{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:04:28Z","timestamp":1730235868614,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,2,26]],"date-time":"2024-02-26T00:00:00Z","timestamp":1708905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,2,26]],"date-time":"2024-02-26T00:00:00Z","timestamp":1708905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,2,26]]},"DOI":"10.1109\/iccr61006.2024.10532953","type":"proceedings-article","created":{"date-parts":[[2024,5,22]],"date-time":"2024-05-22T17:32:41Z","timestamp":1716399161000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["The Synergy of Artificial Intelligence and Cybersecurity"],"prefix":"10.1109","author":[{"given":"Atif","family":"Ali","sequence":"first","affiliation":[{"name":"Multimedia University,Research Management Centre (RMC),Cyberjaye,Malaysia,63100"}]},{"given":"Shahzad","family":"Ahmed","sequence":"additional","affiliation":[{"name":"MCS NUST,Islamabad"}]},{"given":"Muhammad","family":"Hussain","sequence":"additional","affiliation":[{"name":"School of Computer Science, Minhaj University,Lahore,Pakistan"}]},{"given":"Talat Ahmad","family":"Bhutta","sequence":"additional","affiliation":[{"name":"NUML,Islamabad"}]},{"given":"Ali","family":"Raza","sequence":"additional","affiliation":[{"name":"University of Gujrat,Pakistan"}]},{"given":"Muhammad Waqas","family":"Nadeem","sequence":"additional","affiliation":[{"name":"School of Computer Science, Minhaj University,Lahore,Pakistan"}]},{"given":"Yasir Khan","family":"Jadoon","sequence":"additional","affiliation":[{"name":"HITEC University,Taxila,Pakistan"}]},{"given":"Farman","family":"Ali","sequence":"additional","affiliation":[{"name":"School of Computer Science, Minhaj University,Lahore,Pakistan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1201\/9781003404330"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.26521\/profuturo\/2023\/1\/13334"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICBATS57792.2023.10111151"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/iccr56254.2022.9995821"},{"key":"ref5","first-page":"40","article-title":"Study on Secret Sharing Schemes (SSS) and their applications","volume-title":"2011 International Conference for Internet Technology and Secured Transactions","author":"Al Ebri"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/computers10080098"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-023-09894-0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCR56254.2022.9995807"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.2339\/politeknik.1063104"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/iccr56254.2022.9995978"},{"issue":"2","key":"ref11","first-page":"24","article-title":"Identification and Prediction of Brain Tumor Using VGG-16 Empowered with Explainable Artificial Intelligence","volume":"2","author":"Ahmed","year":"2023","journal-title":"International Journal of Computational and Innovative Sciences"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICBATS57792.2023.10111286"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICBATS57792.2023.10111193"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICBATS57792.2023.10111157"},{"key":"ref15","first-page":"15","article-title":"Peer-to-Peer Protocols for Resource Discovery in the Grid\u201d, The International Conference on Parallel and Distributed Computing and Networks \u201cPDCN\u201d","volume-title":"Innsbruck, Austria","author":"Al-Dmour"},{"issue":"3","key":"ref16","first-page":"17","article-title":"Towards A Blockchain Enabled Integrated Library Managment System Using Hyperledger Fabric: Using Hyperledger Fabric","volume":"1","author":"Malik","year":"2022","journal-title":"International Journal of Computational and Innovative Sciences"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1201\/9781003278207-6"},{"article-title":"Smart-frame: A flexible, scalable, and secure information management framework for smart grids","volume-title":"2012 International Conference for Internet Technology and Secured Transactions","author":"Baek","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/s22197483"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/8334927"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIC53980.2022.9897036"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-12382-5_114"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2021.102581"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.019706"}],"event":{"name":"2024 2nd International Conference on Cyber Resilience (ICCR)","start":{"date-parts":[[2024,2,26]]},"location":"Dubai, United Arab Emirates","end":{"date-parts":[[2024,2,28]]}},"container-title":["2024 2nd International Conference on Cyber Resilience (ICCR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10532252\/10532778\/10532953.pdf?arnumber=10532953","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,4]],"date-time":"2024-07-04T17:27:35Z","timestamp":1720114055000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10532953\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,26]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/iccr61006.2024.10532953","relation":{},"subject":[],"published":{"date-parts":[[2024,2,26]]}}}