LEADER 04922nam 22005895 450 001 9910746091603321 005 20230907172615.0 010 $a3-031-40598-6 024 7 $a10.1007/978-3-031-40598-3 035 $a(MiAaPQ)EBC30736077 035 $a(CKB)28162813300041 035 $a(Au-PeEL)EBL30736077 035 $a(DE-He213)978-3-031-40598-3 035 $a(PPN)272737623 035 $a(EXLCZ)9928162813300041 100 $a20230907d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aProceedings of the International Conference on Applied Cybersecurity (ACS) 2023$b[electronic resource] /$fedited by Hind Zantout, Hani Ragab Hassen 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (73 pages) 225 1 $aLecture Notes in Networks and Systems,$x2367-3389 ;$v760 311 $a9783031405976 327 $aIntro -- Preface -- Conference Organization -- Contents -- Malicious Activity Detection Using AI -- DroidDissector: A Static and Dynamic Analysis Tool for Android Malware Detection -- 1 Introduction -- 2 Static Analysis Tool -- 3 Dynamic Analysis Tool -- 3.1 Feature Extraction -- 4 Conclusions -- References -- Android Malware Detection Using Control Flow Graphs and Text Analysis -- 1 Introduction -- 2 Related Work -- 3 Framework -- 3.1 Dataset -- 3.2 Data Extraction and Preprocessing -- 4 Experimental Results -- 5 Conclusion -- References -- NTFA: Network Flow Aggregator -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Evaluation -- 5 Conclusion -- References -- AI Applications in Cybersecurity -- A Password-Based Mutual Authentication Protocol via Zero-Knowledge Proof Solution -- 1 Introduction -- 2 Related Work -- 3 Proposed Technique -- 4 Scheme Analysis and Performance -- 5 Conclusion -- References -- A Cross-Validated Fine-Tuned GPT-3 as a Novel Approach to Fake News Detection -- 1 Introduction -- 2 Related Work -- 3 Dataset -- 4 Model Description -- 5 Fine-Tuning -- 6 Results -- 7 Validation -- 8 Conclusion -- References -- Enhancing Efficiency of Arabic Spam Filtering Based on Gradient Boosting Algorithm and Manual Hyperparameters Tuning -- 1 Introduction -- 2 Related Works -- 3 Proposed Spam Filter -- 3.1 Pre-processing and Feature Extraction -- 3.2 Classification -- 4 Experimentation -- 4.1 Dataset -- 4.2 Results -- 5 Conclusion -- References -- Cyberbullying: A BERT Bi-LSTM Solution for Hate Speech Detection -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 3.1 Preprocessing -- 3.2 BERT-Bi-LSTM -- 4 Experiment and Results -- 5 Conclusion -- References -- Author Index. 330 $aThis book presents the proceedings of the International Conference on Applied Cyber Security 2023 (ACS23), held in Dubai on the April 29, containing seven original contributions. Cybersecurity is continuously attracting the world?s attention and has gained in awareness and media coverage in the last decade. Not a single week passes without a major security incident that affects a company, sector, or governmental agencies. Most of the contributions are about applications of machine learning to accomplish several cybersecurity tasks, such as malware, network intrusion, and spam email detection. Similar trends of increasing AI applications are consistent with the current research and market trends in cybersecurity and other fields. We divided this book into two parts; the first is focused on malicious activity detection using AI, whereas the second groups AI applications to tackle a selection of cybersecurity problems. This book is suitable for cybersecurity researchers, practitioners, enthusiasts, as well as fresh graduates. It is also suitable for artificial intelligence researchers interested in exploring applications in cybersecurity. Prior exposure to basic machine learning concepts is preferable, but not necessary. 410 0$aLecture Notes in Networks and Systems,$x2367-3389 ;$v760 606 $aEngineering$xData processing 606 $aComputational intelligence 606 $aData protection 606 $aData Engineering 606 $aComputational Intelligence 606 $aData and Information Security 615 0$aEngineering$xData processing. 615 0$aComputational intelligence. 615 0$aData protection. 615 14$aData Engineering. 615 24$aComputational Intelligence. 615 24$aData and Information Security. 676 $a620.00285 700 $aZantout$b Hind$01428061 701 $aRagab Hassen$b Hani$01428062 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910746091603321 996 $aProceedings of the International Conference on Applied Cybersecurity (ACS) 2023$93563142 997 $aUNINA