{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T21:01:11Z","timestamp":1776978071652,"version":"3.51.4"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,3]]},"DOI":"10.1109\/icecet63943.2025.11472263","type":"proceedings-article","created":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T19:42:35Z","timestamp":1775763755000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Performance optimization of Predictive Analytics Algorithm for Accurate Cyber Threat Forecasting"],"prefix":"10.1109","author":[{"given":"Md Muntakim Mizan","family":"Rihan","sequence":"first","affiliation":[{"name":"North South University,Dept. of ECE,Dhaka,Bangladesh"}]},{"given":"Md Fahad","family":"Bhuiyan","sequence":"additional","affiliation":[{"name":"North South University,Dept. of ECE,Dhaka,Bangladesh"}]},{"given":"Maher Ali","family":"Rusho","sequence":"additional","affiliation":[{"name":"Mr. R Business Corporation (NGO),Department of Computational Material &#x0026; Data Analytics,Chennai,Tamil Nadu,India"}]},{"given":"Rafat Nawaz","family":"Nehal","sequence":"additional","affiliation":[{"name":"North South University,Dept. of ECE,Dhaka,Bangladesh"}]},{"given":"Amatul Karim","family":"Lamia","sequence":"additional","affiliation":[{"name":"North South University,Dept. of ECE,Dhaka,Bangladesh"}]},{"given":"Abu Mukaddim","family":"Rahi","sequence":"additional","affiliation":[{"name":"North South University,Dept. of ECE,Dhaka,Bangladesh"}]},{"given":"Mithila","family":"Arman","sequence":"additional","affiliation":[{"name":"BRAC University,Dept. of CSE,Dhaka,Bangladesh"}]},{"given":"Md. Khurshid","family":"Jahan","sequence":"additional","affiliation":[{"name":"North South University,Dept. of ECE,Dhaka,Bangladesh"}]}],"member":"263","reference":[{"issue":"3","key":"ref1","first-page":"1430","article-title":"An innovation for energy release of nuclear fusion at short distance dielectrics in semiconductor model","volume":"8","author":"Gopi","year":"2022","journal-title":"ICTACT Journal On Microelectronics"},{"key":"ref2","first-page":"78","article-title":"The topology configuration of protocol-based local networks in high speed communication networks","volume":"15","author":"Logeshwaran","year":"2022","journal-title":"Multidisciplinary approach in research"},{"issue":"10","key":"ref3","first-page":"6354","article-title":"The smart construction for image preprocessing of mobile robotic systems using neuro fuzzy logical system approach","volume":"20","author":"Ramesh","year":"2022","journal-title":"NeuroQuantology"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/5424356"},{"issue":"8","key":"ref5","first-page":"6088","article-title":"The moment probability and impacts monitoring for electron cloud behavior of electronic computers by using quantum deep learning model","volume":"20","author":"Gopi","year":"2022","journal-title":"NeuroQuantology"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/AISC56616.2023.10085180"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CISES54857.2022.9844387"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CISES54857.2022.9844366"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2023.0140701"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2022.0130738"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2023\/17316"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/s24061716"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.30574\/wjarr.2024.21.2.0590"},{"key":"ref14","article-title":"Leveraging big data analytics to enhance machine learning algorithms","author":"Zaki","year":"2024"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.56726\/irjmets48655"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3365076"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.4018\/979-8-3693-1435-7.ch014"},{"key":"ref18","first-page":"1","article-title":"The data-driven accountant: Leveraging data analytics for improved decision-making and risk management","volume":"11","author":"Nwekwo","year":"2024","journal-title":"SADI Int. J. Manag. Account"},{"key":"ref19","article-title":"Deep packet inspection: Leveraging machine learning for efficient network security analysis","author":"Hussain"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.54254\/2755-2721\/67\/2024MA0053"}],"event":{"name":"2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)","location":"Paris, France","start":{"date-parts":[[2025,7,3]]},"end":{"date-parts":[[2025,7,6]]}},"container-title":["2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471878\/11471697\/11472263.pdf?arnumber=11472263","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T19:59:14Z","timestamp":1776974354000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11472263\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,3]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icecet63943.2025.11472263","relation":{},"subject":[],"published":{"date-parts":[[2025,7,3]]}}}