default search action
Search dblp for Publications
export results for "stream:conf/icaic2:"
@inproceedings{DBLP:conf/icaic2/AbiramiZS24, author = {K. Rama Abirami and Tiago Zonta and Mithileysh Sathiyanarayanan}, title = {A Holistic Review on Detection of Malicious Browser Extensions and Links using Deep Learning}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433842}, doi = {10.1109/ICAIC60265.2024.10433842}, timestamp = {Tue, 05 Mar 2024 21:04:39 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/AbiramiZS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/AhmadiN24, author = {Mojtaba Ahmadi and Reza Nourmohammadi}, title = {zkFDL: An efficient and privacy-preserving decentralized federated learning with zero knowledge proof}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--10}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433831}, doi = {10.1109/ICAIC60265.2024.10433831}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/AhmadiN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/AzumahAEEO24, author = {Sylvia Worlali Azumah and Victor Adewopo and Zag ElSayed and Nelly Elsayed and Murat Ozer}, title = {A Secure Open-Source Intelligence Framework For Cyberbullying Investigation}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--8}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433832}, doi = {10.1109/ICAIC60265.2024.10433832}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/AzumahAEEO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/ChauhanAJSSRV24, author = {Aadi Chauhan and Taran Anand and Tanisha Jauhari and Arjav Shah and Rudransh Singh and Arjun Rajaram and Rithvik Vanga}, title = {Identifying Race and Gender Bias in Stable Diffusion {AI} Image Generation}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433840}, doi = {10.1109/ICAIC60265.2024.10433840}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/ChauhanAJSSRV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/ChuJG24, author = {Wenhui Chu and Aobo Jin and Hardik A. Gohel}, title = {A Novel Deep Learning Method for Segmenting the Left Ventricle in Cardiac Cine {MRI}}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--9}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433830}, doi = {10.1109/ICAIC60265.2024.10433830}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/ChuJG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/ChuJG24a, author = {Wenhui Chu and Aobo Jin and Hardik A. Gohel}, title = {Simulations and Advancements in MRI-Guided Power-Driven Ferric Tools for Wireless Therapeutic Interventions}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--10}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433835}, doi = {10.1109/ICAIC60265.2024.10433835}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/ChuJG24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/Chung24, author = {Bryan Chung}, title = {Addressing Data Imbalance in Plant Disease Recognition through Contrastive Learning}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433841}, doi = {10.1109/ICAIC60265.2024.10433841}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/Chung24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/FuhnwiRI24, author = {Gerard Shu Fuhnwi and Matthew Revelle and Clemente Izurieta}, title = {Improving Network Intrusion Detection Performance : An Empirical Evaluation Using Extreme Gradient Boosting (XGBoost) with Recursive Feature Elimination}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--8}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433805}, doi = {10.1109/ICAIC60265.2024.10433805}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icaic2/FuhnwiRI24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/GrimshawLPC24, author = {Charlie Grimshaw and Brian Lachine and Taylor Perkins and Emilie Coote}, title = {Link-based Anomaly Detection with Sysmon and Graph Neural Networks}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433846}, doi = {10.1109/ICAIC60265.2024.10433846}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/GrimshawLPC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/JamaliAR24, author = {Ahamadali Jamali and Shahin Alipour and Audrey Rah}, title = {Leveraging Weak Supervision and BiGRU Neural Networks for Sentiment Analysis on Label-Free News Headlines}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--5}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433844}, doi = {10.1109/ICAIC60265.2024.10433844}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icaic2/JamaliAR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/JawharMB24, author = {Shadi Jawhar and Jeremy R. Miller and Zeina Bitar}, title = {AI-Driven Customized Cyber Security Training and Awareness}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--5}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433829}, doi = {10.1109/ICAIC60265.2024.10433829}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/JawharMB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/JawharMB24a, author = {Shadi Jawhar and Jeremy R. Miller and Zeina Bitar}, title = {AI-Based Cybersecurity Policies and Procedures}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--5}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433845}, doi = {10.1109/ICAIC60265.2024.10433845}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/JawharMB24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/JeyarajSYJG24, author = {Rathinaraja Jeyaraj and Barathi Subramanian and Karnam Yogesh and Aobo Jin and Hardik A. Gohel}, title = {{YSAF:} Yolo with Spatial Attention and {FFT} to Detect Face Spoofing Attacks}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433802}, doi = {10.1109/ICAIC60265.2024.10433802}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/JeyarajSYJG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/Khoje24, author = {Mandar Khoje}, title = {Navigating Data Privacy and Analytics: The Role of Large Language Models in Masking conversational data in data platforms}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--5}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433801}, doi = {10.1109/ICAIC60265.2024.10433801}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icaic2/Khoje24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/KumarVSK24, author = {Priyan Malarvizhi Kumar and Kavya Vedantham and Jeeva Selvaraj and Balasubramanian Prabhu Kavin}, title = {Enhanced Network Intrusion Detection System Using PCGSO-Optimized {BI-GRU} Model in AI-Driven Cybersecurity}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10443675}, doi = {10.1109/ICAIC60265.2024.10443675}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icaic2/KumarVSK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/KurniawanOM24, author = {Ade Kurniawan and Yuichi Ohsita and Masayuki Murata}, title = {Toward robust systems against sensor-based adversarial examples based on the criticalities of sensors}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--5}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433806}, doi = {10.1109/ICAIC60265.2024.10433806}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/KurniawanOM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/LessageCOLMM24, author = {Xavier Lessage and Leandro Collier and Charles{-}Henry Bertrand Van Ouytsel and Axel Legay and Sa{\"{\i}}d Mahmoudi and Philippe Massonet}, title = {Secure federated learning applied to medical imaging with fully homomorphic encryption}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--12}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433836}, doi = {10.1109/ICAIC60265.2024.10433836}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/LessageCOLMM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/MaciTC24, author = {Antonio Maci and Nicola Tamma and Antonio Coscia}, title = {Deep Reinforcement Learning-based Malicious {URL} Detection with Feature Selection}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--7}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433827}, doi = {10.1109/ICAIC60265.2024.10433827}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/MaciTC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/MishraBMCGSSR24, author = {Manit Mishra and Abderrahman Braham and Charles Marsom and Bryan Chung and Gavin Griffin and Dakshesh Sidnerlikar and Chatanya Sarin and Arjun Rajaram}, title = {DataAgent: Evaluating Large Language Models' Ability to Answer Zero-Shot, Natural Language Queries}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--5}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433803}, doi = {10.1109/ICAIC60265.2024.10433803}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/MishraBMCGSSR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/MutongiR24, author = {Chipo Mutongi and Billy Rigava}, title = {Robotics in Healthcare: The African Perspective}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--10}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433838}, doi = {10.1109/ICAIC60265.2024.10433838}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/MutongiR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/MutongiR24a, author = {Chipo Mutongi and Billy Rigava}, title = {The Application of the Fifth Discipline Strategies in the Learning City Concept}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--7}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433847}, doi = {10.1109/ICAIC60265.2024.10433847}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/MutongiR24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/PatelYG24, author = {Urjitkumar Patel and Fang{-}Chun Yeh and Chinmay Gondhalekar}, title = {{CANAL} - Cyber Activity News Alerting Language Model : Empirical Approach vs. Expensive LLMs}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--12}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433839}, doi = {10.1109/ICAIC60265.2024.10433839}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/PatelYG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/PonnolyPD24, author = {Joseph Ponnoly and John Puthenveetil and Patricia D'Urso}, title = {Prescriptive Analytics-based Robust Decision-Making Model for Cyber Disaster Risk Reduction}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--5}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433837}, doi = {10.1109/ICAIC60265.2024.10433837}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icaic2/PonnolyPD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/PopoolaAFA24, author = {Gideon Popoola and Khadijat{-}Kuburat Abdullah and Gerard Shu Fuhnwi and Janet Agbaje}, title = {Sentiment Analysis of Financial News Data using {TF-IDF} and Machine Learning Algorithms}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433843}, doi = {10.1109/ICAIC60265.2024.10433843}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/PopoolaAFA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/RavalAWG24, author = {Maulin Raval and Aobo Jin and Yun Wan and Hardik A. Gohel}, title = {Leveraging Advanced Visual Recognition Classifier For Pneumonia Prediction}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--8}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433800}, doi = {10.1109/ICAIC60265.2024.10433800}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/RavalAWG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/SardarHPSHDG24, author = {Tanvir H. Sardar and Ruhul Amin Hazarika and Bishwajeet Pandey and Guru Prasad M. S and Sk Mahmudul Hassan and Radhakrishna Dodmane and Hardik A. Gohel}, title = {Video key concept extraction using Convolution Neural Network}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433799}, doi = {10.1109/ICAIC60265.2024.10433799}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/SardarHPSHDG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/SeilovPNAKZ24, author = {Shakhmaran Seilov and Bishwajeet Pandey and Akniyet Nurzhaubayev and Dias Abildinov and Assem Konyrkhanova and Bibinur Zhursinbek}, title = {Federated Learning Based Smart Horticulture and Smart Storage of Fruits Using E-Nose, and Blockchain: {A} Proposed Model}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--5}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433834}, doi = {10.1109/ICAIC60265.2024.10433834}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/SeilovPNAKZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/ShahSS24, author = {Trishla Shah and Raghav V. Sampangi and Angela A. Siegel}, title = {Risk-Aware Mobile App Security Testing: Safeguarding Sensitive User Inputs}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--8}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433804}, doi = {10.1109/ICAIC60265.2024.10433804}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/ShahSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/ShahSS24a, author = {Trishla Shah and Raghav V. Sampangi and Angela A. Siegel}, title = {Mobile Application Security Risk Score: {A} sensitive user input-based approach}, booktitle = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, pages = {1--10}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024.10433828}, doi = {10.1109/ICAIC60265.2024.10433828}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/ShahSS24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icaic2/2024, title = {3rd {IEEE} International Conference on {AI} in Cybersecurity, {ICAIC} 2024, Houston, TX, USA, February 7-9, 2024}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICAIC60265.2024}, doi = {10.1109/ICAIC60265.2024}, isbn = {979-8-3503-8185-6}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/Aditya23, author = {Yashwant Aditya}, title = {Significance of artificial intelligence to deal with stress during the organisational changes}, booktitle = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC} 2023, Houston, TX, USA, February 7-9, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICAIC57335.2023.10044168}, doi = {10.1109/ICAIC57335.2023.10044168}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/Aditya23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/Alandjani23, author = {Gasim Othman Alandjani}, title = {Blockchain Technology and Impacts on Potential Industries}, booktitle = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC} 2023, Houston, TX, USA, February 7-9, 2023}, pages = {1--4}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICAIC57335.2023.10044170}, doi = {10.1109/ICAIC57335.2023.10044170}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/Alandjani23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/AlmazroueiMHAA23, author = {Omar Saif Musabbeh Bin Hamed Almazrouei and Pritheega Magalingam and Mohammad Kamrul Hasan and Majed Almehrzi and Ahmed Alshamsi}, title = {Penetration Testing for IoT Security: The Case Study of a Wireless {IP} Security {CAM}}, booktitle = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC} 2023, Houston, TX, USA, February 7-9, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICAIC57335.2023.10044176}, doi = {10.1109/ICAIC57335.2023.10044176}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/AlmazroueiMHAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/AnaamGHAAM23, author = {Elham Anaam and Taher M. Ghazal and Su{-}Cheng Haw and Haitham M. Alzoubi and Muhammad Turki Alshurideh and Abdullah Al Mamun}, title = {Utilization of Blockchain Technology In Human Resource Management}, booktitle = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC} 2023, Houston, TX, USA, February 7-9, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICAIC57335.2023.10044181}, doi = {10.1109/ICAIC57335.2023.10044181}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/AnaamGHAAM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/AnaamHGHAA23, author = {Elham Abdulwahab Anaam and Mohammad Kamrul Hasan and Taher M. Ghazal and Su{-}Cheng Haw and Haitham M. Alzoubi and Muhammad Turki Alshurideh}, title = {How Private Blockchain Technology Secure IoT Data Record}, booktitle = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC} 2023, Houston, TX, USA, February 7-9, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICAIC57335.2023.10044178}, doi = {10.1109/ICAIC57335.2023.10044178}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/AnaamHGHAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/BarajasMLSMGEK23, author = {Miguel A Barajas and Michael P. Murphy and Louis C. Lasseter and Godspower I Sunny and Hirak Mazumdar and Hardik A. Gohel and Hilary P. Emerson and Daniel I. Kaplan}, title = {Seasonal Trend Assessment for Groundwater Contamination Detection and Monitoring using {ARIMA} Model}, booktitle = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC} 2023, Houston, TX, USA, February 7-9, 2023}, pages = {1--7}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICAIC57335.2023.10044126}, doi = {10.1109/ICAIC57335.2023.10044126}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/BarajasMLSMGEK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/BoikoKY23, author = {Yuri B. Boiko and Iluju Kiringa and Tet Hin Yeap}, title = {Voltage hopping induced by bias injection attack against Kalman filter of {BLDC} motor}, booktitle = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC} 2023, Houston, TX, USA, February 7-9, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICAIC57335.2023.10044123}, doi = {10.1109/ICAIC57335.2023.10044123}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/BoikoKY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/ChoiZSJ23, author = {Daegil Choi and Gengjia Zhang and Siho Shin and Jaehyo Jung}, title = {Decision Tree Algorithm for Depression Diagnosis from Facial Images}, booktitle = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC} 2023, Houston, TX, USA, February 7-9, 2023}, pages = {1--4}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICAIC57335.2023.10044179}, doi = {10.1109/ICAIC57335.2023.10044179}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/ChoiZSJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/ElmutasimaMB23, author = {Imadeldin Elsayed Elmutasima and Izzeldin I. Mohd and Khalid Hamid Bilal}, title = {Scrutinization of Saline Sea Utilizing a Water-Based Antenna for the Radio Communications}, booktitle = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC} 2023, Houston, TX, USA, February 7-9, 2023}, pages = {1--4}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICAIC57335.2023.10044124}, doi = {10.1109/ICAIC57335.2023.10044124}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/ElmutasimaMB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/Fadheel0A23, author = {Wesam Fadheel and Steve Carr and Wassnaa Al{-}Mawee}, title = {On Phishing: Proposing a Traffic Behavior-Based Model to Detect, Prevent, and Classify Webpage Suspicious and Malicious Activities}, booktitle = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC} 2023, Houston, TX, USA, February 7-9, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICAIC57335.2023.10044171}, doi = {10.1109/ICAIC57335.2023.10044171}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/Fadheel0A23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/HossainPT23, author = {Ismail Hossain and Sai Puppala and Sajedul Talukder}, title = {Collaborative Differentially Private Federated Learning Framework for the Prediction of Diabetic Retinopathy}, booktitle = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC} 2023, Houston, TX, USA, February 7-9, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICAIC57335.2023.10044122}, doi = {10.1109/ICAIC57335.2023.10044122}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icaic2/HossainPT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/MurphyMGEK23, author = {Michael P. Murphy and Hirak Mazumdar and Hardik A. Gohel and Hilary P. Emerson and Daniel I. Kaplan}, title = {Long Short-Term Memory Networks for Monitoring Groundwater Contamination at the Hanford Site}, booktitle = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC} 2023, Houston, TX, USA, February 7-9, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICAIC57335.2023.10044121}, doi = {10.1109/ICAIC57335.2023.10044121}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/MurphyMGEK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/NicesioLG23, author = {Otavio Kiyatake Nicesio and Adriano Galindo Leal and Vagner Luiz Gava}, title = {Quantum Machine Learning for Network Intrusion Detection Systems, a Systematic Literature Review}, booktitle = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC} 2023, Houston, TX, USA, February 7-9, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICAIC57335.2023.10044125}, doi = {10.1109/ICAIC57335.2023.10044125}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/NicesioLG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/OgundiranCYA23, author = {Ayodeji Ogundiran and Hongmei Chi and Jie Yan and Ruth Agada}, title = {A Framework to Reconstruct Digital Forensics Evidence via Goal-Oriented Modeling}, booktitle = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC} 2023, Houston, TX, USA, February 7-9, 2023}, pages = {1--11}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICAIC57335.2023.10044180}, doi = {10.1109/ICAIC57335.2023.10044180}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/OgundiranCYA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/PuppalaHT23, author = {Sai Puppala and Ismail Hossain and Sajedul Talukder}, title = {Machine Learning and Sentiment Analysis for Predicting Environmental Lead Toxicity in Children at the {ZIP} Code Level}, booktitle = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC} 2023, Houston, TX, USA, February 7-9, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICAIC57335.2023.10044177}, doi = {10.1109/ICAIC57335.2023.10044177}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icaic2/PuppalaHT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/ReddyRJSPGG23, author = {Sangu Venkata Sai Harsith Reddy and Gadhiraju Reddy Sekhar Raju and Nookala Jayanth and Malla Charan Sai and Bishwajeet Pandey and Geetha G. and Hardik A. Gohel}, title = {Design of {QR} Based Smart Student Attendance System}, booktitle = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC} 2023, Houston, TX, USA, February 7-9, 2023}, pages = {1--4}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICAIC57335.2023.10044175}, doi = {10.1109/ICAIC57335.2023.10044175}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/ReddyRJSPGG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/SainiKPG23, author = {Jyoti Saini and Keshav Kumar and Bishwajeet Pandey and Hardik A. Gohel}, title = {Detection of Cardiac Tumors Using Parallel Computing}, booktitle = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC} 2023, Houston, TX, USA, February 7-9, 2023}, pages = {1--4}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICAIC57335.2023.10044174}, doi = {10.1109/ICAIC57335.2023.10044174}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/SainiKPG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/SharmaK23, author = {Monika Sharma and Ajay Kaul}, title = {Suspicious Permissions Detection of Covid-19 Themed Malicious Android Applications}, booktitle = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC} 2023, Houston, TX, USA, February 7-9, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICAIC57335.2023.10044167}, doi = {10.1109/ICAIC57335.2023.10044167}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/SharmaK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/SmithK023, author = {Daryle Smith and Sajad Khorsandroo and Kaushik Roy}, title = {Supervised and Unsupervised Learning Techniques Utilizing Malware Datasets}, booktitle = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC} 2023, Houston, TX, USA, February 7-9, 2023}, pages = {1--7}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICAIC57335.2023.10044169}, doi = {10.1109/ICAIC57335.2023.10044169}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/SmithK023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/SuNP23, author = {Jing Su and Suku Nair and Leo Popokh}, title = {EdgeGym: {A} Reinforcement Learning Environment for Constraint-Aware {NFV} Resource Allocation}, booktitle = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC} 2023, Houston, TX, USA, February 7-9, 2023}, pages = {1--7}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICAIC57335.2023.10044182}, doi = {10.1109/ICAIC57335.2023.10044182}, timestamp = {Mon, 29 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icaic2/SuNP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/ZhangCSJ23, author = {Gengjia Zhang and Daegil Choi and Siho Shin and Jaehyo Jung}, title = {Cuff-less blood pressure estimation from {ECG} and {PPG} using {CNN-LSTM} algorithms}, booktitle = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC} 2023, Houston, TX, USA, February 7-9, 2023}, pages = {1--4}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICAIC57335.2023.10044172}, doi = {10.1109/ICAIC57335.2023.10044172}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/ZhangCSJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/ZhuLT23, author = {Guanhua Zhu and Xiaofan Liu and Lizhe Tan}, title = {Bearing Fault Diagnosis Based on Sparse Wavelet Decomposition and Sparse Graph Connection Using GraphSAGE}, booktitle = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC} 2023, Houston, TX, USA, February 7-9, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICAIC57335.2023.10044173}, doi = {10.1109/ICAIC57335.2023.10044173}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/ZhuLT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icaic2/2023, title = {{IEEE} 2nd International Conference on {AI} in Cybersecurity, {ICAIC} 2023, Houston, TX, USA, February 7-9, 2023}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICAIC57335.2023}, doi = {10.1109/ICAIC57335.2023}, isbn = {979-8-3503-9696-6}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/AikinsJG22, author = {Godwyll Aikins and Sagar Jagtap and Weinan Gao}, title = {Resilience Analysis of Deep Q-Learning Algorithms in Driving Simulations Against Cyberattacks}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9896968}, doi = {10.1109/ICAIC53980.2022.9896968}, timestamp = {Tue, 16 Jan 2024 16:21:30 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/AikinsJG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/AlzoubiGHAKAI22, author = {Haitham M. Alzoubi and Taher M. Ghazal and Mohammad Kamrul Hasan and Asma Alketbi and Rukshanda Kamran and Nidal A. Al{-}Dmour and Shayla Islam}, title = {Cyber Security Threats on Digital Banking}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--4}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9896966}, doi = {10.1109/ICAIC53980.2022.9896966}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icaic2/AlzoubiGHAKAI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/AtanasioSI22, author = {M. Atanasio and Abdul Samad Shibghatullah and Shayla Islam}, title = {Developing {A} Mobile Application for Fleet Vehicle Tracking}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9897024}, doi = {10.1109/ICAIC53980.2022.9897024}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/AtanasioSI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/AvomoSS22, author = {Salomon Ebi Esono Avomo and Abdul Samad Shibghatullah and Joseph Ng Poh Soon}, title = {Online Booking Sports Facilities in the Republic of Equatorial Guinea}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9897020}, doi = {10.1109/ICAIC53980.2022.9897020}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/AvomoSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/Biswas22, author = {Sayan Biswas}, title = {Stock Price Prediction using Bidirectional {LSTM} with Attention}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9896969}, doi = {10.1109/ICAIC53980.2022.9896969}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/Biswas22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/FarrellY022, author = {Richard Farrell and Xiaohong Yuan and Kaushik Roy}, title = {IoT to Structured Data (IoT2SD): {A} Big Data Information Extraction Framework}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9897030}, doi = {10.1109/ICAIC53980.2022.9897030}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/FarrellY022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/FarukTTSS22, author = {Md. Jobair Hossain Faruk and Sharaban Tahora and Masrura Tasnim and Hossain Shahriar and Nazmus Sakib}, title = {A Review of Quantum Cybersecurity: Threats, Risks and Opportunities}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9896970}, doi = {10.1109/ICAIC53980.2022.9896970}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/FarukTTSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/GhazalHAHAIKM22, author = {Taher M. Ghazal and Mohammad Kamrul Hasan and Haitham M. Alzoubi and Mohammed Al Hmmadi and Nidal A. Al{-}Dmour and Shayla Islam and Rukshanda Kamran and Beenu Mago}, title = {Securing Smart Cities Using Blockchain Technology}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--4}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9896971}, doi = {10.1109/ICAIC53980.2022.9896971}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icaic2/GhazalHAHAIKM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/GhazalHZAAI22, author = {Taher M. Ghazal and Mohammad Kamrul Hasan and Raed Abu Zitar and Nidal A. Al{-}Dmour and Waleed T. Al{-}Sit and Shayla Islam}, title = {Cybers Security Analysis and Measurement Tools Using Machine Learning Approach}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--4}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9897045}, doi = {10.1109/ICAIC53980.2022.9897045}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/GhazalHZAAI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/GyamfiCG22, author = {Nana Kwame Gyamfi and Dainius Ceponis and Nikolaj Goranin}, title = {Automated System-Level Anomaly Detection and Classification Using Modified Random Forest}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9897027}, doi = {10.1109/ICAIC53980.2022.9897027}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/GyamfiCG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/HanifMHHHH22, author = {Salman Hanif and Dong Mu and Noman Hanif and Sana Hanif and Tayyaba Hanif and Omer Hanif}, title = {The Dynamic Influence of {ICT} on Modern Logistic Industry in Developing Economy and {CO2} Emission Using {ARDL} Approach: {A} Case of Pakistan}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9896961}, doi = {10.1109/ICAIC53980.2022.9896961}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/HanifMHHHH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/KeoyKCHLT22, author = {Kay Hooi Keoy and Yung Jing Koh and Su Mon Chit and Khalid Hafeez and Luqman Lee and Chee Ling Thong}, title = {Impact of Assisted Technological Enablement on Entrepreneurial Success among Malaysian Higher Education Students}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9897019}, doi = {10.1109/ICAIC53980.2022.9897019}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icaic2/KeoyKCHLT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/LeeTC22, author = {Joon Sern Lee and Kai Keng Tay and Zong Fu Chua}, title = {BinImg2Vec: Augmenting Malware Binary Image Classification with Data2Vec}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9897062}, doi = {10.1109/ICAIC53980.2022.9897062}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/LeeTC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/MalikKK22, author = {Muhammad Zain Malik and Sulaiman Khan and Habib Ullah Khan}, title = {Transforming the competencies of Artificial Intelligence to ensure the Cyber Threats: {A} Systemic Literture Review of Busniess Sectors}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9897051}, doi = {10.1109/ICAIC53980.2022.9897051}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/MalikKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/MazumdarITK22, author = {Adnan Tajul Islam Mazumdar and Shayla Islam and Chee Ling Thong and Kay Hooi Keoy}, title = {NFC-based Mobile Application for Student Attendance in Institution of Higher Learning}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9896975}, doi = {10.1109/ICAIC53980.2022.9896975}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/MazumdarITK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/PandeyKBGKS22, author = {Bishwajeet Pandey and Tanisq Kala and Naman Bhoj and Hardik A. Gohel and Abhay Kumar and P. Sivaram}, title = {Effective Identification of Spam Jobs Postings Using Employer Defined Linguistic Feature}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9897059}, doi = {10.1109/ICAIC53980.2022.9897059}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/PandeyKBGKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/ShahHI0GK22, author = {Rajeev Kumar Shah and Mohammad Kamrul Hasan and Shayla Islam and Asif Khan and Taher M. Ghazal and Ahmad Neyaz Khan}, title = {Detect Phishing Website by Fuzzy Multi-Criteria Decision Making}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9897036}, doi = {10.1109/ICAIC53980.2022.9897036}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/ShahHI0GK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/ShahYT22, author = {Sandeep Shah and Xiaohong Yuan and Zanetta Tyler}, title = {An Analysis of {COVID-19} related Twitter Data for Asian Hate Speech Using Machine Learning Algorithms}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9896967}, doi = {10.1109/ICAIC53980.2022.9896967}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/ShahYT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/SumnerXY22, author = {Alex Sumner and Jinsheng Xu and Xiaohong Yuan}, title = {Determining Phishing Emails using {URL} Domain Features}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9897038}, doi = {10.1109/ICAIC53980.2022.9897038}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/SumnerXY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/TongSS22, author = {Ng Shao Tong and Abdul Samad Shibghatullah and Kasthuri Subaramaniam}, title = {An Online Seafood Store Management System in Malaysia}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9897021}, doi = {10.1109/ICAIC53980.2022.9897021}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/TongSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/UticR22, author = {Zheni Utic and Kandethody Ramachandran}, title = {A Survey of Reinforcement Learning in Intrusion Detection}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9897058}, doi = {10.1109/ICAIC53980.2022.9897058}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/UticR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/YengFYY22, author = {Prosper Kandabongee Yeng and Muhammad Ali Fauzi and Bian Yang and Sule Yildirim Yayilgan}, title = {Analysing digital evidence towards enhancing healthcare security practice: The {KID} model}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--9}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9897055}, doi = {10.1109/ICAIC53980.2022.9897055}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/YengFYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icaic2/2022, title = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022}, doi = {10.1109/ICAIC53980.2022}, isbn = {978-1-6654-0043-5}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.