{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:49:32Z","timestamp":1740102572707,"version":"3.37.3"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,10]],"date-time":"2023-10-10T00:00:00Z","timestamp":1696896000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,10]],"date-time":"2023-10-10T00:00:00Z","timestamp":1696896000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004515","name":"Universiti Kebangsaan Malaysia (UKM)","doi-asserted-by":"publisher","award":["PP-FTSM-2023"],"award-info":[{"award-number":["PP-FTSM-2023"]}],"id":[{"id":"10.13039\/501100004515","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,10]]},"DOI":"10.1109\/iceei59426.2023.10346644","type":"proceedings-article","created":{"date-parts":[[2023,12,18]],"date-time":"2023-12-18T19:23:50Z","timestamp":1702927430000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Managing Security Hazards in BYOD: A Comparative Analysis of Artificial Intelligent Techniques"],"prefix":"10.1109","author":[{"given":"Marziana Abdul","family":"Majid","sequence":"first","affiliation":[{"name":"Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology,Selangor,Malaysia"}]},{"given":"Zulkefli","family":"Mansor","sequence":"additional","affiliation":[{"name":"Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology,Selangor,Malaysia"}]},{"given":"Rossilawati","family":"Sulaiman","sequence":"additional","affiliation":[{"name":"Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology,Selangor,Malaysia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3020076"},{"key":"ref2","first-page":"143","article-title":"Policy Awareness, Enforcement, and Maintenance: A Comparative Quantitative Approach to Information Security Effectiveness in a Bring Your Own Device (BYOD) Environment","author":"Akande","year":"2019","journal-title":"ProQuest Dissertations and Theses"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/icoice48418.2019.9035139"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/infocomwkshps50562.2020.9162763"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.25046\/aj060213"},{"issue":"3","key":"ref6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3365995","article-title":"CirclePIN","volume":"4","author":"Guerar","year":"2021","journal-title":"ACM Transactions on Cyber-Physical Systems"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICACTM.2019.8776815"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/icced46541.2019.9161126"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/cr.2018.8626831"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101998"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2019.1703225"},{"volume-title":"Application of artificial intelligence in reducing risks caused by application of artificial intelligence in reducing risks","year":"2023","author":"Profile","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/services.2019.00051"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.17576\/apjitm-2018-0702(02)-03"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-021-00557-0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3437378.3437394"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12030546"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.17576\/apjitm-2022-1102-02"}],"event":{"name":"2023 International Conference on Electrical Engineering and Informatics (ICEEI)","start":{"date-parts":[[2023,10,10]]},"location":"Bandung, Indonesia","end":{"date-parts":[[2023,10,11]]}},"container-title":["2023 International Conference on Electrical Engineering and Informatics (ICEEI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10346236\/10346214\/10346644.pdf?arnumber=10346644","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T02:35:38Z","timestamp":1705026938000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10346644\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,10]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/iceei59426.2023.10346644","relation":{},"subject":[],"published":{"date-parts":[[2023,10,10]]}}}