{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:05:07Z","timestamp":1771700707472,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T00:00:00Z","timestamp":1739318400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["DGE-2039606"],"award-info":[{"award-number":["DGE-2039606"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Cyber Florida"},{"DOI":"10.13039\/501100006374","name":"National Security Agency","doi-asserted-by":"publisher","award":["H982302110324"],"award-info":[{"award-number":["H982302110324"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,2,12]]},"DOI":"10.1145\/3641554.3701958","type":"proceedings-article","created":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T18:33:41Z","timestamp":1739903621000},"page":"158-164","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Enhancing Cybersecurity Education with Artificial Intelligence Content"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-6303-6265","authenticated-orcid":false,"given":"Fernando","family":"Brito","sequence":"first","affiliation":[{"name":"Cyber-Physical Systems Security Lab, School of Computing and Information Sciences, Florida International University, Miami, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3860-8057","authenticated-orcid":false,"given":"Yassine","family":"Mekdad","sequence":"additional","affiliation":[{"name":"Cyber-Physical Systems Security Lab, School of Computing and Information Sciences, Florida International University, Miami, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6320-636X","authenticated-orcid":false,"given":"Monique","family":"Ross","sequence":"additional","affiliation":[{"name":"Engineering Education Department, The Ohio State University, Columbus, OH, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5716-9526","authenticated-orcid":false,"given":"Mark A.","family":"Finlayson","sequence":"additional","affiliation":[{"name":"Cognition, Narrative, and Culture Laboratory (Cognac Lab), School of Computing and Information Sciences, Florida International University, Miami, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9823-3464","authenticated-orcid":false,"given":"Selcuk","family":"Uluagac","sequence":"additional","affiliation":[{"name":"Cyber-Physical Systems Security Lab, School of Computing and Information Sciences, Florida International University, Miami, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,2,18]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.47893\/IJSSAN.2022.1212"},{"key":"e_1_3_2_2_2_1","volume-title":"Pawan Kumar Sharma, and Bibhu Dash","author":"Ansari Meraj Farheen","year":"2022","unstructured":"Meraj Farheen Ansari, Pawan Kumar Sharma, and Bibhu Dash. 2022. Prevention of phishing attacks using AI-based Cybersecurity Awareness Training. Prevention 3, 6 (2022)."},{"key":"e_1_3_2_2_3_1","volume-title":"2022 ASEE Annual Conference & Exposition.","author":"Luis Puche Rondon AHMET ARIS","year":"2022","unstructured":"AHMET ARIS, Luis Puche Rondon, Daniel Ortiz, Monique Ross, and Mark Finlayson. 2022. Integrating Artificial Intelligence into Cybersecurity Curriculum: New Perspectives. In 2022 ASEE Annual Conference & Exposition."},{"key":"e_1_3_2_2_4_1","volume-title":"Natural language processing with Python: analyzing text with the natural language toolkit. \" O'Reilly Media","author":"Bird Steven","unstructured":"Steven Bird, Ewan Klein, and Edward Loper. 2009. Natural language processing with Python: analyzing text with the natural language toolkit. \" O'Reilly Media, Inc.\"."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2023.3332004"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626252.3630757"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2021.3103460"},{"key":"e_1_3_2_2_8_1","volume-title":"BERTopic: Neural topic modeling with a class-based TF-IDF procedure. arXiv preprint arXiv:2203.05794","author":"Grootendorst Maarten","year":"2022","unstructured":"Maarten Grootendorst. 2022. BERTopic: Neural topic modeling with a class-based TF-IDF procedure. arXiv preprint arXiv:2203.05794 (2022)."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3545945.3569750"},{"key":"e_1_3_2_2_10_1","unstructured":"Matthew Honnibal and Ines Montani. 2016. spaCy. https:\/\/github.com\/explosion\/ spaCy."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290511.3290524"},{"key":"e_1_3_2_2_12_1","volume-title":"Role of artificial intelligence in the Internet of Things (IoT) cybersecurity. Discover Internet of things 1, 1","author":"Kuzlu Murat","year":"2021","unstructured":"Murat Kuzlu, Corinne Fair, and Ozgur Guler. 2021. Role of artificial intelligence in the Internet of Things (IoT) cybersecurity. Discover Internet of things 1, 1 (2021), 7."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"Samuli Laato Ali Farooq Henri Tenhunen Tinja Pitkamaki Antti Hakkala and Antti Airola. 2020. AI in Cybersecurity Education- A Systematic Literature Review of Studies on Cybersecurity MOOCs. (2020) 6--10.","DOI":"10.1109\/ICALT49669.2020.00009"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.1800573"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2021.08.126"},{"key":"e_1_3_2_2_16_1","volume-title":"Roberta: A robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692","author":"Liu Yinhan","year":"2019","unstructured":"Yinhan Liu, Myle Ott, Naman Goyal, Jingfei Du, Mandar Joshi, Danqi Chen, Omer Levy, Mike Lewis, Luke Zettlemoyer, and Veselin Stoyanov. 2019. Roberta: A robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692 (2019)."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-018-00906-1"},{"key":"e_1_3_2_2_18_1","volume-title":"European Symposium on Research in Computer Security. Springer International Publishing, Cham, 496--511","author":"Mekdad Yassine","year":"2021","unstructured":"Yassine Mekdad, Giuseppe Bernieri, Mauro Conti, and Abdeslam El Fergougui. 2021. The rise of ICS malware: A comparative analysis. In European Symposium on Research in Computer Security. Springer International Publishing, Cham, 496--511."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3457388.3458868"},{"key":"e_1_3_2_2_20_1","volume-title":"G\u00fcliz Seray Tuncay, and Nasir Ghani","author":"Mekdad Yassine","year":"2024","unstructured":"Yassine Mekdad, Faraz Naseem, Ahmet Aris, Harun Oz, Abbas Acar, Leonardo Babun, Selcuk Uluagac, G\u00fcliz Seray Tuncay, and Nasir Ghani. 2024. On the Robustness of Image-Based Malware Detection Against Adversarial Attacks. In Network Security Empowered by Artificial Intelligence. Springer Nature Switzerland, Cham, 355--375."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-181"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2023.3329081"},{"key":"e_1_3_2_2_23_1","volume-title":"Blockchain for Cybersecurity in Cyber-Physical Systems","author":"Nowroozi Ehsan","unstructured":"Ehsan Nowroozi, Seyedsadra Seyedshoari, Yassine Mekdad, Erkay Sava?, and Mauro Conti. 2022. Cryptocurrency wallets: assessment and security. In Blockchain for Cybersecurity in Cyber-Physical Systems. Springer International Publishing, Cham, 1--19."},{"key":"e_1_3_2_2_24_1","volume-title":"Proceedings of the ACM on Web Conference","author":"Oz Harun","year":"2024","unstructured":"Harun Oz, Abbas Acar, Ahmet Aris, G\u00fcliz Seray Tuncay, Amin Kharraz, and Selcuk Uluagac. 2024. (In) Security of File Uploads in Node. js. In Proceedings of the ACM on Web Conference 2024. 1573--1584."},{"key":"e_1_3_2_2_25_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Oz Harun","year":"2023","unstructured":"Harun Oz, Ahmet Aris, Abbas Acar, G\u00fcliz Seray Tuncay, Leonardo Babun, and Selcuk Uluagac. 2023. {R\u00f8B}: Ransomware over Modern Web Browsers. In 32nd USENIX Security Symposium (USENIX Security 23). 7073--7090."},{"key":"e_1_3_2_2_26_1","volume-title":"G\u00fcliz Seray Tuncay, Abbas Acar, Riccardo Lazzeretti, and Selcuk Uluagac.","author":"Oz Harun","year":"2024","unstructured":"Harun Oz, Daniele Cono D'Elia, G\u00fcliz Seray Tuncay, Abbas Acar, Riccardo Lazzeretti, and Selcuk Uluagac. 2024. With Great Power Comes Great Responsibility: Security and Privacy Issues of Modern Browser Application Programming Interfaces. IEEE Security & Privacy (2024)."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3266377"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-021-00557-0"},{"key":"e_1_3_2_2_29_1","volume-title":"SS ChandanaEswari Sirigineedi, Nagarajan Prabakar, and Himanshu Upadhyay.","author":"Soni Jayesh","year":"2023","unstructured":"Jayesh Soni, Surya Sirigineedi, Krishna Sai Vutukuru, SS ChandanaEswari Sirigineedi, Nagarajan Prabakar, and Himanshu Upadhyay. 2023. Learning-Based Model for Phishing Attack Detection. In Artificial Intelligence in Cyber Security: Theories and Applications. Springer, 113--124."},{"key":"e_1_3_2_2_30_1","unstructured":"Matthew Stamy. 2012. PyPDF2: https:\/\/github.com\/mstamy2\/PyPDF2."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159536"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.4108\/eai.7-7-2021.170285"},{"key":"e_1_3_2_2_33_1","volume-title":"Zhaohui Tang, and Forest Tan.","author":"Veerappan Chandra Sekar","year":"2018","unstructured":"Chandra Sekar Veerappan, Peter Loh Kok Keong, Zhaohui Tang, and Forest Tan. 2018. Taxonomy on malware evasion countermeasures techniques. In 2018 IEEE 4th World Forum on Internet of Things (WF-IoT). IEEE, 558--563."},{"key":"e_1_3_2_2_34_1","volume-title":"Sai Srinivas Divvela, and Surya Srikar Sirigineedi.","author":"Verma Vivek","year":"2022","unstructured":"Vivek Verma, Krishna Sai Vutukuru, Sai Srinivas Divvela, and Surya Srikar Sirigineedi. 2022. Internet of things and machine learning application for a remotely operated wetland siphon system during hurricanes. In Water Resources Management and Sustainability. Springer, 443--462."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.09.003"}],"event":{"name":"SIGCSE TS 2025: The 56th ACM Technical Symposium on Computer Science Education","location":"Pittsburgh PA USA","acronym":"SIGCSE TS 2025","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 56th ACM Technical Symposium on Computer Science Education V. 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3641554.3701958","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3641554.3701958","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T06:27:31Z","timestamp":1755757651000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3641554.3701958"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,12]]},"references-count":35,"alternative-id":["10.1145\/3641554.3701958","10.1145\/3641554"],"URL":"https:\/\/doi.org\/10.1145\/3641554.3701958","relation":{},"subject":[],"published":{"date-parts":[[2025,2,12]]},"assertion":[{"value":"2025-02-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}