Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/icaic2/icaic2024.bht:"
@inproceedings{DBLP:conf/icaic2/AbiramiZS24, author = {K. Rama Abirami and Tiago Zonta and Mithileysh Sathiyanarayanan}, title = {A Holistic Review on Detection of Malicious Browser Extensions and Links using Deep Learning}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433842}, doi = {10.1109/ICAIC60265.2024.10433842}, timestamp = {Tue, 05 Mar 2024 21:04:39 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/AbiramiZS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/AhmadiN24, author = {Mojtaba Ahmadi and Reza Nourmohammadi}, title = {zkFDL: An efficient and privacy-preserving decentralized federated learning with zero knowledge proof}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--10}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433831}, doi = {10.1109/ICAIC60265.2024.10433831}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/AhmadiN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/AzumahAEEO24, author = {Sylvia Worlali Azumah and Victor Adewopo and Zag ElSayed and Nelly Elsayed and Murat Ozer}, title = {A Secure Open-Source Intelligence Framework For Cyberbullying Investigation}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--8}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433832}, doi = {10.1109/ICAIC60265.2024.10433832}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/AzumahAEEO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/ChauhanAJSSRV24, author = {Aadi Chauhan and Taran Anand and Tanisha Jauhari and Arjav Shah and Rudransh Singh and Arjun Rajaram and Rithvik Vanga}, title = {Identifying Race and Gender Bias in Stable Diffusion {AI} Image Generation}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433840}, doi = {10.1109/ICAIC60265.2024.10433840}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/ChauhanAJSSRV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/ChuJG24, author = {Wenhui Chu and Aobo Jin and Hardik A. Gohel}, title = {A Novel Deep Learning Method for Segmenting the Left Ventricle in Cardiac Cine {MRI}}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--9}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433830}, doi = {10.1109/ICAIC60265.2024.10433830}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/ChuJG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/ChuJG24a, author = {Wenhui Chu and Aobo Jin and Hardik A. Gohel}, title = {Simulations and Advancements in MRI-Guided Power-Driven Ferric Tools for Wireless Therapeutic Interventions}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--10}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433835}, doi = {10.1109/ICAIC60265.2024.10433835}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/ChuJG24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/Chung24, author = {Bryan Chung}, title = {Addressing Data Imbalance in Plant Disease Recognition through Contrastive Learning}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433841}, doi = {10.1109/ICAIC60265.2024.10433841}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/Chung24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/FuhnwiRI24, author = {Gerard Shu Fuhnwi and Matthew Revelle and Clemente Izurieta}, title = {Improving Network Intrusion Detection Performance : An Empirical Evaluation Using Extreme Gradient Boosting (XGBoost) with Recursive Feature Elimination}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--8}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433805}, doi = {10.1109/ICAIC60265.2024.10433805}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/FuhnwiRI24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/GrimshawLPC24, author = {Charlie Grimshaw and Brian Lachine and Taylor Perkins and Emilie Coote}, title = {Link-based Anomaly Detection with Sysmon and Graph Neural Networks}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433846}, doi = {10.1109/ICAIC60265.2024.10433846}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/GrimshawLPC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/JamaliAR24, author = {Ahamadali Jamali and Shahin Alipour and Audrey Rah}, title = {Leveraging Weak Supervision and BiGRU Neural Networks for Sentiment Analysis on Label-Free News Headlines}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--5}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433844}, doi = {10.1109/ICAIC60265.2024.10433844}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/JamaliAR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/JawharMB24, author = {Shadi Jawhar and Jeremy R. Miller and Zeina Bitar}, title = {AI-Driven Customized Cyber Security Training and Awareness}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--5}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433829}, doi = {10.1109/ICAIC60265.2024.10433829}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/JawharMB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/JawharMB24a, author = {Shadi Jawhar and Jeremy R. Miller and Zeina Bitar}, title = {AI-Based Cybersecurity Policies and Procedures}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--5}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433845}, doi = {10.1109/ICAIC60265.2024.10433845}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/JawharMB24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/JeyarajSYJG24, author = {Rathinaraja Jeyaraj and Barathi Subramanian and Karnam Yogesh and Aobo Jin and Hardik A. Gohel}, title = {{YSAF:} Yolo with Spatial Attention and {FFT} to Detect Face Spoofing Attacks}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433802}, doi = {10.1109/ICAIC60265.2024.10433802}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/JeyarajSYJG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/Khoje24, author = {Mandar Khoje}, title = {Navigating Data Privacy and Analytics: The Role of Large Language Models in Masking conversational data in data platforms}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--5}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433801}, doi = {10.1109/ICAIC60265.2024.10433801}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/Khoje24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/KumarVSK24, author = {Priyan Malarvizhi Kumar and Kavya Vedantham and Jeeva Selvaraj and Balasubramanian Prabhu Kavin}, title = {Enhanced Network Intrusion Detection System Using PCGSO-Optimized {BI-GRU} Model in AI-Driven Cybersecurity}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10443675}, doi = {10.1109/ICAIC60265.2024.10443675}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/KumarVSK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/KurniawanOM24, author = {Ade Kurniawan and Yuichi Ohsita and Masayuki Murata}, title = {Toward robust systems against sensor-based adversarial examples based on the criticalities of sensors}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--5}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433806}, doi = {10.1109/ICAIC60265.2024.10433806}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/KurniawanOM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/LessageCOLMM24, author = {Xavier Lessage and Leandro Collier and Charles{-}Henry Bertrand Van Ouytsel and Axel Legay and Sa{\"{\i}}d Mahmoudi and Philippe Massonet}, title = {Secure federated learning applied to medical imaging with fully homomorphic encryption}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--12}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433836}, doi = {10.1109/ICAIC60265.2024.10433836}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/LessageCOLMM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/MaciTC24, author = {Antonio Maci and Nicola Tamma and Antonio Coscia}, title = {Deep Reinforcement Learning-based Malicious {URL} Detection with Feature Selection}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--7}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433827}, doi = {10.1109/ICAIC60265.2024.10433827}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/MaciTC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/MishraBMCGSSR24, author = {Manit Mishra and Abderrahman Braham and Charles Marsom and Bryan Chung and Gavin Griffin and Dakshesh Sidnerlikar and Chatanya Sarin and Arjun Rajaram}, title = {DataAgent: Evaluating Large Language Models' Ability to Answer Zero-Shot, Natural Language Queries}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--5}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433803}, doi = {10.1109/ICAIC60265.2024.10433803}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/MishraBMCGSSR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/MutongiR24, author = {Chipo Mutongi and Billy Rigava}, title = {Robotics in Healthcare: The African Perspective}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--10}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433838}, doi = {10.1109/ICAIC60265.2024.10433838}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/MutongiR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/MutongiR24a, author = {Chipo Mutongi and Billy Rigava}, title = {The Application of the Fifth Discipline Strategies in the Learning City Concept}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--7}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433847}, doi = {10.1109/ICAIC60265.2024.10433847}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/MutongiR24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/PatelYG24, author = {Urjitkumar Patel and Fang{-}Chun Yeh and Chinmay Gondhalekar}, title = {{CANAL} - Cyber Activity News Alerting Language Model : Empirical Approach vs. Expensive LLMs}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--12}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433839}, doi = {10.1109/ICAIC60265.2024.10433839}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/PatelYG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/PonnolyPD24, author = {Joseph Ponnoly and John Puthenveetil and Patricia D'Urso}, title = {Prescriptive Analytics-based Robust Decision-Making Model for Cyber Disaster Risk Reduction}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--5}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433837}, doi = {10.1109/ICAIC60265.2024.10433837}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/PonnolyPD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/PopoolaAFA24, author = {Gideon Popoola and Khadijat{-}Kuburat Abdullah and Gerard Shu Fuhnwi and Janet Agbaje}, title = {Sentiment Analysis of Financial News Data using {TF-IDF} and Machine Learning Algorithms}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433843}, doi = {10.1109/ICAIC60265.2024.10433843}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/PopoolaAFA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/RavalAWG24, author = {Maulin Raval and Aobo Jin and Yun Wan and Hardik A. Gohel}, title = {Leveraging Advanced Visual Recognition Classifier For Pneumonia Prediction}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--8}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433800}, doi = {10.1109/ICAIC60265.2024.10433800}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/RavalAWG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/SardarHPSHDG24, author = {Tanvir H. Sardar and Ruhul Amin Hazarika and Bishwajeet Pandey and Guru Prasad M. S and Sk Mahmudul Hassan and Radhakrishna Dodmane and Hardik A. Gohel}, title = {Video key concept extraction using Convolution Neural Network}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433799}, doi = {10.1109/ICAIC60265.2024.10433799}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/SardarHPSHDG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/SeilovPNAKZ24, author = {Shakhmaran Seilov and Bishwajeet Pandey and Akniyet Nurzhaubayev and Dias Abildinov and Assem Konyrkhanova and Bibinur Zhursinbek}, title = {Federated Learning Based Smart Horticulture and Smart Storage of Fruits Using E-Nose, and Blockchain: {A} Proposed Model}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--5}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433834}, doi = {10.1109/ICAIC60265.2024.10433834}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/SeilovPNAKZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/ShahSS24, author = {Trishla Shah and Raghav V. Sampangi and Angela A. Siegel}, title = {Risk-Aware Mobile App Security Testing: Safeguarding Sensitive User Inputs}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--8}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433804}, doi = {10.1109/ICAIC60265.2024.10433804}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/ShahSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/ShahSS24a, author = {Trishla Shah and Raghav V. Sampangi and Angela A. Siegel}, title = {Mobile Application Security Risk Score: {A} sensitive user input-based approach}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--10}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433828}, doi = {10.1109/ICAIC60265.2024.10433828}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/ShahSS24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icaic2/2024, title = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024}, doi = {10.1109/ICAIC60265.2024}, isbn = {979-8-3503-8185-6}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.