusion Detection System Using PCGSO-Optimized
                  {BI-GRU} Model in AI-Driven Cybersecurity},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10443675},
  doi          = {10.1109/ICAIC60265.2024.10443675},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/KumarVSK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/KurniawanOM24,
  author       = {Ade Kurniawan and
                  Yuichi Ohsita and
                  Masayuki Murata},
  title        = {Toward robust systems against sensor-based adversarial examples based
                  on the criticalities of sensors},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433806},
  doi          = {10.1109/ICAIC60265.2024.10433806},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/KurniawanOM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/LessageCOLMM24,
  author       = {Xavier Lessage and
                  Leandro Collier and
                  Charles{-}Henry Bertrand Van Ouytsel and
                  Axel Legay and
                  Sa{\"{\i}}d Mahmoudi and
                  Philippe Massonet},
  title        = {Secure federated learning applied to medical imaging with fully homomorphic
                  encryption},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433836},
  doi          = {10.1109/ICAIC60265.2024.10433836},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/LessageCOLMM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/MaciTC24,
  author       = {Antonio Maci and
                  Nicola Tamma and
                  Antonio Coscia},
  title        = {Deep Reinforcement Learning-based Malicious {URL} Detection with Feature
                  Selection},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433827},
  doi          = {10.1109/ICAIC60265.2024.10433827},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/MaciTC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/MishraBMCGSSR24,
  author       = {Manit Mishra and
                  Abderrahman Braham and
                  Charles Marsom and
                  Bryan Chung and
                  Gavin Griffin and
                  Dakshesh Sidnerlikar and
                  Chatanya Sarin and
                  Arjun Rajaram},
  title        = {DataAgent: Evaluating Large Language Models' Ability to Answer Zero-Shot,
                  Natural Language Queries},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433803},
  doi          = {10.1109/ICAIC60265.2024.10433803},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/MishraBMCGSSR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/MutongiR24,
  author       = {Chipo Mutongi and
                  Billy Rigava},
  title        = {Robotics in Healthcare: The African Perspective},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433838},
  doi          = {10.1109/ICAIC60265.2024.10433838},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/MutongiR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/MutongiR24a,
  author       = {Chipo Mutongi and
                  Billy Rigava},
  title        = {The Application of the Fifth Discipline Strategies in the Learning
                  City Concept},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433847},
  doi          = {10.1109/ICAIC60265.2024.10433847},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/MutongiR24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/PatelYG24,
  author       = {Urjitkumar Patel and
                  Fang{-}Chun Yeh and
                  Chinmay Gondhalekar},
  title        = {{CANAL} - Cyber Activity News Alerting Language Model : Empirical
                  Approach vs. Expensive LLMs},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433839},
  doi          = {10.1109/ICAIC60265.2024.10433839},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/PatelYG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/PonnolyPD24,
  author       = {Joseph Ponnoly and
                  John Puthenveetil and
                  Patricia D'Urso},
  title        = {Prescriptive Analytics-based Robust Decision-Making Model for Cyber
                  Disaster Risk Reduction},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433837},
  doi          = {10.1109/ICAIC60265.2024.10433837},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/PonnolyPD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/PopoolaAFA24,
  author       = {Gideon Popoola and
                  Khadijat{-}Kuburat Abdullah and
                  Gerard Shu Fuhnwi and
                  Janet Agbaje},
  title        = {Sentiment Analysis of Financial News Data using {TF-IDF} and Machine
                  Learning Algorithms},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433843},
  doi          = {10.1109/ICAIC60265.2024.10433843},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/PopoolaAFA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/RavalAWG24,
  author       = {Maulin Raval and
                  Aobo Jin and
                  Yun Wan and
                  Hardik A. Gohel},
  title        = {Leveraging Advanced Visual Recognition Classifier For Pneumonia Prediction},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433800},
  doi          = {10.1109/ICAIC60265.2024.10433800},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/RavalAWG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/SardarHPSHDG24,
  author       = {Tanvir H. Sardar and
                  Ruhul Amin Hazarika and
                  Bishwajeet Pandey and
                  Guru Prasad M. S and
                  Sk Mahmudul Hassan and
                  Radhakrishna Dodmane and
                  Hardik A. Gohel},
  title        = {Video key concept extraction using Convolution Neural Network},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433799},
  doi          = {10.1109/ICAIC60265.2024.10433799},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/SardarHPSHDG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/SeilovPNAKZ24,
  author       = {Shakhmaran Seilov and
                  Bishwajeet Pandey and
                  Akniyet Nurzhaubayev and
                  Dias Abildinov and
                  Assem Konyrkhanova and
                  Bibinur Zhursinbek},
  title        = {Federated Learning Based Smart Horticulture and Smart Storage of Fruits
                  Using E-Nose, and Blockchain: {A} Proposed Model},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433834},
  doi          = {10.1109/ICAIC60265.2024.10433834},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/SeilovPNAKZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/ShahSS24,
  author       = {Trishla Shah and
                  Raghav V. Sampangi and
                  Angela A. Siegel},
  title        = {Risk-Aware Mobile App Security Testing: Safeguarding Sensitive User
                  Inputs},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433804},
  doi          = {10.1109/ICAIC60265.2024.10433804},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/ShahSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/ShahSS24a,
  author       = {Trishla Shah and
                  Raghav V. Sampangi and
                  Angela A. Siegel},
  title        = {Mobile Application Security Risk Score: {A} sensitive user input-based
                  approach},
  booktitle    = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024.10433828},
  doi          = {10.1109/ICAIC60265.2024.10433828},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/ShahSS24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icaic2/2024,
  title        = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC}
                  2024, Houston, TX, USA, February 7-9, 2024},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICAIC60265.2024},
  doi          = {10.1109/ICAIC60265.2024},
  isbn         = {979-8-3503-8185-6},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/2024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/Aditya23,
  author       = {Yashwant Aditya},
  title        = {Significance of artificial intelligence to deal with stress during
                  the organisational changes},
  booktitle    = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC}
                  2023, Houston, TX, USA, February 7-9, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICAIC57335.2023.10044168},
  doi          = {10.1109/ICAIC57335.2023.10044168},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/Aditya23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/Alandjani23,
  author       = {Gasim Othman Alandjani},
  title        = {Blockchain Technology and Impacts on Potential Industries},
  booktitle    = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC}
                  2023, Houston, TX, USA, February 7-9, 2023},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICAIC57335.2023.10044170},
  doi          = {10.1109/ICAIC57335.2023.10044170},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/Alandjani23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/AlmazroueiMHAA23,
  author       = {Omar Saif Musabbeh Bin Hamed Almazrouei and
                  Pritheega Magalingam and
                  Mohammad Kamrul Hasan and
                  Majed Almehrzi and
                  Ahmed Alshamsi},
  title        = {Penetration Testing for IoT Security: The Case Study of a Wireless
                  {IP} Security {CAM}},
  booktitle    = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC}
                  2023, Houston, TX, USA, February 7-9, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICAIC57335.2023.10044176},
  doi          = {10.1109/ICAIC57335.2023.10044176},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/AlmazroueiMHAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/AnaamGHAAM23,
  author       = {Elham Anaam and
                  Taher M. Ghazal and
                  Su{-}Cheng Haw and
                  Haitham M. Alzoubi and
                  Muhammad Turki Alshurideh and
                  Abdullah Al Mamun},
  title        = {Utilization of Blockchain Technology In Human Resource Management},
  booktitle    = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC}
                  2023, Houston, TX, USA, February 7-9, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICAIC57335.2023.10044181},
  doi          = {10.1109/ICAIC57335.2023.10044181},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/AnaamGHAAM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/AnaamHGHAA23,
  author       = {Elham Abdulwahab Anaam and
                  Mohammad Kamrul Hasan and
                  Taher M. Ghazal and
                  Su{-}Cheng Haw and
                  Haitham M. Alzoubi and
                  Muhammad Turki Alshurideh},
  title        = {How Private Blockchain Technology Secure IoT Data Record},
  booktitle    = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC}
                  2023, Houston, TX, USA, February 7-9, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICAIC57335.2023.10044178},
  doi          = {10.1109/ICAIC57335.2023.10044178},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/AnaamHGHAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/BarajasMLSMGEK23,
  author       = {Miguel A Barajas and
                  Michael P. Murphy and
                  Louis C. Lasseter and
                  Godspower I Sunny and
                  Hirak Mazumdar and
                  Hardik A. Gohel and
                  Hilary P. Emerson and
                  Daniel I. Kaplan},
  title        = {Seasonal Trend Assessment for Groundwater Contamination Detection
                  and Monitoring using {ARIMA} Model},
  booktitle    = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC}
                  2023, Houston, TX, USA, February 7-9, 2023},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICAIC57335.2023.10044126},
  doi          = {10.1109/ICAIC57335.2023.10044126},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/BarajasMLSMGEK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/BoikoKY23,
  author       = {Yuri B. Boiko and
                  Iluju Kiringa and
                  Tet Hin Yeap},
  title        = {Voltage hopping induced by bias injection attack against Kalman filter
                  of {BLDC} motor},
  booktitle    = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC}
                  2023, Houston, TX, USA, February 7-9, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICAIC57335.2023.10044123},
  doi          = {10.1109/ICAIC57335.2023.10044123},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/BoikoKY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/ChoiZSJ23,
  author       = {Daegil Choi and
                  Gengjia Zhang and
                  Siho Shin and
                  Jaehyo Jung},
  title        = {Decision Tree Algorithm for Depression Diagnosis from Facial Images},
  booktitle    = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC}
                  2023, Houston, TX, USA, February 7-9, 2023},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICAIC57335.2023.10044179},
  doi          = {10.1109/ICAIC57335.2023.10044179},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/ChoiZSJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/ElmutasimaMB23,
  author       = {Imadeldin Elsayed Elmutasima and
                  Izzeldin I. Mohd and
                  Khalid Hamid Bilal},
  title        = {Scrutinization of Saline Sea Utilizing a Water-Based Antenna for the
                  Radio Communications},
  booktitle    = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC}
                  2023, Houston, TX, USA, February 7-9, 2023},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICAIC57335.2023.10044124},
  doi          = {10.1109/ICAIC57335.2023.10044124},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/ElmutasimaMB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/Fadheel0A23,
  author       = {Wesam Fadheel and
                  Steve Carr and
                  Wassnaa Al{-}Mawee},
  title        = {On Phishing: Proposing a Traffic Behavior-Based Model to Detect, Prevent,
                  and Classify Webpage Suspicious and Malicious Activities},
  booktitle    = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC}
                  2023, Houston, TX, USA, February 7-9, 2023},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICAIC57335.2023.10044171},
  doi          = {10.1109/ICAIC57335.2023.10044171},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/Fadheel0A23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/HossainPT23,
  author       = {Ismail Hossain and
                  Sai Puppala and
                  Sajedul Talukder},
  title        = {Collaborative Differentially Private Federated Learning Framework
                  for the Prediction of Diabetic Retinopathy},
  booktitle    = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC}
                  2023, Houston, TX, USA, February 7-9, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICAIC57335.2023.10044122},
  doi          = {10.1109/ICAIC57335.2023.10044122},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icaic2/HossainPT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/MurphyMGEK23,
  author       = {Michael P. Murphy and
                  Hirak Mazumdar and
                  Hardik A. Gohel and
                  Hilary P. Emerson and
                  Daniel I. Kaplan},
  title        = {Long Short-Term Memory Networks for Monitoring Groundwater Contamination
                  at the Hanford Site},
  booktitle    = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC}
                  2023, Houston, TX, USA, February 7-9, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICAIC57335.2023.10044121},
  doi          = {10.1109/ICAIC57335.2023.10044121},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/MurphyMGEK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/NicesioLG23,
  author       = {Otavio Kiyatake Nicesio and
                  Adriano Galindo Leal and
                  Vagner Luiz Gava},
  title        = {Quantum Machine Learning for Network Intrusion Detection Systems,
                  a Systematic Literature Review},
  booktitle    = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC}
                  2023, Houston, TX, USA, February 7-9, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICAIC57335.2023.10044125},
  doi          = {10.1109/ICAIC57335.2023.10044125},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/NicesioLG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/OgundiranCYA23,
  author       = {Ayodeji Ogundiran and
                  Hongmei Chi and
                  Jie Yan and
                  Ruth Agada},
  title        = {A Framework to Reconstruct Digital Forensics Evidence via Goal-Oriented
                  Modeling},
  booktitle    = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC}
                  2023, Houston, TX, USA, February 7-9, 2023},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICAIC57335.2023.10044180},
  doi          = {10.1109/ICAIC57335.2023.10044180},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/OgundiranCYA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/PuppalaHT23,
  author       = {Sai Puppala and
                  Ismail Hossain and
                  Sajedul Talukder},
  title        = {Machine Learning and Sentiment Analysis for Predicting Environmental
                  Lead Toxicity in Children at the {ZIP} Code Level},
  booktitle    = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC}
                  2023, Houston, TX, USA, February 7-9, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICAIC57335.2023.10044177},
  doi          = {10.1109/ICAIC57335.2023.10044177},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icaic2/PuppalaHT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/ReddyRJSPGG23,
  author       = {Sangu Venkata Sai Harsith Reddy and
                  Gadhiraju Reddy Sekhar Raju and
                  Nookala Jayanth and
                  Malla Charan Sai and
                  Bishwajeet Pandey and
                  Geetha G. and
                  Hardik A. Gohel},
  title        = {Design of {QR} Based Smart Student Attendance System},
  booktitle    = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC}
                  2023, Houston, TX, USA, February 7-9, 2023},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICAIC57335.2023.10044175},
  doi          = {10.1109/ICAIC57335.2023.10044175},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/ReddyRJSPGG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/SainiKPG23,
  author       = {Jyoti Saini and
                  Keshav Kumar and
                  Bishwajeet Pandey and
                  Hardik A. Gohel},
  title        = {Detection of Cardiac Tumors Using Parallel Computing},
  booktitle    = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC}
                  2023, Houston, TX, USA, February 7-9, 2023},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICAIC57335.2023.10044174},
  doi          = {10.1109/ICAIC57335.2023.10044174},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/SainiKPG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/SharmaK23,
  author       = {Monika Sharma and
                  Ajay Kaul},
  title        = {Suspicious Permissions Detection of Covid-19 Themed Malicious Android
                  Applications},
  booktitle    = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC}
                  2023, Houston, TX, USA, February 7-9, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICAIC57335.2023.10044167},
  doi          = {10.1109/ICAIC57335.2023.10044167},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/SharmaK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/SmithK023,
  author       = {Daryle Smith and
                  Sajad Khorsandroo and
                  Kaushik Roy},
  title        = {Supervised and Unsupervised Learning Techniques Utilizing Malware
                  Datasets},
  booktitle    = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC}
                  2023, Houston, TX, USA, February 7-9, 2023},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICAIC57335.2023.10044169},
  doi          = {10.1109/ICAIC57335.2023.10044169},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/SmithK023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/SuNP23,
  author       = {Jing Su and
                  Suku Nair and
                  Leo Popokh},
  title        = {EdgeGym: {A} Reinforcement Learning Environment for Constraint-Aware
                  {NFV} Resource Allocation},
  booktitle    = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC}
                  2023, Houston, TX, USA, February 7-9, 2023},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICAIC57335.2023.10044182},
  doi          = {10.1109/ICAIC57335.2023.10044182},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/SuNP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/ZhangCSJ23,
  author       = {Gengjia Zhang and
                  Daegil Choi and
                  Siho Shin and
                  Jaehyo Jung},
  title        = {Cuff-less blood pressure estimation from {ECG} and {PPG} using {CNN-LSTM}
                  algorithms},
  booktitle    = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC}
                  2023, Houston, TX, USA, February 7-9, 2023},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICAIC57335.2023.10044172},
  doi          = {10.1109/ICAIC57335.2023.10044172},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/ZhangCSJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/ZhuLT23,
  author       = {Guanhua Zhu and
                  Xiaofan Liu and
                  Lizhe Tan},
  title        = {Bearing Fault Diagnosis Based on Sparse Wavelet Decomposition and
                  Sparse Graph Connection Using GraphSAGE},
  booktitle    = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC}
                  2023, Houston, TX, USA, February 7-9, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICAIC57335.2023.10044173},
  doi          = {10.1109/ICAIC57335.2023.10044173},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/ZhuLT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icaic2/2023,
  title        = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC}
                  2023, Houston, TX, USA, February 7-9, 2023},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICAIC57335.2023},
  doi          = {10.1109/ICAIC57335.2023},
  isbn         = {979-8-3503-9696-6},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/AikinsJG22,
  author       = {Godwyll Aikins and
                  Sagar Jagtap and
                  Weinan Gao},
  title        = {Resilience Analysis of Deep Q-Learning Algorithms in Driving Simulations
                  Against Cyberattacks},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9896968},
  doi          = {10.1109/ICAIC53980.2022.9896968},
  timestamp    = {Tue, 16 Jan 2024 16:21:30 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/AikinsJG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/AlzoubiGHAKAI22,
  author       = {Haitham M. Alzoubi and
                  Taher M. Ghazal and
                  Mohammad Kamrul Hasan and
                  Asma Alketbi and
                  Rukshanda Kamran and
                  Nidal A. Al{-}Dmour and
                  Shayla Islam},
  title        = {Cyber Security Threats on Digital Banking},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9896966},
  doi          = {10.1109/ICAIC53980.2022.9896966},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/AlzoubiGHAKAI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/AtanasioSI22,
  author       = {M. Atanasio and
                  Abdul Samad Shibghatullah and
                  Shayla Islam},
  title        = {Developing {A} Mobile Application for Fleet Vehicle Tracking},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9897024},
  doi          = {10.1109/ICAIC53980.2022.9897024},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/AtanasioSI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/AvomoSS22,
  author       = {Salomon Ebi Esono Avomo and
                  Abdul Samad Shibghatullah and
                  Joseph Ng Poh Soon},
  title        = {Online Booking Sports Facilities in the Republic of Equatorial Guinea},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9897020},
  doi          = {10.1109/ICAIC53980.2022.9897020},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/AvomoSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/Biswas22,
  author       = {Sayan Biswas},
  title        = {Stock Price Prediction using Bidirectional {LSTM} with Attention},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9896969},
  doi          = {10.1109/ICAIC53980.2022.9896969},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/Biswas22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/FarrellY022,
  author       = {Richard Farrell and
                  Xiaohong Yuan and
                  Kaushik Roy},
  title        = {IoT to Structured Data (IoT2SD): {A} Big Data Information Extraction
                  Framework},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9897030},
  doi          = {10.1109/ICAIC53980.2022.9897030},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/FarrellY022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/FarukTTSS22,
  author       = {Md. Jobair Hossain Faruk and
                  Sharaban Tahora and
                  Masrura Tasnim and
                  Hossain Shahriar and
                  Nazmus Sakib},
  title        = {A Review of Quantum Cybersecurity: Threats, Risks and Opportunities},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9896970},
  doi          = {10.1109/ICAIC53980.2022.9896970},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/FarukTTSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/GhazalHAHAIKM22,
  author       = {Taher M. Ghazal and
                  Mohammad Kamrul Hasan and
                  Haitham M. Alzoubi and
                  Mohammed Al Hmmadi and
                  Nidal A. Al{-}Dmour and
                  Shayla Islam and
                  Rukshanda Kamran and
                  Beenu Mago},
  title        = {Securing Smart Cities Using Blockchain Technology},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9896971},
  doi          = {10.1109/ICAIC53980.2022.9896971},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/GhazalHAHAIKM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/GhazalHZAAI22,
  author       = {Taher M. Ghazal and
                  Mohammad Kamrul Hasan and
                  Raed Abu Zitar and
                  Nidal A. Al{-}Dmour and
                  Waleed T. Al{-}Sit and
                  Shayla Islam},
  title        = {Cybers Security Analysis and Measurement Tools Using Machine Learning
                  Approach},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9897045},
  doi          = {10.1109/ICAIC53980.2022.9897045},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/GhazalHZAAI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/GyamfiCG22,
  author       = {Nana Kwame Gyamfi and
                  Dainius Ceponis and
                  Nikolaj Goranin},
  title        = {Automated System-Level Anomaly Detection and Classification Using
                  Modified Random Forest},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9897027},
  doi          = {10.1109/ICAIC53980.2022.9897027},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/GyamfiCG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/HanifMHHHH22,
  author       = {Salman Hanif and
                  Dong Mu and
                  Noman Hanif and
                  Sana Hanif and
                  Tayyaba Hanif and
                  Omer Hanif},
  title        = {The Dynamic Influence of {ICT} on Modern Logistic Industry in Developing
                  Economy and {CO2} Emission Using {ARDL} Approach: {A} Case of Pakistan},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9896961},
  doi          = {10.1109/ICAIC53980.2022.9896961},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/HanifMHHHH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/KeoyKCHLT22,
  author       = {Kay Hooi Keoy and
                  Yung Jing Koh and
                  Su Mon Chit and
                  Khalid Hafeez and
                  Luqman Lee and
                  Chee Ling Thong},
  title        = {Impact of Assisted Technological Enablement on Entrepreneurial Success
                  among Malaysian Higher Education Students},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9897019},
  doi          = {10.1109/ICAIC53980.2022.9897019},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/KeoyKCHLT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/LeeTC22,
  author       = {Joon Sern Lee and
                  Kai Keng Tay and
                  Zong Fu Chua},
  title        = {BinImg2Vec: Augmenting Malware Binary Image Classification with Data2Vec},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9897062},
  doi          = {10.1109/ICAIC53980.2022.9897062},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/LeeTC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/MalikKK22,
  author       = {Muhammad Zain Malik and
                  Sulaiman Khan and
                  Habib Ullah Khan},
  title        = {Transforming the competencies of Artificial Intelligence to ensure
                  the Cyber Threats: {A} Systemic Literture Review of Busniess Sectors},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9897051},
  doi          = {10.1109/ICAIC53980.2022.9897051},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/MalikKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/MazumdarITK22,
  author       = {Adnan Tajul Islam Mazumdar and
                  Shayla Islam and
                  Chee Ling Thong and
                  Kay Hooi Keoy},
  title        = {NFC-based Mobile Application for Student Attendance in Institution
                  of Higher Learning},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9896975},
  doi          = {10.1109/ICAIC53980.2022.9896975},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/MazumdarITK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/PandeyKBGKS22,
  author       = {Bishwajeet Pandey and
                  Tanisq Kala and
                  Naman Bhoj and
                  Hardik A. Gohel and
                  Abhay Kumar and
                  P. Sivaram},
  title        = {Effective Identification of Spam Jobs Postings Using Employer Defined
                  Linguistic Feature},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9897059},
  doi          = {10.1109/ICAIC53980.2022.9897059},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/PandeyKBGKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/ShahHI0GK22,
  author       = {Rajeev Kumar Shah and
                  Mohammad Kamrul Hasan and
                  Shayla Islam and
                  Asif Khan and
                  Taher M. Ghazal and
                  Ahmad Neyaz Khan},
  title        = {Detect Phishing Website by Fuzzy Multi-Criteria Decision Making},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9897036},
  doi          = {10.1109/ICAIC53980.2022.9897036},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/ShahHI0GK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/ShahYT22,
  author       = {Sandeep Shah and
                  Xiaohong Yuan and
                  Zanetta Tyler},
  title        = {An Analysis of {COVID-19} related Twitter Data for Asian Hate Speech
                  Using Machine Learning Algorithms},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9896967},
  doi          = {10.1109/ICAIC53980.2022.9896967},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/ShahYT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/SumnerXY22,
  author       = {Alex Sumner and
                  Jinsheng Xu and
                  Xiaohong Yuan},
  title        = {Determining Phishing Emails using {URL} Domain Features},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9897038},
  doi          = {10.1109/ICAIC53980.2022.9897038},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/SumnerXY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/TongSS22,
  author       = {Ng Shao Tong and
                  Abdul Samad Shibghatullah and
                  Kasthuri Subaramaniam},
  title        = {An Online Seafood Store Management System in Malaysia},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9897021},
  doi          = {10.1109/ICAIC53980.2022.9897021},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/TongSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/UticR22,
  author       = {Zheni Utic and
                  Kandethody Ramachandran},
  title        = {A Survey of Reinforcement Learning in Intrusion Detection},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9897058},
  doi          = {10.1109/ICAIC53980.2022.9897058},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/UticR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/YengFYY22,
  author       = {Prosper Kandabongee Yeng and
                  Muhammad Ali Fauzi and
                  Bian Yang and
                  Sule Yildirim Yayilgan},
  title        = {Analysing digital evidence towards enhancing healthcare security practice:
                  The {KID} model},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9897055},
  doi          = {10.1109/ICAIC53980.2022.9897055},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/YengFYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icaic2/2022,
  title        = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022},
  doi          = {10.1109/ICAIC53980.2022},
  isbn         = {978-1-6654-0043-5},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics