{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:54:41Z","timestamp":1730343281495,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,2]]},"DOI":"10.23919\/cnsm50824.2020.9269103","type":"proceedings-article","created":{"date-parts":[[2020,11,30]],"date-time":"2020-11-30T16:36:55Z","timestamp":1606754215000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["AI development and application of AI-based solutions in the area of information and data management in Poland"],"prefix":"10.23919","author":[{"given":"Grzegorz","family":"Chmielarz","sequence":"first","affiliation":[]},{"given":"Arnold","family":"Pabian","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"6133","DOI":"10.35940\/ijrte.C5675.098319","article-title":"Cyber Security Threat Intelligence Using Data Mining Techniques and Artificial Intelligence","volume":"8","author":"gupta","year":"2019","journal-title":"International Journal of Recent Technology and Engineering"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2017.7991968"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700442"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2558521"},{"key":"ref14","article-title":"Ekspert: ponad 3,2 tys. firm pracuje nad sztuczn? inteligencj?","author":"wodecki","year":"2019","journal-title":"Nauka w Polsce"},{"year":"0","key":"ref15"},{"journal-title":"AI Revolution - Report in English Pdf","year":"0","key":"ref16"},{"journal-title":"AI-in-Cybersecurity_Report_20190711_V06 Pdf","year":"0","key":"ref17"},{"year":"0","key":"ref18","article-title":"Darktrace"},{"journal-title":"Map-of-the-Polish-Ai-2019-Edition-i-Report Pdf","year":"0","key":"ref19"},{"year":"2019","key":"ref28","article-title":"Worldwide Spending on AI Systems"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2963407"},{"year":"0","key":"ref27","article-title":"What Is Deep Learning? Training a Deep Neural Network Algorithm | Deep Instinct AI Cybersecurity"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/S1353-4858(19)30097-2","article-title":"Demystifying the Role of AI for Better Network Security","volume":"2019","author":"kurpjuhn","year":"2019","journal-title":"Network Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2018.05.017"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2953095"},{"key":"ref8","article-title":"How Artificial Intelligence Is Changing Cyber Security Landscape and Preventing Cyber Attacks","author":"ramachandran","year":"2019","journal-title":"Entrepreneur"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2956480"},{"key":"ref2","first-page":"575","article-title":"Utilizing Deep Learning for Mobile Telecommunications Network Management","author":"gyires-t\u00f3th","year":"2019"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2890507"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.08.002"},{"journal-title":"Pl-Raport-KPMG-Barometr-Cyberbezpieczenstwa-W-Obronie-Przed-Cyberatakami Pdf","year":"0","key":"ref20"},{"journal-title":"Self-Driving Cyber Defense | Senseon | Automated Threat Detection Investigation and Response","article-title":"Self-Driving Cyber Defence: Automated Detection, Investigation and Response","year":"0","key":"ref22"},{"journal-title":"Pwc-Ai-Analysis-Sizing-the-Prize-Report Pdf","year":"0","key":"ref21"},{"year":"0","key":"ref24","article-title":"Targeted Attacks: The Game Has Changed"},{"year":"0","key":"ref23","article-title":"Sophos Endpoint Protection. Advanced Security with Intercept X"},{"year":"0","key":"ref26","article-title":"Vectra - AI-Driven Threat Detection and Response Platform"},{"year":"0","key":"ref25"}],"event":{"name":"2020 16th International Conference on Network and Service Management (CNSM)","start":{"date-parts":[[2020,11,2]]},"location":"Izmir, Turkey","end":{"date-parts":[[2020,11,6]]}},"container-title":["2020 16th International Conference on Network and Service Management (CNSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9269033\/9269034\/09269103.pdf?arnumber=9269103","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,5]],"date-time":"2021-05-05T21:41:58Z","timestamp":1620250918000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9269103\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,2]]},"references-count":28,"URL":"https:\/\/doi.org\/10.23919\/cnsm50824.2020.9269103","relation":{},"subject":[],"published":{"date-parts":[[2020,11,2]]}}}