{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T16:46:40Z","timestamp":1778345200811,"version":"3.51.4"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T00:00:00Z","timestamp":1732579200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T00:00:00Z","timestamp":1732579200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,11,26]]},"DOI":"10.1109\/fllm63129.2024.10852472","type":"proceedings-article","created":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T18:35:23Z","timestamp":1738089323000},"page":"238-243","source":"Crossref","is-referenced-by-count":1,"title":["Empowering Cyber Defense by Unveiling AI-Powered Expert Systems and Software Engineering"],"prefix":"10.1109","author":[{"given":"Lo\u2019Ai","family":"Tawalbeh","sequence":"first","affiliation":[{"name":"Jordan University of Science and Technology,Department of Computer Engineering,Irbid,Jordan,22110"}]},{"given":"John","family":"Franklin","sequence":"additional","affiliation":[{"name":"Texas A&#x0026;M University,Department of Computing and Cyber Security,San Antonio,USA,TX 78224"}]},{"given":"Christian","family":"Ramirez","sequence":"additional","affiliation":[{"name":"Texas A&#x0026;M University,Department of Computing and Cyber Security,San Antonio,USA,TX 78224"}]},{"given":"Jonathan","family":"Garcia","sequence":"additional","affiliation":[{"name":"Texas A&#x0026;M University,Department of Computing and Cyber Security,San Antonio,USA,TX 78224"}]},{"given":"Abdelrahman","family":"Tawalbeh","sequence":"additional","affiliation":[{"name":"Johnson High School,San Antonio,USA,TX, 78259"}]},{"given":"Fadi","family":"Muheidat","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, California State University,San Bernardino,USA,CA 92407"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102537"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/0957-4174(93)90001-m"},{"key":"ref3","article-title":"Knowledge base in AI: What is it and why do you need one?","volume-title":"KMS Lighthouse.","author":"Avrahami","year":"2022"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.02.039"},{"key":"ref5","article-title":"The history of Artificial Intelligence","volume-title":"Topic: DENDRAL - The History of Artificial Intelligence - Spotlight at Stanford Search Results.","author":"Feigenbaum","year":"1990"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-020-09478-2"},{"key":"ref7","volume-title":"What is Natural Language Processing?","year":"2020"},{"key":"ref8","article-title":"What is computer programming? how to become a computer programmer?","volume-title":"Southern New Hampshire University."},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/mahc.2015.41"},{"key":"ref10","first-page":"419","article-title":"Quantifying the resilience of machine learning classifiers used for cyber security","volume-title":"Expert Systems with Applications","volume":"92","author":"Katzir","year":"2018"},{"key":"ref11","first-page":"1","article-title":"Machine learning methods for cyber security intrusion detection: Datasets and comparative study","volume-title":"Computer Networks","volume":"188","author":"Kilincer","year":"2021"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/jsen.2002.1000251"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3487043"},{"key":"ref14","volume-title":"Forward and backward chaining in Artificial Intelligence. Section","author":"Mbaabu"},{"key":"ref15","volume-title":"Forward and backward chaining in Artificial Intelligence. Section","author":"Melle","year":"1978"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/s0020-7373(78)80049-2"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.09.029"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/sym12050754"},{"key":"ref19","volume-title":"PXDES.","author":"Smith","year":"2015"},{"key":"ref20","article-title":"Global IoT market size grew 22% in 2021 \u2014 these 16 factors affect the growth trajectory to 2027","volume-title":"IoT Analytics","author":"Wegner","year":"2022"},{"key":"ref21","article-title":"Artificial Immune System (AIS) Based Intrusion Detection System (IDS) for Smart Grid Advanced Metering Infrastructure (AMI)","author":"Song","year":"2018","journal-title":"Networks"}],"event":{"name":"2024 2nd International Conference on Foundation and Large Language Models (FLLM)","location":"Dubai, United Arab Emirates","start":{"date-parts":[[2024,11,26]]},"end":{"date-parts":[[2024,11,29]]}},"container-title":["2024 2nd International Conference on Foundation and Large Language Models (FLLM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10852419\/10852420\/10852472.pdf?arnumber=10852472","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T06:47:05Z","timestamp":1738133225000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10852472\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,26]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/fllm63129.2024.10852472","relation":{},"subject":[],"published":{"date-parts":[[2024,11,26]]}}}