{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T20:17:46Z","timestamp":1776284266707,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,3]]},"DOI":"10.1109\/icecet63943.2025.11472511","type":"proceedings-article","created":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T19:42:35Z","timestamp":1775763755000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["AI-enhanced Cyber Threat Detection: Transforming Security Frameworks in Management Information Systems"],"prefix":"10.1109","author":[{"given":"Niropam","family":"Das","sequence":"first","affiliation":[{"name":"International American University,Department of Business Administration,Los Angeles,CA,United States,90010"}]},{"given":"Jahid","family":"Hassan","sequence":"additional","affiliation":[{"name":"International American University,Department of Business Administration,Los Angeles,CA,United States,90010"}]},{"given":"Partha","family":"Chakraborty","sequence":"additional","affiliation":[{"name":"International American University,Department of Business Administration,Los Angeles,CA,United States,90010"}]},{"given":"Jobanpreet","family":"Kaur","sequence":"additional","affiliation":[{"name":"Westcliff University,Department of Technology &amp; Engineering,Irvine,CA,United States,92614"}]},{"given":"Syed Nazmul","family":"Hasan","sequence":"additional","affiliation":[{"name":"Westcliff University,Department of Technology &amp; Engineering,Irvine,CA,United States,92614"}]},{"given":"Mohammad","family":"Abdul Goffer","sequence":"additional","affiliation":[{"name":"International American University,Department of Business Administration,Los Angeles,CA,United States,90010"}]},{"given":"Md Salah","family":"Uddin","sequence":"additional","affiliation":[{"name":"Westcliff University,Department of Technology &amp; Engineering,Irvine,CA,United States,92614"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.30574\/wjarr.2024.21.1.0287"},{"key":"ref2","first-page":"95","article-title":"Journal of Information Technology Case and Application Research The AI advantage: how to put the artificial intelligence revolution to work","volume":"248","author":"Davenport","year":"2018"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102225"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2021.102383"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWS48432.2020.9292388"},{"issue":"1","key":"ref6","first-page":"1","article-title":"Introducing the IBM security framework and IBM security blueprint to realize business-driven security","volume":"4528","author":"Buecker","year":"2010","journal-title":"IBM Redpaper"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-023-01945-z"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.5220\/0006639801080116"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3378727"},{"key":"ref10","article-title":"CYBER ATTACK PREDICTION USING MACHINE LEARNING ALGORITHMS","author":"Doris"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3028690"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-024-00712-x"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-024-00707-8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1049\/cmu2.12819"},{"key":"ref15","article-title":"IDS 2017 | Datasets | Research | Canadian Institute for Cybersecurity | UNB"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.69593\/ajsteme.v4i03.105"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/app13137507"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.56532\/mjsat.v4i3.306"},{"key":"ref19","article-title":"Enhancing Detection of Malicious VBA Macros in Office Documents: An Integrated Approach Employing P-Code Analysis and XGBoost-based Machine Learning Model","author":"Ahmadi","year":"2024","journal-title":"IEEE Access"},{"key":"ref20","article-title":"A unified approach to interpreting model predictions","author":"Lundberg","year":"2017"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3368377"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/icdcot61034.2024.10515433"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-97-8193-5_30"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ce2ct64011.2025.10940012"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-82907-9_7"}],"event":{"name":"2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)","location":"Paris, France","start":{"date-parts":[[2025,7,3]]},"end":{"date-parts":[[2025,7,6]]}},"container-title":["2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471878\/11471697\/11472511.pdf?arnumber=11472511","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T19:24:08Z","timestamp":1776281048000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11472511\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,3]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icecet63943.2025.11472511","relation":{},"subject":[],"published":{"date-parts":[[2025,7,3]]}}}