<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Meraj Farheen Ansari</style></author><author><style face="normal" font="default" size="100%">Bibhu Dash</style></author><author><style face="normal" font="default" size="100%">Pawankumar Sharma</style></author><author><style face="normal" font="default" size="100%">Nikhitha Yathiraju</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Impact and Limitations of Artificial  Intelligence in Cybersecurity:  A Literature Review</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Advanced Research in Computer and Communication Engineering</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><volume><style face="normal" font="default" size="100%">11</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">9</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Meraj Farheen</style></author><author><style face="normal" font="default" size="100%">Pawankumar Sharma</style></author><author><style face="normal" font="default" size="100%">Bibhu Dash</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Prevention of Phishing Attacks Using AI-Based Cybersecurity Awareness Training</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Smart Sensor and Adhoc Network</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><volume><style face="normal" font="default" size="100%">3</style></volume><pages><style face="normal" font="default" size="100%">61-72</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Bibhu Dash</style></author><author><style face="normal" font="default" size="100%">Meraj Farheen Ansari</style></author><author><style face="normal" font="default" size="100%">Pawankumar Sharma</style></author><author><style face="normal" font="default" size="100%">Azad Ali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Threats and opportunities with ai-based cyber security intrusion detection: a review</style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Software Engineering &amp; Applications (IJSEA)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2022</style></year><pub-dates><date><style  face="normal" font="default" size="100%">September 2022</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">13</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">5</style></issue></record></records></xml>