{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:33:29Z","timestamp":1772120009995,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,14]]},"DOI":"10.1109\/ic3i56241.2022.10072877","type":"proceedings-article","created":{"date-parts":[[2023,3,22]],"date-time":"2023-03-22T17:34:44Z","timestamp":1679506484000},"page":"247-250","source":"Crossref","is-referenced-by-count":7,"title":["The Empirical Analysis of Artificial Intelligence Approaches for Enhancing the Cyber Security for Better Quality"],"prefix":"10.1109","author":[{"given":"Bhupender Singh","family":"Rawat","sequence":"first","affiliation":[{"name":"COER University Roorkee,Uttarakhand"}]},{"given":"Durgaprasad","family":"Gangodkar","sequence":"additional","affiliation":[{"name":"Graphic Era Deemed to be University Dehradun,Department of Computer Science &#x0026; Engineering,Uttarakhand,India"}]},{"given":"Veera","family":"Talukdar","sequence":"additional","affiliation":[{"name":"The Assam Kaziranga University Jorhat,Assam,India"}]},{"given":"Komal","family":"Saxena","sequence":"additional","affiliation":[{"name":"Amity institute of Information Technology,Amity University,Uttar Pradesh,Noida"}]},{"given":"Chamandeep","family":"Kaur","sequence":"additional","affiliation":[{"name":"Jazan University,Department of CS &#x0026; IT,Saudi Arabia"}]},{"given":"Suryabhan Pratap","family":"Singh","sequence":"additional","affiliation":[{"name":"Institute of Engineering and Technology Deen Dayal Upadhyaya,Gorakhpur University,Department of Information Technology,Gorakhpur,India"}]}],"member":"263","reference":[{"issue":"4","key":"ref1","first-page":"1069","article-title":"Securing Data Stored in Clouds Using Privacy Preserving Authenticated Access Control","volume":"3","author":"Bharathy","year":"2014","journal-title":"Proc. IJCSMC"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/cloudtech.2015.7336985"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883910"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653678"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.17762\/ijritcc2321-8169.150493"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.38"},{"issue":"9","key":"ref7","article-title":"Authentication of data storage using decentralized access control in clouds","volume":"5","author":"Vijayalakshmi","year":"2014","journal-title":"Journal of Global Research in Computer Science"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/90.836475"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/30.826377"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2631"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1992.213269"},{"key":"ref12","article-title":"National Institute of Standard and Technology","year":"2011","journal-title":"The NIST definition of cloud computing"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002WCM\/1203"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DICTAP.2012.6215350"},{"key":"ref15","first-page":"119","article-title":"Survey on The Applications of Artificial Intelligence in Cyber Security, ITU, and WCIT","volume-title":"th International Conference on Cyber Conflict: Architectures in Cyberspace","author":"Atiku"},{"issue":"4","key":"ref16","article-title":"Developing Cyber Security Asset Management framework., (IJARAI) International Journal of Advanced Research in Artificial Intelligence","volume":"2","author":"Kohli","year":"2018"},{"issue":"2","key":"ref17","article-title":"Distributed Intrusion Detection System Using P2P Agent Mining Scheme","volume":"5","author":"Oriola","year":"2020","journal-title":"African Journal of Computing & ICT"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2008.10.015"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/RoEduNet.2013.6714184"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2799210"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2014.8.1.23"}],"event":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","location":"Uttar Pradesh, India","start":{"date-parts":[[2022,12,14]]},"end":{"date-parts":[[2022,12,16]]}},"container-title":["2022 5th International Conference on Contemporary Computing and Informatics (IC3I)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10072015\/10072297\/10072877.pdf?arnumber=10072877","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T06:06:46Z","timestamp":1710396406000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10072877\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,14]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/ic3i56241.2022.10072877","relation":{},"subject":[],"published":{"date-parts":[[2022,12,14]]}}}