{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T10:24:56Z","timestamp":1775730296388,"version":"3.50.1"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","license":[{"start":{"date-parts":[[2023,2,18]],"date-time":"2023-02-18T00:00:00Z","timestamp":1676678400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,2,18]],"date-time":"2023-02-18T00:00:00Z","timestamp":1676678400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"DOI":"10.1007\/s10796-023-10372-y","type":"journal-article","created":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T09:05:49Z","timestamp":1676797549000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Secure Knowledge Management and Cybersecurity in the Era of Artificial Intelligence"],"prefix":"10.1007","author":[{"given":"Sagar","family":"Samtani","sequence":"first","affiliation":[]},{"given":"Ziming","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Ram","family":"Krishnan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,18]]},"reference":[{"key":"10372_CR1","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1145\/3422337.3450357","volume-title":"Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy","author":"E Bertino","year":"2021","unstructured":"Bertino, E., Kantarcioglu, M., Akcora, C. G., Samtani, S., Mittal, S., & Gupta, M. (2021). AI for Security and Security for AI. Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy (pp. 333\u2013334). Association for Computing Machinery. https:\/\/doi.org\/10.1145\/3422337.3450357"},{"issue":"4","key":"10372_CR2","doi-asserted-by":"publisher","first-page":"1426","DOI":"10.1109\/TKDE.2019.2942590","volume":"33","author":"G Cao","year":"2021","unstructured":"Cao, G., Iosifidis, A., Gabbouj, M., Raghavan, V., & Gottumukkala, R. (2021). Deep multi-view learning to rank. IEEE Transactions on Knowledge and Data Engineering, 33(4), 1426\u20131438. https:\/\/doi.org\/10.1109\/TKDE.2019.2942590","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"10372_CR3","doi-asserted-by":"publisher","unstructured":"Chung, W., Zhang, Y., & Pan, J. (2023). A theory-based deep-learning approach to detecting disinformation in financial social media. Information Systems Frontiers, 25(2). https:\/\/doi.org\/10.1007\/s10796-022-10327-9","DOI":"10.1007\/s10796-022-10327-9"},{"key":"10372_CR4","doi-asserted-by":"publisher","unstructured":"Daniel, C., Mullarkey, M., & Agrawal, M. (2023). RQ labs: A cybersecurity workforce skills development framework. Information Systems Frontiers, 25(2). https:\/\/doi.org\/10.1007\/s10796-022-10332-y","DOI":"10.1007\/s10796-022-10332-y"},{"key":"10372_CR5","doi-asserted-by":"publisher","unstructured":"Klepetko, R., Krishnan, R. (2023). Visualizing convolutional neural network models\u2019 sensitivity to nonnatural data order.\u00a0Information Systems Frontiers, 25(2). https:\/\/doi.org\/10.1007\/s10796-022-10330-0","DOI":"10.1007\/s10796-022-10330-0"},{"issue":"10","key":"10372_CR6","doi-asserted-by":"publisher","first-page":"1863","DOI":"10.1109\/TKDE.2018.2872063","volume":"31","author":"Y Li","year":"2019","unstructured":"Li, Y., Yang, M., & Zhang, Z. (2019). A survey of multi-view representation learning. IEEE Transactions on Knowledge and Data Engineering, 31(10), 1863\u20131883. https:\/\/doi.org\/10.1109\/TKDE.2018.2872063","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"10372_CR7","doi-asserted-by":"publisher","unstructured":"Nosenko, A., Cheng, Y., & Chen, H. (2023). Password and passphrase guessing with recurrent neural networks. Information Systems Frontiers, 25(2). https:\/\/doi.org\/10.1007\/s10796-022-10325-x","DOI":"10.1007\/s10796-022-10325-x"},{"key":"10372_CR8","doi-asserted-by":"publisher","unstructured":"Okeke, R. I., Eiza, M. H. (2023). The Application of role-based framework in preventing internal identity theft related crimes: A qualitative case study of UK retail companies. Information Systems Frontiers, 25(2). https:\/\/doi.org\/10.1007\/s10796-022-10326-w","DOI":"10.1007\/s10796-022-10326-w"},{"key":"10372_CR9","doi-asserted-by":"publisher","unstructured":"Rani, S., & Kumar, M. (2023). Heterogeneous information fusion based topic detection from social media data. Information Systems Frontiers, 25(2). https:\/\/doi.org\/10.1007\/s10796-022-10334-w","DOI":"10.1007\/s10796-022-10334-w"},{"key":"10372_CR10","doi-asserted-by":"publisher","unstructured":"Rathore, H., Samavedhi, A., Sahay, S.K., & Sewak, M. (2023). Towards adversarially superior malware detection models: An adversary aware proactive approach using adversarial attacks and defenses. Information Systems Frontiers, 25(2). https:\/\/doi.org\/10.1007\/s10796-022-10331-z","DOI":"10.1007\/s10796-022-10331-z"},{"key":"10372_CR11","doi-asserted-by":"publisher","unstructured":"Rubio-Medrano, C. E., Soundrapandian, P. K. D., Hill, M., Claramunt, L., Baek, J., Geetha S., & Ahn, G.-J. (2023). DyPolDroid: Protecting against permission-abuse attacks in android. Information Systems Frontiers, 25(2). https:\/\/doi.org\/10.1007\/s10796-022-10328-8","DOI":"10.1007\/s10796-022-10328-8"},{"issue":"4","key":"10372_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3430360","volume":"11","author":"S Samtani","year":"2020","unstructured":"Samtani, S., Kantarcioglu, M., & Chen, H. (2020b). Trailblazing the artificial intelligence for cybersecurity discipline: A multi-disciplinary research roadmap. ACM Transactions on Management Information Systems, 11(4), 1\u201319. https:\/\/doi.org\/10.1145\/3430360","journal-title":"ACM Transactions on Management Information Systems"},{"issue":"4","key":"10372_CR13","doi-asserted-by":"publisher","first-page":"2149","DOI":"10.1109\/TDSC.2022.3168187","volume":"19","author":"S Samtani","year":"2022","unstructured":"Samtani, S., Chen, H., Kantarcioglu, M., & Thuraisingham, B. (2022). Explainable artificial intelligence for cyber threat intelligence (XAI-CTI). IEEE Transactions on Dependable and Secure Computing, 19(4), 2149\u20132150. https:\/\/doi.org\/10.1109\/TDSC.2022.3168187","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"10372_CR14","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-319-78440-3_8","volume-title":"The Palgrave Handbook of International Cybercrime and Cyberdeviance","author":"S Samtani","year":"2020","unstructured":"Samtani, S., Abate, M., Benjamin, V., & Li, W. (2020a). Cybersecurity as an industry: a cyber threat intelligence perspective. In T. J. Holt & A. M. Bossler (Eds.), The Palgrave Handbook of International Cybercrime and Cyberdeviance (pp. 135\u2013154). Springer International Publishing. https:\/\/doi.org\/10.1007\/978-3-319-78440-3_8"},{"key":"10372_CR15","doi-asserted-by":"publisher","first-page":"4153","DOI":"10.1145\/3447548.3469450","volume-title":"Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining","author":"S Samtani","year":"2021","unstructured":"Samtani, S., Yang, S., & Chen, H. (2021). ACM KDD AI4Cyber: The 1st Workshop on Artificial Intelligence-Enabled Cybersecurity Analytics. Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining (pp. 4153\u20134154). Association for Computing Machinery. https:\/\/doi.org\/10.1145\/3447548.3469450"},{"key":"10372_CR16","doi-asserted-by":"publisher","unstructured":"Sewak, M., Sahay, S. K. & Rathore, H. (2023). Deep reinforcement learning in the advanced cybersecurity threat detection and protection.\u00a0Information Systems Frontiers, 25(2). https:\/\/doi.org\/10.1007\/s10796-022-10333-x","DOI":"10.1007\/s10796-022-10333-x"},{"key":"10372_CR17","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A. N., et al. (2017). Attention is all you need. In I. Guyon, U. V. Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, & R. Garnett (Eds.), Advances in neural information processing systems (Vol. 30). Curran Associates, Inc.\u00a0https:\/\/proceedings.neurips.cc\/paper\/2017\/file\/3f5ee243547dee91fbd053c1c4a845aa-Paper.pdf. Accessed 12 Jan"},{"issue":"12","key":"10372_CR18","doi-asserted-by":"publisher","first-page":"5586","DOI":"10.1109\/TKDE.2021.3070203","volume":"34","author":"Y Zhang","year":"2022","unstructured":"Zhang, Y., & Yang, Q. (2022). A Survey on Multi-Task Learning. IEEE Transactions on Knowledge and Data Engineering, 34(12), 5586\u20135609. https:\/\/doi.org\/10.1109\/TKDE.2021.3070203","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"10372_CR19","doi-asserted-by":"publisher","unstructured":"Zhou, L., Tao, J. & Zhang, D. (2023). Does fake news in different languages tell the same story? An analysis of multi-level thematic and emotional characteristics of news about COVID-19. Information Systems Frontiers, 25(2). https:\/\/doi.org\/10.1007\/s10796-022-10329-7","DOI":"10.1007\/s10796-022-10329-7"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-023-10372-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10796-023-10372-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-023-10372-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T09:14:26Z","timestamp":1676798066000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10796-023-10372-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,18]]},"references-count":19,"alternative-id":["10372"],"URL":"https:\/\/doi.org\/10.1007\/s10796-023-10372-y","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,18]]},"assertion":[{"value":"18 February 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}