{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:39:10Z","timestamp":1730227150253,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,14]]},"DOI":"10.1109\/ic3i56241.2022.10073040","type":"proceedings-article","created":{"date-parts":[[2023,3,22]],"date-time":"2023-03-22T17:34:44Z","timestamp":1679506484000},"page":"1290-1295","source":"Crossref","is-referenced-by-count":1,"title":["Integration of AI with the Cybersecurity: A detailed Systematic review with the practical issues and challenges"],"prefix":"10.1109","author":[{"given":"Melanie","family":"Lourens","sequence":"first","affiliation":[{"name":"Durban University of Technology,Faculty of Management Sciences,South Africa"}]},{"given":"Amar Prakash","family":"Dabral","sequence":"additional","affiliation":[{"name":"Graphic Era Deemed to be University,Department of Hospitality Management,Dehradun,Uttarakhand,India"}]},{"given":"Durgaprasad","family":"Gangodkar","sequence":"additional","affiliation":[{"name":"Graphic Era Deemed to be University,Department of Computer Science &#x0026; Engineering,Dehradun,Uttarakhand,India"}]},{"given":"Navjot","family":"Rathour","sequence":"additional","affiliation":[{"name":"Uttaranchal Institute of Technology Uttaranchal University,Dehradun,Uttarakhand,India"}]},{"given":"Cs Nagabhushanam","family":"Tida","sequence":"additional","affiliation":[{"name":"Koneru Lakshmaiah Education Foundation.,Department of Law,Guntur,Andhra Pradesh,India"}]},{"given":"Anupama","family":"Chadha","sequence":"additional","affiliation":[{"name":"Computer Applications MRIIRS,Faridabad"}]}],"member":"263","reference":[{"key":"ref1","article-title":"AIlogic and formalizing common sense","author":"McCarthy","year":"1990","journal-title":"Stanford University, CA USA"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.4324\/9780203859483"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/jiot.2017.2690522"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/tnsm.2018.2799000"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1631\/FITEE.1800573"},{"key":"ref7","article-title":"A Human Capital Crisis in Cybersecurity: Technical Proficiency Matters","author":"Evans","year":"2010","journal-title":"CSIS"},{"volume-title":"The Federal Cybersecurity Workforce: Background and Congressional Oversight Issues for the Departments of Defense and Homeland Security","author":"Francis","key":"ref8"},{"volume-title":"McAfee Labs Report","year":"2016","key":"ref9"},{"volume-title":"The Impact of AIin Cybersecurity","year":"2018","author":"Lidestri","key":"ref10"},{"volume-title":"The History of Artificial Intelligence,","year":"2019","author":"Anyoha","key":"ref11"},{"volume-title":"Artificial Intelligence: A Modern Approach","year":"2003","author":"Stuart J","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1515\/9780804766685"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1016\/s0377-2217(96)00378-5"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.11591\/ijpeds.v12.i3.pp1431-1438"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1201\/9781003227595-5"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1063\/5.0074225"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1063\/5.0074211"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/j.matpr.2021.11.121"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1155\/2022\/1918379"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1504\/IJCSE.2021.117016"}],"event":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","start":{"date-parts":[[2022,12,14]]},"location":"Uttar Pradesh, India","end":{"date-parts":[[2022,12,16]]}},"container-title":["2022 5th International Conference on Contemporary Computing and Informatics (IC3I)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10072015\/10072297\/10073040.pdf?arnumber=10073040","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T06:49:54Z","timestamp":1709448594000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10073040\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,14]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/ic3i56241.2022.10073040","relation":{},"subject":[],"published":{"date-parts":[[2022,12,14]]}}}