{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T04:02:04Z","timestamp":1749096124387,"version":"3.41.0"},"reference-count":59,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,22]]},"DOI":"10.1109\/educon62633.2025.11016426","type":"proceedings-article","created":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T17:42:47Z","timestamp":1748972567000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["Integrating Generative AI in Cybersecurity Curricula"],"prefix":"10.1109","author":[{"given":"Ban","family":"AlOmar","sequence":"first","affiliation":[{"name":"College of Information Technology, United Arab Emirates University,AlAin,UAE"}]},{"given":"Zouheir","family":"Trabelsi","sequence":"additional","affiliation":[{"name":"College of Information Technology, United Arab Emirates University,AlAin,UAE"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3397775"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3468914"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/HSI61632.2024.10613562"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3385107"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2013.6583682"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102221"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2850345"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104016"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ASRU57964.2023.10389632"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3470850"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.sciaf.2024.e02281"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00018"},{"volume-title":"Laion400m: Open dataset of clip-filtered 400 million image-text pairs","year":"2021","author":"Schuhmann","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SPW50608.2020.00021"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2018.8587327"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1016\/j.cose.2016.12.017","article-title":"Approaches to analyze cyber terrorist communities: Survey and challenges","volume":"66","author":"Saidi","year":"2017","journal-title":"Computers Security"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3299604"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/BigData59044.2023.10386116"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102763"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3175719"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104016"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12061333"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW61312.2024.00018"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/BigData59044.2023.10386611"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103999"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103430"},{"issue":"4","key":"ref28","first-page":"417","article-title":"Guide to malware incident prevention and handling for desktops and laptops","volume":"20","author":"Scarfone","year":"2013","journal-title":"International Journal of Computer Research"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03645-9"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2906934"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3300381"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/NAECON61878.2024.10670668"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.124912"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103690"},{"journal-title":"Ember: An open dataset for training static pe malware machine learning models","year":"2018","author":"Anderson","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3179384"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2008.020090"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/NaNA63151.2024.00084"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT60459.2023.10441522"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3660768"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/11908739_30"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3381521"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/RASSE60029.2023.10363477"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2018.8630761"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2022.113368"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2023.01.191"},{"key":"ref47","article-title":"Cognitive architectures for language agents","author":"Sumers","year":"2024","journal-title":"Transactions on Machine Learning Research"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3626111.3628176"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3626111.3628212"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3626111.3628194"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3626111.3628191"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3626111.3628183"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1504\/ijipt.2010.032618"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3663408.3663424"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/SPW63631.2024.00017"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3605764.3623985"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps58843.2023.10464883"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2024.3365548"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00179"}],"event":{"name":"2025 IEEE Global Engineering Education Conference (EDUCON)","start":{"date-parts":[[2025,4,22]]},"location":"London, United Kingdom","end":{"date-parts":[[2025,4,25]]}},"container-title":["2025 IEEE Global Engineering Education Conference (EDUCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11016265\/11016287\/11016426.pdf?arnumber=11016426","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T05:12:40Z","timestamp":1749013960000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11016426\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":59,"URL":"https:\/\/doi.org\/10.1109\/educon62633.2025.11016426","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]}}}