Jawhar, S. ., Miller, J. ., & Bitar, Z. . (2024). AI-Based Cybersecurity Policies and Procedures. In (pp. 1–5). http://doi.org/10.1109/ICAIC60265.2024.10433845 (Original work published 2024)
First name
Jeremy
Last name
Miller
Jawhar, S. ., Miller, J. ., & Bitar, Z. . (2024). AI-Based Cybersecurity Policies and Procedures. In (pp. 1–5). http://doi.org/10.1109/ICAIC60265.2024.10433845 (Original work published 2024)
Jawhar, S. ., Miller, J. ., & Bitar, Z. . (2024). AI-Driven Customized Cyber Security Training and Awareness. In (pp. 1–5). http://doi.org/10.1109/ICAIC60265.2024.10433829 (Original work published 2024)
Jawhar, S. ., Miller, J. ., & Bitar, Z. . (2024). AI-Based Cybersecurity Policies and Procedures. In (pp. 1–5). http://doi.org/10.1109/ICAIC60265.2024.10433845 (Original work published 2024)
Jawhar, S. ., Miller, J. ., & Bitar, Z. . (2024). AI-Driven Customized Cyber Security Training and Awareness. In (p. 1—5). http://doi.org/10.1109/ICAIC60265.2024.10433829 (Original work published 2024)
Jawhar, S. ., Miller, J. ., & Bitar, Z. . (2024). AI-Based Cybersecurity Policies and Procedures. In (p. 1—5). http://doi.org/10.1109/ICAIC60265.2024.10433845 (Original work published 2024)