{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T15:24:27Z","timestamp":1762183467276,"version":"build-2065373602"},"reference-count":54,"publisher":"Informa UK Limited","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"DOI":"10.1080\/19393555.2025.2575773","type":"journal-article","created":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T14:34:40Z","timestamp":1762180480000},"page":"1-17","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":0,"title":["Comparative analysis of cybersecurity artificial intelligence frameworks"],"prefix":"10.1080","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6758-4843","authenticated-orcid":false,"given":"Fernando Lu\u00eds","family":"Almeida","sequence":"first","affiliation":[{"name":"Corvinus Institute for Advanced Studies","place":["Budapest, Hungary"]}]}],"member":"301","published-online":{"date-parts":[[2025,11,3]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.glmedi.2024.100051"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jjimei.2023.100193"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2024.102922"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3491373"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2023.108109"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2022.103623"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2024.152015"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.54569\/aair.1709628"},{"key":"e_1_3_2_10_1","volume-title":"Thematic analysis: A practical guide","author":"Braun V.","year":"2021","unstructured":"Braun, V., & Clarke, V. (2021). Thematic analysis: A practical guide. SAGE Publications."},{"key":"e_1_3_2_11_1","unstructured":"Chakraborty A. (2025). AI-driven data leaks hit 68% of firms finds report. https:\/\/www.techmonitor.ai\/technology\/cybersecurity\/ai-driven-data-leaks-affect-68-firms-report"},{"key":"e_1_3_2_12_1","unstructured":"Derrick M. (2025). IBM\u2019s cost of a data breach report on risks of AI breaches. https:\/\/cybermagazine.com\/news\/ibms-cost-of-a-data-breach-report-on-risks-of-ai-breaches"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23031151"},{"key":"e_1_3_2_14_1","volume-title":"ENISA threat Landscape 2024","author":"ENISA","year":"2024","unstructured":"ENISA. (2024). ENISA threat Landscape 2024. European Union Agency for Cybersecurity."},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/10439463.2023.2211813"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1177\/16094069241244856"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2023.e14379"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s43681-024-00443-4"},{"key":"e_1_3_2_19_1","volume-title":"IBM introduces New generative AI-Powered cybersecurity Assistant for threat detection and response services","author":"IBM","year":"2024","unstructured":"IBM. (2024). IBM introduces New generative AI-Powered cybersecurity Assistant for threat detection and response services. IBM Newsroom."},{"key":"e_1_3_2_20_1","volume-title":"ISO\/IEC 42001: 2023","author":"ISO","year":"2023","unstructured":"ISO. (2023). ISO\/IEC 42001: 2023. International Organization for Standardization."},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dim.2023.100063"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-024-10811-5"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dim.2024.100078"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/13511610.2024.2349626"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.101804"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-97204-y"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.3390\/soc14120271"},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/13669877.2024.2350720"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.3390\/smartcities6060153"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1186\/s43093-025-00462-5"},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s43681-024-00427-4"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103964"},{"key":"e_1_3_2_33_1","volume-title":"Microsoft security Copilot","author":"Microsoft","year":"2025","unstructured":"Microsoft. (2025). Microsoft security Copilot. Microsoft Corporation."},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-025-02429-y"},{"key":"e_1_3_2_35_1","volume-title":"MITRE ATLAS: The essential guide","author":"Nighfall A. I.","year":"2025","unstructured":"Nighfall, A. I. (2025). MITRE ATLAS: The essential guide. Nightfall."},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2024.2439609"},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-024-01028-y"},{"key":"e_1_3_2_38_1","unstructured":"Potti S. (2023). New AI capabilities that can help address your security challenges. Google Cloud."},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s43681-023-00258-9"},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.1080\/0960085X.2024.2345867"},{"key":"e_1_3_2_41_1","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2025.2463722"},{"key":"e_1_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.3390\/computers9010018"},{"key":"e_1_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2023.100647"},{"key":"e_1_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.3390\/jcp5020012"},{"key":"e_1_3_2_45_1","doi-asserted-by":"publisher","DOI":"10.4236\/jilsa.2024.163010"},{"key":"e_1_3_2_46_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-024-00957-y"},{"key":"e_1_3_2_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2024.05.007"},{"key":"e_1_3_2_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.copsyc.2024.101837"},{"key":"e_1_3_2_49_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.AI.100-1"},{"key":"e_1_3_2_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.plas.2025.100183"},{"key":"e_1_3_2_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2022.101685"},{"key":"e_1_3_2_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2025.104309"},{"key":"e_1_3_2_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-52272-7_4"},{"key":"e_1_3_2_54_1","doi-asserted-by":"publisher","DOI":"10.1561\/3300000039"},{"key":"e_1_3_2_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2025.109716"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2025.2575773","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T14:34:43Z","timestamp":1762180483000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2025.2575773"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,3]]},"references-count":54,"alternative-id":["10.1080\/19393555.2025.2575773"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2025.2575773","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"value":"1939-3555","type":"print"},{"value":"1939-3547","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,3]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2025-11-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}