Search dblp for Publications

export results for "toc:db/conf/icaic2/icaic2022.bht:"

 download as .bib file

@inproceedings{DBLP:conf/icaic2/AikinsJG22,
  author       = {Godwyll Aikins and
                  Sagar Jagtap and
                  Weinan Gao},
  title        = {Resilience Analysis of Deep Q-Learning Algorithms in Driving Simulations
                  Against Cyberattacks},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9896968},
  doi          = {10.1109/ICAIC53980.2022.9896968},
  timestamp    = {Tue, 16 Jan 2024 16:21:30 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/AikinsJG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/AlzoubiGHAKAI22,
  author       = {Haitham M. Alzoubi and
                  Taher M. Ghazal and
                  Mohammad Kamrul Hasan and
                  Asma Alketbi and
                  Rukshanda Kamran and
                  Nidal A. Al{-}Dmour and
                  Shayla Islam},
  title        = {Cyber Security Threats on Digital Banking},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9896966},
  doi          = {10.1109/ICAIC53980.2022.9896966},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/AlzoubiGHAKAI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/AtanasioSI22,
  author       = {M. Atanasio and
                  Abdul Samad Shibghatullah and
                  Shayla Islam},
  title        = {Developing {A} Mobile Application for Fleet Vehicle Tracking},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9897024},
  doi          = {10.1109/ICAIC53980.2022.9897024},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/AtanasioSI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/AvomoSS22,
  author       = {Salomon Ebi Esono Avomo and
                  Abdul Samad Shibghatullah and
                  Joseph Ng Poh Soon},
  title        = {Online Booking Sports Facilities in the Republic of Equatorial Guinea},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9897020},
  doi          = {10.1109/ICAIC53980.2022.9897020},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/AvomoSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/Biswas22,
  author       = {Sayan Biswas},
  title        = {Stock Price Prediction using Bidirectional {LSTM} with Attention},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9896969},
  doi          = {10.1109/ICAIC53980.2022.9896969},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/Biswas22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/FarrellY022,
  author       = {Richard Farrell and
                  Xiaohong Yuan and
                  Kaushik Roy},
  title        = {IoT to Structured Data (IoT2SD): {A} Big Data Information Extraction
                  Framework},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9897030},
  doi          = {10.1109/ICAIC53980.2022.9897030},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/FarrellY022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/FarukTTSS22,
  author       = {Md. Jobair Hossain Faruk and
                  Sharaban Tahora and
                  Masrura Tasnim and
                  Hossain Shahriar and
                  Nazmus Sakib},
  title        = {A Review of Quantum Cybersecurity: Threats, Risks and Opportunities},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9896970},
  doi          = {10.1109/ICAIC53980.2022.9896970},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/FarukTTSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/GhazalHAHAIKM22,
  author       = {Taher M. Ghazal and
                  Mohammad Kamrul Hasan and
                  Haitham M. Alzoubi and
                  Mohammed Al Hmmadi and
                  Nidal A. Al{-}Dmour and
                  Shayla Islam and
                  Rukshanda Kamran and
                  Beenu Mago},
  title        = {Securing Smart Cities Using Blockchain Technology},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9896971},
  doi          = {10.1109/ICAIC53980.2022.9896971},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/GhazalHAHAIKM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/GhazalHZAAI22,
  author       = {Taher M. Ghazal and
                  Mohammad Kamrul Hasan and
                  Raed Abu Zitar and
                  Nidal A. Al{-}Dmour and
                  Waleed T. Al{-}Sit and
                  Shayla Islam},
  title        = {Cybers Security Analysis and Measurement Tools Using Machine Learning
                  Approach},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9897045},
  doi          = {10.1109/ICAIC53980.2022.9897045},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/GhazalHZAAI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/GyamfiCG22,
  author       = {Nana Kwame Gyamfi and
                  Dainius Ceponis and
                  Nikolaj Goranin},
  title        = {Automated System-Level Anomaly Detection and Classification Using
                  Modified Random Forest},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9897027},
  doi          = {10.1109/ICAIC53980.2022.9897027},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/GyamfiCG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/HanifMHHHH22,
  author       = {Salman Hanif and
                  Dong Mu and
                  Noman Hanif and
                  Sana Hanif and
                  Tayyaba Hanif and
                  Omer Hanif},
  title        = {The Dynamic Influence of {ICT} on Modern Logistic Industry in Developing
                  Economy and {CO2} Emission Using {ARDL} Approach: {A} Case of Pakistan},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9896961},
  doi          = {10.1109/ICAIC53980.2022.9896961},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/HanifMHHHH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/KeoyKCHLT22,
  author       = {Kay Hooi Keoy and
                  Yung Jing Koh and
                  Su Mon Chit and
                  Khalid Hafeez and
                  Luqman Lee and
                  Chee Ling Thong},
  title        = {Impact of Assisted Technological Enablement on Entrepreneurial Success
                  among Malaysian Higher Education Students},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9897019},
  doi          = {10.1109/ICAIC53980.2022.9897019},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/KeoyKCHLT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/LeeTC22,
  author       = {Joon Sern Lee and
                  Kai Keng Tay and
                  Zong Fu Chua},
  title        = {BinImg2Vec: Augmenting Malware Binary Image Classification with Data2Vec},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9897062},
  doi          = {10.1109/ICAIC53980.2022.9897062},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/LeeTC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/MalikKK22,
  author       = {Muhammad Zain Malik and
                  Sulaiman Khan and
                  Habib Ullah Khan},
  title        = {Transforming the competencies of Artificial Intelligence to ensure
                  the Cyber Threats: {A} Systemic Literture Review of Busniess Sectors},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9897051},
  doi          = {10.1109/ICAIC53980.2022.9897051},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/MalikKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/MazumdarITK22,
  author       = {Adnan Tajul Islam Mazumdar and
                  Shayla Islam and
                  Chee Ling Thong and
                  Kay Hooi Keoy},
  title        = {NFC-based Mobile Application for Student Attendance in Institution
                  of Higher Learning},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9896975},
  doi          = {10.1109/ICAIC53980.2022.9896975},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/MazumdarITK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/PandeyKBGKS22,
  author       = {Bishwajeet Pandey and
                  Tanisq Kala and
                  Naman Bhoj and
                  Hardik A. Gohel and
                  Abhay Kumar and
                  P. Sivaram},
  title        = {Effective Identification of Spam Jobs Postings Using Employer Defined
                  Linguistic Feature},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9897059},
  doi          = {10.1109/ICAIC53980.2022.9897059},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/PandeyKBGKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/ShahHI0GK22,
  author       = {Rajeev Kumar Shah and
                  Mohammad Kamrul Hasan and
                  Shayla Islam and
                  Asif Khan and
                  Taher M. Ghazal and
                  Ahmad Neyaz Khan},
  title        = {Detect Phishing Website by Fuzzy Multi-Criteria Decision Making},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9897036},
  doi          = {10.1109/ICAIC53980.2022.9897036},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/ShahHI0GK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/ShahYT22,
  author       = {Sandeep Shah and
                  Xiaohong Yuan and
                  Zanetta Tyler},
  title        = {An Analysis of {COVID-19} related Twitter Data for Asian Hate Speech
                  Using Machine Learning Algorithms},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9896967},
  doi          = {10.1109/ICAIC53980.2022.9896967},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/ShahYT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/SumnerXY22,
  author       = {Alex Sumner and
                  Jinsheng Xu and
                  Xiaohong Yuan},
  title        = {Determining Phishing Emails using {URL} Domain Features},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9897038},
  doi          = {10.1109/ICAIC53980.2022.9897038},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/SumnerXY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/TongSS22,
  author       = {Ng Shao Tong and
                  Abdul Samad Shibghatullah and
                  Kasthuri Subaramaniam},
  title        = {An Online Seafood Store Management System in Malaysia},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9897021},
  doi          = {10.1109/ICAIC53980.2022.9897021},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/TongSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/UticR22,
  author       = {Zheni Utic and
                  Kandethody Ramachandran},
  title        = {A Survey of Reinforcement Learning in Intrusion Detection},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9897058},
  doi          = {10.1109/ICAIC53980.2022.9897058},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/UticR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic2/YengFYY22,
  author       = {Prosper Kandabongee Yeng and
                  Muhammad Ali Fauzi and
                  Bian Yang and
                  Sule Yildirim Yayilgan},
  title        = {Analysing digital evidence towards enhancing healthcare security practice:
                  The {KID} model},
  booktitle    = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022.9897055},
  doi          = {10.1109/ICAIC53980.2022.9897055},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/YengFYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icaic2/2022,
  title        = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022,
                  Victoria, TX, USA, May 24-26, 2022},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIC53980.2022},
  doi          = {10.1109/ICAIC53980.2022},
  isbn         = {978-1-6654-0043-5},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic2/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics