{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T00:17:45Z","timestamp":1772151465399,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,2,26]],"date-time":"2024-02-26T00:00:00Z","timestamp":1708905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,2,26]],"date-time":"2024-02-26T00:00:00Z","timestamp":1708905600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,2,26]]},"DOI":"10.1109\/iccr61006.2024.10533152","type":"proceedings-article","created":{"date-parts":[[2024,5,22]],"date-time":"2024-05-22T17:32:41Z","timestamp":1716399161000},"page":"1-5","source":"Crossref","is-referenced-by-count":7,"title":["Enhancing Cybersecurity with Artificial Neural Networks: A Study on Threat Detection and Mitigation Strategies"],"prefix":"10.1109","author":[{"given":"Atif","family":"Ali","sequence":"first","affiliation":[{"name":"Multimedia University,Research Management Centre (RMC),Cyberjaye,Malaysia,63100"}]},{"given":"Awais","family":"Zia","sequence":"additional","affiliation":[{"name":"The Superior University,Lahore,Pakistan"}]},{"given":"Abdul","family":"Razzaque","sequence":"additional","affiliation":[{"name":"MCS NUST Islamabad Pakistan"}]},{"given":"Hina","family":"Shahid","sequence":"additional","affiliation":[{"name":"University of South Asia (USA),Lahore Cantt"}]},{"given":"Haroon Tariq","family":"Sheikh","sequence":"additional","affiliation":[{"name":"Iqra University Islamabad"}]},{"given":"Muhammad","family":"Saleem","sequence":"additional","affiliation":[{"name":"School of Computer Science, Minhaj University Lahore,Lahore,Pakistan"}]},{"given":"Farhan","family":"Yousaf","sequence":"additional","affiliation":[{"name":"University of management and technology"}]},{"given":"Salman","family":"Muneer","sequence":"additional","affiliation":[{"name":"NCBA&#x0026;E,Lahore,Pakistan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/icbats57792.2023.10111470"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2023.08.032"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/5237.003.0007"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1201\/9781003404330"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICBATS54253.2022.9759076"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.31219\/osf.io\/fws46","volume-title":"Artificial intelligence in cyber security &amp; A national security research agenda for cybersecurity and artificial intelligence","author":"Vishwanath","year":"2023"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3145199"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1561\/9781680838350.ch3"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"2811","DOI":"10.1007\/s11831-023-09894-0","article-title":"Intensive Review of Drones Detection and Tracking: Linear Kalman Filter Versus Nonlinear Regression, an Analysis Case","volume":"30","author":"Zitar","year":"2023","journal-title":"Arch Computat Methods Eng"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/computers10080098"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MACS56771.2022.10023325"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-12382-5_114"},{"issue":"2","key":"ref13","first-page":"24","article-title":"Identification and Prediction of Brain Tumor Using VGG-16 Empowered with Explainable Artificial Intelligence","volume":"2","author":"Ahmed","year":"2023","journal-title":"International Journal of Computational and Innovative Sciences"},{"key":"ref14","article-title":"Smart-frame: A flexible, scalable, and secure information management framework for smart grids","volume-title":"2012 International Conference for Internet","author":"Baek"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICBATS57792.2023.10111286"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICBATS57792.2023.10111193"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-12382-5_114"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2008.09.002"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICBATS57792.2023.10111157"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICBATS57792.2023.10111263"},{"issue":"3","key":"ref21","first-page":"17","article-title":"Towards A Blockchain Enabled Integrated Library Managment System Using Hyperledger Fabric: Using Hyperledger Fabric","volume":"1","author":"Malik","year":"2022","journal-title":"International Journal of Computational and Innovative Sciences"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1201\/9781003278207-6"},{"key":"ref23","volume-title":"Technology and Secured Transactions, London, UK","year":"2012"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ITICT.2007.4475607"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"2811","DOI":"10.1007\/s11831-023-09894-0","article-title":"Intensive Review of Drones Detection and Tracking: Linear Kalman Filter Versus Nonlinear Regression, an Analysis Case","volume":"30","author":"Zitar","year":"2023","journal-title":"Arch Computat Methods Eng"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/computers10080098"}],"event":{"name":"2024 2nd International Conference on Cyber Resilience (ICCR)","location":"Dubai, United Arab Emirates","start":{"date-parts":[[2024,2,26]]},"end":{"date-parts":[[2024,2,28]]}},"container-title":["2024 2nd International Conference on Cyber Resilience (ICCR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10532252\/10532778\/10533152.pdf?arnumber=10533152","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,23]],"date-time":"2024-05-23T17:33:41Z","timestamp":1716485621000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10533152\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,26]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/iccr61006.2024.10533152","relation":{},"subject":[],"published":{"date-parts":[[2024,2,26]]}}}