Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/icaic2/icaic2022.bht:"
@inproceedings{DBLP:conf/icaic2/AikinsJG22, author = {Godwyll Aikins and Sagar Jagtap and Weinan Gao}, title = {Resilience Analysis of Deep Q-Learning Algorithms in Driving Simulations Against Cyberattacks}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9896968}, doi = {10.1109/ICAIC53980.2022.9896968}, timestamp = {Tue, 16 Jan 2024 16:21:30 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/AikinsJG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/AlzoubiGHAKAI22, author = {Haitham M. Alzoubi and Taher M. Ghazal and Mohammad Kamrul Hasan and Asma Alketbi and Rukshanda Kamran and Nidal A. Al{-}Dmour and Shayla Islam}, title = {Cyber Security Threats on Digital Banking}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--4}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9896966}, doi = {10.1109/ICAIC53980.2022.9896966}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/AlzoubiGHAKAI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/AtanasioSI22, author = {M. Atanasio and Abdul Samad Shibghatullah and Shayla Islam}, title = {Developing {A} Mobile Application for Fleet Vehicle Tracking}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9897024}, doi = {10.1109/ICAIC53980.2022.9897024}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/AtanasioSI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/AvomoSS22, author = {Salomon Ebi Esono Avomo and Abdul Samad Shibghatullah and Joseph Ng Poh Soon}, title = {Online Booking Sports Facilities in the Republic of Equatorial Guinea}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9897020}, doi = {10.1109/ICAIC53980.2022.9897020}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/AvomoSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/Biswas22, author = {Sayan Biswas}, title = {Stock Price Prediction using Bidirectional {LSTM} with Attention}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9896969}, doi = {10.1109/ICAIC53980.2022.9896969}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/Biswas22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/FarrellY022, author = {Richard Farrell and Xiaohong Yuan and Kaushik Roy}, title = {IoT to Structured Data (IoT2SD): {A} Big Data Information Extraction Framework}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9897030}, doi = {10.1109/ICAIC53980.2022.9897030}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/FarrellY022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/FarukTTSS22, author = {Md. Jobair Hossain Faruk and Sharaban Tahora and Masrura Tasnim and Hossain Shahriar and Nazmus Sakib}, title = {A Review of Quantum Cybersecurity: Threats, Risks and Opportunities}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9896970}, doi = {10.1109/ICAIC53980.2022.9896970}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/FarukTTSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/GhazalHAHAIKM22, author = {Taher M. Ghazal and Mohammad Kamrul Hasan and Haitham M. Alzoubi and Mohammed Al Hmmadi and Nidal A. Al{-}Dmour and Shayla Islam and Rukshanda Kamran and Beenu Mago}, title = {Securing Smart Cities Using Blockchain Technology}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--4}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9896971}, doi = {10.1109/ICAIC53980.2022.9896971}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/GhazalHAHAIKM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/GhazalHZAAI22, author = {Taher M. Ghazal and Mohammad Kamrul Hasan and Raed Abu Zitar and Nidal A. Al{-}Dmour and Waleed T. Al{-}Sit and Shayla Islam}, title = {Cybers Security Analysis and Measurement Tools Using Machine Learning Approach}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--4}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9897045}, doi = {10.1109/ICAIC53980.2022.9897045}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/GhazalHZAAI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/GyamfiCG22, author = {Nana Kwame Gyamfi and Dainius Ceponis and Nikolaj Goranin}, title = {Automated System-Level Anomaly Detection and Classification Using Modified Random Forest}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9897027}, doi = {10.1109/ICAIC53980.2022.9897027}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/GyamfiCG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/HanifMHHHH22, author = {Salman Hanif and Dong Mu and Noman Hanif and Sana Hanif and Tayyaba Hanif and Omer Hanif}, title = {The Dynamic Influence of {ICT} on Modern Logistic Industry in Developing Economy and {CO2} Emission Using {ARDL} Approach: {A} Case of Pakistan}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9896961}, doi = {10.1109/ICAIC53980.2022.9896961}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/HanifMHHHH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/KeoyKCHLT22, author = {Kay Hooi Keoy and Yung Jing Koh and Su Mon Chit and Khalid Hafeez and Luqman Lee and Chee Ling Thong}, title = {Impact of Assisted Technological Enablement on Entrepreneurial Success among Malaysian Higher Education Students}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9897019}, doi = {10.1109/ICAIC53980.2022.9897019}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/KeoyKCHLT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/LeeTC22, author = {Joon Sern Lee and Kai Keng Tay and Zong Fu Chua}, title = {BinImg2Vec: Augmenting Malware Binary Image Classification with Data2Vec}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9897062}, doi = {10.1109/ICAIC53980.2022.9897062}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/LeeTC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/MalikKK22, author = {Muhammad Zain Malik and Sulaiman Khan and Habib Ullah Khan}, title = {Transforming the competencies of Artificial Intelligence to ensure the Cyber Threats: {A} Systemic Literture Review of Busniess Sectors}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9897051}, doi = {10.1109/ICAIC53980.2022.9897051}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/MalikKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/MazumdarITK22, author = {Adnan Tajul Islam Mazumdar and Shayla Islam and Chee Ling Thong and Kay Hooi Keoy}, title = {NFC-based Mobile Application for Student Attendance in Institution of Higher Learning}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9896975}, doi = {10.1109/ICAIC53980.2022.9896975}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/MazumdarITK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/PandeyKBGKS22, author = {Bishwajeet Pandey and Tanisq Kala and Naman Bhoj and Hardik A. Gohel and Abhay Kumar and P. Sivaram}, title = {Effective Identification of Spam Jobs Postings Using Employer Defined Linguistic Feature}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9897059}, doi = {10.1109/ICAIC53980.2022.9897059}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/PandeyKBGKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/ShahHI0GK22, author = {Rajeev Kumar Shah and Mohammad Kamrul Hasan and Shayla Islam and Asif Khan and Taher M. Ghazal and Ahmad Neyaz Khan}, title = {Detect Phishing Website by Fuzzy Multi-Criteria Decision Making}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9897036}, doi = {10.1109/ICAIC53980.2022.9897036}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/ShahHI0GK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/ShahYT22, author = {Sandeep Shah and Xiaohong Yuan and Zanetta Tyler}, title = {An Analysis of {COVID-19} related Twitter Data for Asian Hate Speech Using Machine Learning Algorithms}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9896967}, doi = {10.1109/ICAIC53980.2022.9896967}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/ShahYT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/SumnerXY22, author = {Alex Sumner and Jinsheng Xu and Xiaohong Yuan}, title = {Determining Phishing Emails using {URL} Domain Features}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9897038}, doi = {10.1109/ICAIC53980.2022.9897038}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/SumnerXY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/TongSS22, author = {Ng Shao Tong and Abdul Samad Shibghatullah and Kasthuri Subaramaniam}, title = {An Online Seafood Store Management System in Malaysia}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9897021}, doi = {10.1109/ICAIC53980.2022.9897021}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/TongSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/UticR22, author = {Zheni Utic and Kandethody Ramachandran}, title = {A Survey of Reinforcement Learning in Intrusion Detection}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9897058}, doi = {10.1109/ICAIC53980.2022.9897058}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/UticR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic2/YengFYY22, author = {Prosper Kandabongee Yeng and Muhammad Ali Fauzi and Bian Yang and Sule Yildirim Yayilgan}, title = {Analysing digital evidence towards enhancing healthcare security practice: The {KID} model}, booktitle = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, pages = {1--9}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022.9897055}, doi = {10.1109/ICAIC53980.2022.9897055}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/YengFYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icaic2/2022, title = {1st International Conference on {AI} in Cybersecurity, {ICAIC} 2022, Victoria, TX, USA, May 24-26, 2022}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIC53980.2022}, doi = {10.1109/ICAIC53980.2022}, isbn = {978-1-6654-0043-5}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic2/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.