{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T11:33:39Z","timestamp":1768563219125,"version":"3.49.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T00:00:00Z","timestamp":1691539200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T00:00:00Z","timestamp":1691539200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,9]]},"DOI":"10.1109\/icit58056.2023.10225910","type":"proceedings-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T17:26:12Z","timestamp":1693329972000},"page":"276-283","source":"Crossref","is-referenced-by-count":13,"title":["Unleashing the Full Potential of Artificial Intelligence and Machine Learning in Cybersecurity Vulnerability Management"],"prefix":"10.1109","author":[{"given":"Mohammed","family":"Elbes","sequence":"first","affiliation":[{"name":"Alzaytoonah University of Jordan,Department of Computer Science,Amman,Jordan"}]},{"given":"Samar","family":"Hendawi","sequence":"additional","affiliation":[{"name":"Alzaytoonah University of Jordan,Department of Computer Science,Amman,Jordan"}]},{"given":"Shadi","family":"AlZu'bi","sequence":"additional","affiliation":[{"name":"Alzaytoonah University of Jordan,Department of Computer Science,Amman,Jordan"}]},{"given":"Tarek","family":"Kanan","sequence":"additional","affiliation":[{"name":"Alzaytoonah University of Jordan,Department of artificial intelligence,Amman,Jordan"}]},{"given":"Ala","family":"Mughaid","sequence":"additional","affiliation":[{"name":"The Hashemite University,FAC of Prince Al-Hussien bin Abdullah for IT,Department of Information Technology,Zarqa,Jordan"}]}],"member":"263","reference":[{"key":"ref13","first-page":"617","article-title":"Utilizing machine learning algorithms for effectively detection iot ddos attacks","author":"mughaid","year":"0","journal-title":"International Conference on Advanced Research in Computing"},{"key":"ref35","article-title":"Machine learning in cybersecurity: a comprehensive survey","volume":"19","author":"dasgupta","year":"2020","journal-title":"J Defense Modeling Simulation"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2894819"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.32628\/CSEIT228654"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1299\/1\/012046"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-14059-5"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109032"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.08.318"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3389\/fphy.2021.766540"},{"key":"ref33","article-title":"Pytorch: An imperative style, high-performance deep learning library","volume":"32","author":"paszke","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref10","first-page":"166","article-title":"A comprehensive survey on poisoning attacks and countermeasures in machine learning","volume":"55","author":"tian","year":"2022","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"ref32","first-page":"265","article-title":"Tensorflow: A system for large-scale machine learning","author":"abadi","year":"0","journal-title":"12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCA.2016.7578896"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.26483\/ijarcs.v10i2.6384"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-019-0038-7"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2019.00187"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387461"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.108802"},{"key":"ref24","first-page":"587","article-title":"Ensuring cybersecurity while leveraging social media as a data source for internet of things applications","author":"hendawi","year":"2023","journal-title":"Proceedings of the 2023 International Conference on Advances in Computing Research (ACR'23)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SNAMS.2019.8931715"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/s22166286"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2018.07.026"},{"key":"ref20","year":"2022","journal-title":"Nist revamps aging enterprise patch management guidance"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-021-03397-y"},{"key":"ref21","first-page":"1","author":"alzu'bi","year":"2022","journal-title":"Transfer learning enabled cad system for monkey pox classification"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-7003-4"},{"key":"ref27","article-title":"Plant Automation Technology","year":"2023","journal-title":"The role of cyber security in industrial automation"},{"key":"ref29","first-page":"8","article-title":"A review of intrusion detection system using machine learning approach","volume":"12","author":"kok","year":"2019","journal-title":"International Journal of Engineering Research and Technology"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.04.003"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-14347-8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-9611-0.ch005"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.08.063"},{"key":"ref3","first-page":"1","article-title":"Emerging social media threats: Technology and policy perspectives","author":"chandramouli","year":"2011","journal-title":"2011 Second Worldwide Cybersecurity Summit (WCS) WCS"},{"key":"ref6","article-title":"Sustainable development: A semantics-aware trends for movies recommendation system using modern nlp","volume":"14","author":"alzu'bi","year":"2022","journal-title":"International Journal of Advances in Soft Computing & Its Applications"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2321628"}],"event":{"name":"2023 International Conference on Information Technology (ICIT)","location":"Amman, Jordan","start":{"date-parts":[[2023,8,9]]},"end":{"date-parts":[[2023,8,10]]}},"container-title":["2023 International Conference on Information Technology (ICIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10225686\/10225751\/10225910.pdf?arnumber=10225910","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T17:43:18Z","timestamp":1695058998000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10225910\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,9]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/icit58056.2023.10225910","relation":{},"subject":[],"published":{"date-parts":[[2023,8,9]]}}}