First name
Jeremy
Last name
Miller
Jawhar, S., Miller, J., & Bitar, Z. (2024). AI-Based Cybersecurity Policies and Procedures. In (pp. 1–5). http://doi.org/10.1109/ICAIC60265.2024.10433845 (Original work published 2025)
Jawhar, S., Miller, J., & Bitar, Z. (2024). AI-Based Cybersecurity Policies and Procedures. In (pp. 1–5). http://doi.org/10.1109/ICAIC60265.2024.10433845 (Original work published 2025)
Jawhar, S., Miller, J., & Bitar, Z. (2024). AI-Driven Customized Cyber Security Training and Awareness. In (pp. 1–5). http://doi.org/10.1109/ICAIC60265.2024.10433829 (Original work published 2025)
Jawhar, S., Miller, J., & Bitar, Z. (2024). AI-Based Cybersecurity Policies and Procedures. In (pp. 1–5). http://doi.org/10.1109/ICAIC60265.2024.10433845 (Original work published 2025)
Jawhar, S., Miller, J., & Bitar, Z. (2024). AI-Driven Customized Cyber Security Training and Awareness. In (p. 1—5). http://doi.org/10.1109/ICAIC60265.2024.10433829 (Original work published 2025)
Jawhar, S., Miller, J., & Bitar, Z. (2024). AI-Based Cybersecurity Policies and Procedures. In (p. 1—5). http://doi.org/10.1109/ICAIC60265.2024.10433845 (Original work published 2025)