<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:dim="http://www.dspace.org/xmlns/dspace/dim" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
    <responseDate>2026-04-17T17:42:24.971Z</responseDate>
    <request verb="GetRecord" identifier="ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:3:10100" metadataPrefix="dim">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai</request>
    <GetRecord>
        <record>
            <header>
                <identifier>ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:3:10100</identifier>
                <datestamp>2024-12-03T20:10:47Z</datestamp>
                <setSpec>3</setSpec>
            </header>
            <metadata>
                <dim:dim>
                    <dim:field mdschema="dc" element="title" lang="en">Generative Adversarial Networks for Synthetic Training Data Replacement in Phishing Email Detection Using Natural Language Processing, Chapter in AIS Algorithms for Intelligent Systems: ICSMDI 2024: International Conference on Smart Data Intelligence, Springer</dim:field>
                    <dim:field mdschema="dc" element="date" qualifier="issued">2024</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai/record/3/10100</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">https://link.springer.com/chapter/10.1007/978-981-97-3191-6_46</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="orcid::0000-0001-9402-7391" confidence="-1">L. Jovanovic</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="orcid::0000-0002-2062-924X" confidence="-1">N. Bacanin</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="id:46862" confidence="-1">R. Ravikumar</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="orcid::0000-0002-5511-2531" confidence="-1">M. Antonijevic</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="id:46864" confidence="-1">G. Radic</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="orcid::0000-0002-4351-068X" confidence="-1">M. Zivkovic</dim:field>
                    <dim:field mdschema="dc" element="description" qualifier="abstract">This study explores the convergence of cybersecurity, Machine learning (ML), Generative adversarial networks (GANs), and Natural language processing (NLP) to overcome the threat posed by phishing emails in the digital landscape. The surge in online business models and email communication has fueled the proliferation of malicious content, accentuating phishing emails as a significant cybersecurity challenge. ML and Artificial Intelligence (AI) algorithms present a dynamic solution, adapting to the evolving threat landscape, contingent upon the availability of pertinent data-privacy concerns. To address this, the study investigates the potential of GANs for synthetic data generation in cybersecurity, specifically focusing on phishing emails. A major advantage of utilizing AI to handle phishing email detection is that such a system has an ability to adapt to the dynamic landscape of cybersecurity without the need for explicit directions given by human operators. Text mining is simply used to reformat the data in to a representation suitable to support the application of AI algorithms, that are designed with numerical values in mind. By conducting experiments with real-world datasets, the research evaluates the performance of contemporary ML classifiers, incorporating NLP techniques, and introduces a GAN-based approach to generate synthetic training data. The outcomes aim to contribute to the development of robust intrusion detection techniques, providing insights into mitigating cybersecurity risks in the face of advanced digital threats.</dim:field>
                    <dim:field mdschema="dc" element="type">bookPart</dim:field>
                    <dim:field mdschema="dc" element="publisher">Springer, Singapore</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="spage">607</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="epage">618</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="doi">10.1007/978-981-97-3191-6_46</dim:field>
                    <dim:field mdschema="dc" element="source">AIS Algorithms for Intelligent Systems: ICSMDI 2024: Proceedings of International Conference on Smart Data Intelligence</dim:field>
                </dim:dim>
            </metadata>
        </record>
    </GetRecord>
</OAI-PMH>
