{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T03:31:09Z","timestamp":1777951869901,"version":"3.51.4"},"reference-count":51,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"vor","delay-in-days":31,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1016\/j.procs.2026.01.097","type":"journal-article","created":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T19:30:19Z","timestamp":1774035019000},"page":"843-854","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["Elevating Cybersecurity Strategies with the Insights of Explainable AI"],"prefix":"10.1016","volume":"275","author":[{"given":"Hayder Makki","family":"Shakir","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Doaa I.","family":"Hasan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mustafa Hamid","family":"Abd Alsadh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Amjed Abbas","family":"Ahmed","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hamsa E.","family":"Mahmood","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nuha Jameel","family":"Ibrahim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Taher M.","family":"Ghazal","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2026.01.097_bib1","doi-asserted-by":"crossref","unstructured":"[N. Moustafa, N. Koroniotis, M. Keshk, A. Y. Zomaya, and Z. Tari, \u201cExplainable Intrusion Detection for Cyber Defences in the Internet of Things: Opportunities and Solutions,\u201d IEEE Communications Surveys and Tutorials, vol. 25, no. 3, 2023, doi: 10.1109\/COMST.2023.3280465.","DOI":"10.1109\/COMST.2023.3280465"},{"key":"10.1016\/j.procs.2026.01.097_bib2","doi-asserted-by":"crossref","unstructured":"M. Zolanvari, Z. Yang, K. Khan, R. Jain, and N. Meskin, \u201cTRUST XAI: Model-Agnostic Explanations for AI With a Case Study on IIoT Security,\u201d IEEE Internet Things J, vol. 10, no. 4, 2023, doi: 10.1109\/JIOT.2021.3122019.","DOI":"10.1109\/JIOT.2021.3122019"},{"key":"10.1016\/j.procs.2026.01.097_bib3","doi-asserted-by":"crossref","unstructured":"M. Nyre-Yu, E. Morris, M. Smith, B. Moss, and C. Smutz, \u201cExplainable AI in Cybersecurity Operations: Lessons Learned from xAI Tool Deployment,\u201d 2023. doi: 10.14722\/usec.2022.23014.","DOI":"10.14722\/usec.2022.23014"},{"key":"10.1016\/j.procs.2026.01.097_bib4","doi-asserted-by":"crossref","unstructured":"R. Srinivasan, M. Kavitha, R. Kavitha, and S. Uma, \u201cCybersecurity and Artificial Intelligence: A Systematic Literature Review,\u201d in Recent Trends in Computational Intelligence and Its Application, 2023. doi: 10.1201\/9781003388913-45.","DOI":"10.1201\/9781003388913-45"},{"key":"10.1016\/j.procs.2026.01.097_bib5","doi-asserted-by":"crossref","unstructured":"P. Ramya, S. Venkatesh Babu, and G. Venkatesan, \u201cAdvancing Cybersecurity with Explainable Artificial Intelligence: A Review of the Latest Research,\u201d in Proceedings of the 5th International Conference on Inventive Research in Computing Applications, ICIRCA 2023, 2023. doi: 10.1109\/ICIRCA57980.2023.10220797.","DOI":"10.1109\/ICIRCA57980.2023.10220797"},{"key":"10.1016\/j.procs.2026.01.097_bib6","doi-asserted-by":"crossref","unstructured":"G. Almahadin, H. A. Owida, J. I. Al-Nabulsi, N. Turab, and N. Al Hawamdeh, \"A novel multi-objective wrapper-based feature selection method using quantum-inspired and swarm intelligence techniques,\" IAES International Journal of Artificial Intelligence, vol. 13, no. 3, pp. 2862-2869, 2024, doi: 10.11591\/ijai.v13.i3.pp2862-2869.","DOI":"10.11591\/ijai.v13.i3.pp2862-2869"},{"key":"10.1016\/j.procs.2026.01.097_bib7","doi-asserted-by":"crossref","unstructured":"S. Ahmad, M. Zaman, A. S. Al-Shamayleh, T. Kehkashan, R. Ahmad, S. I. M. Abdulhamid, I. Ergen, and A. Akhunzada, \"Across the spectrum in-depth review AI-based models for phishing detection,\" IEEE Open Journal of the Communications Society, 2024, doi: 10.1109\/OJCOMS.2024.3462503.","DOI":"10.1109\/OJCOMS.2024.3462503"},{"issue":"Special2","key":"10.1016\/j.procs.2026.01.097_bib8","first-page":"163","article-title":"\"Psychological health and environmental effect of using green recycled amassed concrete on construction,\"","volume":"5","author":"Louzi","year":"2022","journal-title":"Journal for ReAttach Therapy and Developmental Diversities"},{"key":"10.1016\/j.procs.2026.01.097_bib9","doi-asserted-by":"crossref","first-page":"750","DOI":"10.1109\/SSD61670.2024.10549617","article-title":"\"A dual-port, and single-element planar inverted-F antenna for current 4G\/5G portable applications,\"","author":"Alja\u2019Afreh","year":"2024","journal-title":"in 2024 21st International Multi-Conference on Systems, Signals and Devices (SSD)"},{"key":"10.1016\/j.procs.2026.01.097_bib10","doi-asserted-by":"crossref","unstructured":"Z. A. El Houda, B. Brik, and L. Khoukhi, \u201c\u2018Why Should I Trust Your IDS?\u2019: An Explainable Deep Learning Framework for Intrusion Detection Systems in Internet of Things Networks,\u201d IEEE Open Journal of the Communications Society, vol. 3, 2022, doi: 10.1109\/OJCOMS.2022.3188750.","DOI":"10.1109\/OJCOMS.2022.3188750"},{"key":"10.1016\/j.procs.2026.01.097_bib11","doi-asserted-by":"crossref","unstructured":"G. De Bernardi, S. Narteni, E. Cambiaso, and M. Mongelli, \u201cRule-Based Out-of-Distribution Detection,\u201d IEEE Transactions on Artificial Intelligence, vol. 5, no. 6, 2024, doi: 10.1109\/TAI.2023.3323923.","DOI":"10.1109\/TAI.2023.3323923"},{"key":"10.1016\/j.procs.2026.01.097_bib12","doi-asserted-by":"crossref","unstructured":"T. I. Alhadidi, S. T. Matarneh, and A. A. Tahoon, \"The feasibility and operational performance of implementation median U-turn intersections: A CRITIC method,\" Periodica Polytechnica Transportation Engineering, vol. 52, no. 3, pp. 257-269, 2024, doi: 10.3311\/PPtr.23354.","DOI":"10.3311\/PPtr.23354"},{"key":"10.1016\/j.procs.2026.01.097_bib13","doi-asserted-by":"crossref","unstructured":"A. Munther, M. M. Abualhaj, A. Alalousi, and H. A. Fadhil, \"A significant features vector for internet traffic classification based on multi-features selection techniques and ranker, voting filters,\" International Journal of Electrical and Computer Engineering, vol. 14, no. 6, pp. 6958-6968, 2024, doi: 10.11591\/ijece.v14i6.pp6958-6968.","DOI":"10.11591\/ijece.v14i6.pp6958-6968"},{"key":"10.1016\/j.procs.2026.01.097_bib14","doi-asserted-by":"crossref","unstructured":"W. Toghuj and Y. Alraba\u2019nah, \"A two-stage approach for aircraft detection with convolutional neural network,\" International Journal of Electrical and Computer Engineering, vol. 14, no. 4, pp. 4627-4635, 2024, doi: 10.11591\/ijece.v14i4.pp4627-4635.","DOI":"10.11591\/ijece.v14i4.pp4627-4635"},{"key":"10.1016\/j.procs.2026.01.097_bib15","doi-asserted-by":"crossref","unstructured":"R. O. K. Alshawabkeh, \"Corporate social responsibility and green human resource practices in Jordan: triple-bottom approach,\" International Journal of Business Information Systems, vol. 47, no. 1, pp. 38-49, 2024, doi: 10.1504\/IJBIS.2024.142188.","DOI":"10.1504\/IJBIS.2024.142188"},{"key":"10.1016\/j.procs.2026.01.097_bib16","doi-asserted-by":"crossref","unstructured":"H. Kanaker, M. Tarawneh, N. A. Karim, A. Alsaaidah, M. Abuhamdeh, O. Qtaish, E. Alhroob, and Z. Alhalhouli, \"A comparative study of machine learning tools for detecting Trojan horse infections in cloud computing environments,\" International Journal of Electrical and Computer Engineering, vol. 14, no. 6, pp. 6642-6655, 2024, doi: 10.11591\/ijece.v14i6.pp6642-6655.","DOI":"10.11591\/ijece.v14i6.pp6642-6655"},{"key":"10.1016\/j.procs.2026.01.097_bib17","doi-asserted-by":"crossref","DOI":"10.3389\/fpubh.2021.737149","article-title":"\"Fischer linear discrimination and quadratic discrimination analysis\u2013based data mining technique for internet of things framework for healthcare,\"","volume":"9","author":"Hasan","year":"2021","journal-title":"Frontiers in Public Health"},{"key":"10.1016\/j.procs.2026.01.097_bib18","doi-asserted-by":"crossref","unstructured":"I. Asi and A. Al-Asi, \"Transformer-based named entity recognition in construction supply chain risk management in Australia,\" International Journal of Transportation Science and Technology, vol. 15, pp. 198-210, 2024, doi: 10.1016\/j.ijtst.2023.08.006.","DOI":"10.1016\/j.ijtst.2023.08.006"},{"key":"10.1016\/j.procs.2026.01.097_bib19","doi-asserted-by":"crossref","unstructured":"A. S. Al-Adwan, \"The meta-commerce paradox: exploring consumer non-adoption intentions,\" Online Information Review, vol. 48, no. 6, 2024, doi: 10.1108\/OIR-01-2024-0017.","DOI":"10.1108\/OIR-01-2024-0017"},{"key":"10.1016\/j.procs.2026.01.097_bib20","doi-asserted-by":"crossref","unstructured":"A. Nadeem et al., \u201cSoK: Explainable Machine Learning for Computer Security Applications,\u201d in Proceedings - 8th IEEE European Symposium on Security and Privacy, Euro S and P 2023, 2023. doi: 10.1109\/EuroSP57164.2023.00022.","DOI":"10.1109\/EuroSP57164.2023.00022"},{"key":"10.1016\/j.procs.2026.01.097_bib21","doi-asserted-by":"crossref","unstructured":"E. C. Nkoro, J. N. Njoku, C. I. Nwakanma, J. M. Lee, and D. S. Kim, \u201cZero-Trust Marine Cyberdefense for IoT-Based Communications: An Explainable Approach,\u201d Electronics (Switzerland), vol. 13, no. 2, 2024, doi: 10.3390\/electronics13020276.","DOI":"10.3390\/electronics13020276"},{"issue":"5","key":"10.1016\/j.procs.2026.01.097_bib22","article-title":"\u201cHybrid Intrusion Detection Systems Based Mean-Variance Mapping Optimization Algorithm and Random Search.,\u201d","volume":"16","author":"Albukhnefis","year":"2023","journal-title":"International Journal of Intelligent Engineering & Systems"},{"key":"10.1016\/j.procs.2026.01.097_bib23","doi-asserted-by":"crossref","unstructured":"S. Nafaa, K. Ashour, R. Mohamed, H. Essam, E. D. Emad, M. Elhenawy, H. I. Ashqar, A. A. Hassan, and T. I. Alhadidi, \"Automated pavement cracks detection and classification using deep learning,\" in 2024 IEEE 3rd International Conference on Computing and Machine Intelligence (ICMI 2024), 2024, doi: 10.1109\/ICMI60790.2024.10586098.","DOI":"10.1109\/ICMI60790.2024.10586098"},{"key":"10.1016\/j.procs.2026.01.097_bib24","doi-asserted-by":"crossref","unstructured":"V. Tirumalaisamy, A. Vasudevan, R. Balakrishnan, S. I. S. Mohammad, A. Vasumathi, A. S. Al-Adwan, and B. Al Kurdi, \"Key success factors in entrepreneurial development among women micro-entrepreneurs in Malaysia,\" International Review of Management and Marketing, vol. 14, no. 6, 2024, doi: 10.32479\/irmm.17604.","DOI":"10.32479\/irmm.17604"},{"issue":"3","key":"10.1016\/j.procs.2026.01.097_bib25","article-title":"\u201cEfficient Two-Stage Intrusion Detection System Based on Hybrid Feature Selection Techniques and Machine Learning Classifiers.,\u201d","volume":"18","author":"Madhloom Kurdi","year":"2025","journal-title":"International Journal of Intelligent Engineering & Systems"},{"key":"10.1016\/j.procs.2026.01.097_bib26","doi-asserted-by":"crossref","unstructured":"M. P. S. Lorente, E. M. Lopez, L. A. Florez, A. L. Espino, J. A. I. Mart\u00ednez, and A. S. de Miguel, \u201cExplaining deep learning-based driver models,\u201d Applied Sciences (Switzerland), vol. 11, no. 8, 2021, doi: 10.3390\/app11083321.","DOI":"10.3390\/app11083321"},{"key":"10.1016\/j.procs.2026.01.097_bib27","doi-asserted-by":"crossref","unstructured":"M. AL-Essa, G. Andresini, A. Appice, and D. Malerba, \u201cXAI to Explore Robustness of Features in Adversarial Training for Cybersecurity,\u201d in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2022. doi: 10.1007\/978-3-031-16564-1_12.","DOI":"10.1007\/978-3-031-16564-1_12"},{"key":"10.1016\/j.procs.2026.01.097_bib28","doi-asserted-by":"crossref","unstructured":"Y. Lee, Y. Lee, E. Lee, and T. Lee, \u201cExplainable Artificial Intelligence-Based Model Drift Detection Applicable to Unsupervised Environments,\u201d Computers, Materials and Continua, vol. 76, no. 2, 2023, doi: 10.32604\/cmc.2023.040235.","DOI":"10.32604\/cmc.2023.040235"},{"key":"10.1016\/j.procs.2026.01.097_bib29","doi-asserted-by":"crossref","unstructured":"H. Suryotrisongko, Y. Musashi, A. Tsuneda, and K. Sugitani, \u201cRobust Botnet DGA Detection: Blending XAI and OSINT for Cyber Threat Intelligence Sharing,\u201d IEEE Access, vol. 10, 2022, doi: 10.1109\/ACCESS.2022.3162588.","DOI":"10.1109\/ACCESS.2022.3162588"},{"key":"10.1016\/j.procs.2026.01.097_bib30","doi-asserted-by":"crossref","unstructured":"G. Rjoub et al., \u201cA Survey on Explainable Artificial Intelligence for Cybersecurity,\u201d IEEE Transactions on Network and Service Management, vol. 20, no. 4, 2023, doi: 10.1109\/TNSM.2023.3282740.","DOI":"10.1109\/TNSM.2023.3282740"},{"key":"10.1016\/j.procs.2026.01.097_bib31","doi-asserted-by":"crossref","unstructured":"G. Almahadin, H. A. Owida, J. I. Al-Nabulsi, N. Turab, and N. Al Hawamdeh, \"Automated detection of kidney masses lesions using a deep learning approach,\" IAES International Journal of Artificial Intelligence, vol. 13, no. 3, pp. 2862-2869, 2024, doi: 10.11591\/ijai.v13.i3.pp2862-2869.","DOI":"10.11591\/ijai.v13.i3.pp2862-2869"},{"key":"10.1016\/j.procs.2026.01.097_bib32","doi-asserted-by":"crossref","unstructured":"T. M. Ghazal, M. K. Hasan, H. M. Alzoubi, M. Al Hmmadi, N. A. Al-Dmour, S. Islam, R. Kamran, and B. Mago, \"Securing smart cities using blockchain technology,\" in 2022 1st International Conference on AI in Cybersecurity (ICAIC), 2022.","DOI":"10.1109\/ICAIC53980.2022.9896971"},{"key":"10.1016\/j.procs.2026.01.097_bib33","doi-asserted-by":"crossref","unstructured":"S. U. Rehman, Y. H. Hamdan, and N. Abidi, \"Big data analytics capabilities, green intellectual capital, supply chain innovations and sustainable supply chain performance,\" Operations and Supply Chain Management, vol. 17, no. 3, pp. 222-235, 2024, doi: 10.31387\/oscm0580438.","DOI":"10.31387\/oscm0580438"},{"issue":"4","key":"10.1016\/j.procs.2026.01.097_bib34","doi-asserted-by":"crossref","first-page":"1628","DOI":"10.11591\/ijai.v12.i4.pp1628-1635","article-title":"\"Efficient method for finding nearest neighbors in flocking behaviors using k-dimensional trees,\"","volume":"12","author":"Al-Tawil","year":"2023","journal-title":"IAES International Journal of Artificial Intelligence"},{"key":"10.1016\/j.procs.2026.01.097_bib35","doi-asserted-by":"crossref","unstructured":"A. H. Alomari and T. I. Alhadidi, \"A stochastic approach for modeling the saturation flow rate at traffic signals in Jordan,\" Iranian Journal of Science and Technology - Transactions of Civil Engineering, vol. 48, no. 5, pp. 3775-3786, 2024, doi: 10.1007\/s40996-024-01441-6.","DOI":"10.1007\/s40996-024-01441-6"},{"issue":"2","key":"10.1016\/j.procs.2026.01.097_bib36","first-page":"235","article-title":"\"A hybrid sentiment discourse analysis model for Ukraine crisis Facebook posts with a Jordanian dialect,\"","volume":"15","author":"Jaradat","year":"2023","journal-title":"International Journal of Advances in Soft Computing and its Applications"},{"key":"10.1016\/j.procs.2026.01.097_bib37","doi-asserted-by":"crossref","unstructured":"A. Kuppa and N. A. Le-Khac, \u201cAdversarial XAI Methods in Cybersecurity,\u201d IEEE Transactions on Information Forensics and Security, vol. 16, 2021, doi: 10.1109\/TIFS.2021.3117075.","DOI":"10.1109\/TIFS.2021.3117075"},{"key":"10.1016\/j.procs.2026.01.097_bib38","doi-asserted-by":"crossref","unstructured":"N. Capuano, G. Fenza, V. Loia, and C. Stanzione, \u201cExplainable Artificial Intelligence in CyberSecurity: A Survey,\u201d IEEE Access, vol. 10, 2022, doi: 10.1109\/ACCESS.2022.3204171.","DOI":"10.1109\/ACCESS.2022.3204171"},{"key":"10.1016\/j.procs.2026.01.097_bib39","doi-asserted-by":"crossref","unstructured":"F. Charmet et al., \u201cExplainable artificial intelligence for cybersecurity: a literature survey,\u201d Annales des Telecommunications\/Annals of Telecommunications, vol. 77, no. 11\u201312, 2022, doi: 10.1007\/s12243-022-00926-7.","DOI":"10.1007\/s12243-022-00926-7"},{"key":"10.1016\/j.procs.2026.01.097_bib40","doi-asserted-by":"crossref","first-page":"031","DOI":"10.28945\/5071","article-title":"\"Investigating the adoption of social commerce: A case study of SMEs in Jordan,\"","volume":"18","author":"Trawnih","year":"2023","journal-title":"Interdisciplinary Journal of Information Knowledge and Management"},{"key":"10.1016\/j.procs.2026.01.097_bib41","first-page":"2023","article-title":"\"Fused weighted federated deep extreme machine learning based on intelligent lung cancer disease prediction model for healthcare 5.0,\"","author":"Abbas","year":"2023","journal-title":"International Journal of Intelligent Systems"},{"key":"10.1016\/j.procs.2026.01.097_bib42","doi-asserted-by":"crossref","unstructured":"M. Altayeb, A. Arabiat, and A. Al-Ghraibah, \"Detection and classification of pneumonia using the Orange3 data mining tool,\" International Journal of Electrical and Computer Engineering, vol. 14, no. 6, pp. 6894-6903, 2024, doi: 10.11591\/ijece.v14i6.pp6894-6903.","DOI":"10.11591\/ijece.v14i6.pp6894-6903"},{"issue":"3","key":"10.1016\/j.procs.2026.01.097_bib43","article-title":"\"Artificial intelligence (AI) challenges and opportunities in translation: An African experience,\"","volume":"2","author":"Bedu","year":"2024","journal-title":"Al-Noor Journal for Humanities"},{"key":"10.1016\/j.procs.2026.01.097_bib44","article-title":"\"Digital transformation of society: The impact of artificial intelligence on consumer protection,\"","volume":"1","author":"Saleh","year":"2024","journal-title":"Alnoor Journal for Legal Studies, no."},{"key":"10.1016\/j.procs.2026.01.097_bib45","series-title":"\"Evaluating the performance of three classification methods in diagnosis of Parkinson\u2019s disease,\" in Proceedings of the Third International Conference on Soft Computing and Data Mining (SCDM 2018), Johor, Malaysia, Feb. 6\u20137, 2018, pp. 43\u201352","author":"Mostafa","year":"2018"},{"key":"10.1016\/j.procs.2026.01.097_bib46","doi-asserted-by":"crossref","unstructured":"A. \u0160ar\u010devi\u0107, D. Pintar, M. Vrani\u0107, and A. Krajna, \u201cCybersecurity Knowledge Extraction Using XAI,\u201d Applied Sciences (Switzerland), vol. 12, no. 17, 2022, doi: 10.3390\/app12178669.","DOI":"10.3390\/app12178669"},{"key":"10.1016\/j.procs.2026.01.097_bib47","doi-asserted-by":"crossref","unstructured":"A. Rawal, J. McCoy, D. B. Rawat, B. M. Sadler, and R. S. Amant, \u201cRecent Advances in Trustworthy Explainable Artificial Intelligence: Status, Challenges, and Perspectives,\u201d 2022. doi: 10.1109\/TAI.2021.3133846.","DOI":"10.36227\/techrxiv.17054396.v1"},{"issue":"6","key":"10.1016\/j.procs.2026.01.097_bib48","article-title":"\u201cEfficient Hybrid Feature Engineering and Supervised Learning Approach for Network Traffic Classification in Intrusion Detection Systems.,\u201d","volume":"18","author":"Albu-Salih","year":"2025","journal-title":"International Journal of Intelligent Engineering & Systems"},{"key":"10.1016\/j.procs.2026.01.097_bib49","series-title":"\u201cA Special Design of Job Dropout Faces Detection and Recognition System (JDFDRs),\u201d presented at the 2021 International Conference on Advanced Computer Applications (ACA)","first-page":"138","author":"Laklook","year":"2021"},{"key":"10.1016\/j.procs.2026.01.097_bib50","unstructured":"M. H. Mohammed, M. N. Kadhim, D. Al-Shammary, and A. Ibaida, \u201cEEG-Based Emotion Detection Using Roberts Similarity and PSO Feature Selection,\u201d IEEE Access, 2025."},{"issue":"6","key":"10.1016\/j.procs.2026.01.097_bib51","article-title":"\u201cA Novel Taneja Distance-based Classifier with PSO-Optimized Feature Selection for Efficient 5G Network Slicing.,\u201d","volume":"18","author":"Malik","year":"2025","journal-title":"International Journal of Intelligent Engineering & Systems"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926000980?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050926000980?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T11:13:46Z","timestamp":1777893226000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050926000980"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":51,"alternative-id":["S1877050926000980"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2026.01.097","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Elevating Cybersecurity Strategies with the Insights of Explainable AI","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2026.01.097","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}