This work is licensed under the Creative Commons Attribution 4.0 International License.
Gao, J. (2017). A support vector machine model for computer network security technology. Boletin Tecnico/Technical Bulletin, 55(12), 564-568.Search in Google Scholar
Sun, N., Li, T., Song, G., & Xia, H. (2021). Network security technology of intelligent information terminal based on mobile internet of things. Mobile Information Systems.Search in Google Scholar
Xie, L., Hang, F., Guo, W., Lv, Y., Ou, W., & Shibly, F. H. A. (2021). Network security defence system based on artificial intelligence and big data technology. International journal of high performance systems architecture(3/4), 10.Search in Google Scholar
Al Tabash, K., & Happa, J. (2018). Insider-threat detection using gaussian mixture models and sensitivity profiles. Computers & Security, 77(AUG.), 838-859.Search in Google Scholar
Kayhan, V. O., Agrawal, M., & Shivendu, S. (2023). Cyber threat detection: unsupervised hunting of anomalous commands (uhac). Decision Support Systems.Search in Google Scholar
Al-Mhiqani, M. N., Ahmad, R., Abidin, Z. Z., Abdulkareem, K. H., Mohammed, M. A., & Gupta, D., et al. (2022). A new intelligent multilayer framework for insider threat detection. Computers & Electrical Engineering, 97, 107597-.Search in Google Scholar
Charan, P., Anand, P., & Shukla, S. (2021). Dmapt: study of data mining and machine learning techniques in advanced persistent threat attribution and detection. Artificial Intelligence.Search in Google Scholar
Szynkiewicz, P., & Kozakiewicz, A. (2017). Design and evaluation of a system for network threat signatures generation. Journal of Computational Science, 22(sep.), 187-197.Search in Google Scholar
Beechey, M., Kyriakopoulos, K. G., & Lambotharan, S. (2021). Evidential classification and feature selection for cyber-threat hunting. Knowledge-Based Systems, 226, 107120-.Search in Google Scholar
Poudel, B. P., Mustafa, A., Bidram, A., & Modares, H. (2020). Detection and mitigation of cyber-threats in the dc microgrid distributed control system. International Journal of Electrical Power & Energy Systems, 120(7), 105968.Search in Google Scholar
Xie, J., Li, S., Zhang, Y., Sun, P., & Xu, H. (2022). Analysis and detection against network attacks in the overlapping phenomenon of behavior attribute. Computers & Security.Search in Google Scholar
Sun, W., Guan, S., Wang, P., & Wu, Q. (2022). A hybrid deep learning model based low‐rate dos attack detection method for software defined network. Transactions on Emerging Telecommunications Technologies(5), 33.Search in Google Scholar
Hodo, E., Bellekens, X., Hamilton, A., Dubouilh, P. L., Iorkyase, E., & Tachtatzis, C., et al. (2017). Threat analysis of iot networks using artificial neural network intrusion detection system. Tetrahedron letters, 42(39), 6865-6867.Search in Google Scholar
Xu, Y., Zhang, X., Lu, C., Qiu, Z., Bi, C., & Lai, Y., et al. (2021). Network threat detection based on group cnn for privacy protection. Wireless Communications and Mobile Computing.Search in Google Scholar
Zhou, J., Wu, Z., Xue, Y., Li, M., & Zhou, D. (2021). Network unknown-threat detection based on a generative adversarial network and evolutionary algorithm. International Journal of Intelligent Systems.Search in Google Scholar
Wozniak, M., Silka, J., Wieczorek, M., & Alrashoud, M. (2021). Recurrent neural network model for iot and networking malware threat detection. IEEE transactions on industrial informatics(8), 17.Search in Google Scholar
Gao, P., Yang, W., Zhang, H., Wei, X., Huang, H., & Luo, W., et al. (2022). Detecting unknown threat based on continuous-time dynamic heterogeneous graph network. Wireless Communications and Mobile Computing.Search in Google Scholar
Mahdavifar, S. G. A. A. (2020). Dennes: deep embedded neural network expert system for detecting cyber attacks. Neural computing & applications, 32(18).Search in Google Scholar
N.-E., P., Y.-R., L., Joo, S., S.-H., K., J.-Y., P., & S.-Y., K., et al. (2023). Performance evaluation of a fast and efficient intrusion detection framework for advanced persistent threat-based cyberattacks. Computers and Electrical Engineering.Search in Google Scholar
Steno, P., Alsadoon, A., Prasad, P. W. C., Al-Dala’In, T., & Alsadoon, O. H. (2021). A novel enhanced region proposal network and modified loss function: threat object detection in secure screening using deep learning. Journal of supercomputing(4), 77.Search in Google Scholar
Li, X. G., & Wang, J. F. (2018). Traffic detection of transmission of botnet threat using bp neural network. Neural Network World, 28(6), 511-521.Search in Google Scholar
Zhang, Y., Wei, J., & Wang, K. (2020). An edge ids based on biological immune principles for dynamic threat detection. Wireless Communications and Mobile Computing.Search in Google Scholar
Zhou, Y., & Wang, P. (2019). An ensemble learning approach for xss attack detection with domain knowledge and threat intelligence. Computers & Security, 82(MAY), 261-269.Search in Google Scholar
Yuan, S., & Wu, X. (2021). Deep learning for insider threat detection: review, challenges and opportunities. Computers & Security, 104(C), 102221.Search in Google Scholar