{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T15:20:41Z","timestamp":1778167241284,"version":"3.51.4"},"reference-count":43,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,11,16]],"date-time":"2024-11-16T00:00:00Z","timestamp":1731715200000},"content-version":"vor","delay-in-days":320,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1016\/j.procs.2024.11.112","type":"journal-article","created":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T12:17:03Z","timestamp":1733487423000},"page":"287-294","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":9,"special_numbering":"C","title":["Applying AI and Machine Learning to Enhance Automated Cybersecurity and Network Threat Identification"],"prefix":"10.1016","volume":"251","author":[{"given":"Fadi","family":"Muheidat","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Moayyad Abu","family":"Mallouh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Omar","family":"Al-Saleh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Omar","family":"Al-Khasawneh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lo'ai A.","family":"Tawalbeh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2024.11.112_bib0001","unstructured":"Cybersecurity Ventures, \"2022 Cybercrime Statistics & Facts,\" [Online]. Available: https:\/\/cybersecurityventures.com\/cybercrime-damages-6-trillion-by-2021\/"},{"key":"10.1016\/j.procs.2024.11.112_bib0002","series-title":"Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners","author":"Andress","year":"2014"},{"issue":"1","key":"10.1016\/j.procs.2024.11.112_bib0003","doi-asserted-by":"crossref","first-page":"686","DOI":"10.1109\/COMST.2018.2847722","article-title":"A Detailed Investigation and Analysis of Using Machine Learning for Cybersecurity","volume":"21","author":"Mishra","year":"2019","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"10.1016\/j.procs.2024.11.112_bib0004","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1016\/j.jnca.2017.10.011","article-title":"A survey on FinTech","volume":"103","author":"Gai","year":"2018","journal-title":"Journal of Network and Computer Applications"},{"key":"10.1016\/j.procs.2024.11.112_bib0005","series-title":"2021 4th International Conference on Information and Computer Technologies (ICICT)","article-title":"Digital forensics and incident response (DFIR) challenges in IoT platforms","author":"Itodo","year":"2021"},{"key":"10.1016\/j.procs.2024.11.112_bib0006","doi-asserted-by":"crossref","first-page":"14410","DOI":"10.1109\/ACCESS.2018.2807385","article-title":"Threat of adversarial attacks on deep learning in computer vision: A survey","volume":"6","author":"Akhtar","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.procs.2024.11.112_bib0007","doi-asserted-by":"crossref","DOI":"10.1117\/12.2560002","article-title":"Artificial intelligence presents new challenges in cybersecurity","volume":"11419","author":"Blowers","year":"2020","journal-title":"Disruptive Technologies in Information Sciences IV"},{"issue":"2","key":"10.1016\/j.procs.2024.11.112_bib0008","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/997150.997156","article-title":"A Taxonomy of DDoS Attack and DDoS Defense Mechanisms","volume":"34","author":"Mirkovic","year":"2004","journal-title":"ACM SIGCOMM Computer Communication Review"},{"issue":"4","key":"10.1016\/j.procs.2024.11.112_bib0009","doi-asserted-by":"crossref","first-page":"2046","DOI":"10.1109\/SURV.2013.031413.00127","article-title":"A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks","volume":"15","author":"Zargar","year":"2013","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"3","key":"10.1016\/j.procs.2024.11.112_bib0010","doi-asserted-by":"crossref","first-page":"2027","DOI":"10.1109\/COMST.2016.2548426","article-title":"A Survey of Man In The Middle Attacks","volume":"18","author":"Conti","year":"2016","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"3","key":"10.1016\/j.procs.2024.11.112_bib0011","doi-asserted-by":"crossref","first-page":"527","DOI":"10.3390\/jcp2030027","article-title":"Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning\u2014A Review","volume":"2","author":"Ahsan","year":"2022","journal-title":"Journal of Cybersecurity and Privacy"},{"key":"10.1016\/j.procs.2024.11.112_bib0012","series-title":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment","first-page":"3","article-title":"Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks","author":"Kharraz","year":"2015"},{"key":"10.1016\/j.procs.2024.11.112_bib0013","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1016\/j.cose.2018.08.008","article-title":"On the Economic Significance of Ransomware Campaigns: A Bitcoin Transactions Perspective","volume":"79","author":"Conti","year":"2018","journal-title":"Computers & Security"},{"key":"10.1016\/j.procs.2024.11.112_bib0014","first-page":"13","article-title":"A Classification of SQL-Injection Attacks and Countermeasures","volume":"1","author":"Halfond","year":"2006","journal-title":"Proceedings of the IEEE International Symposium on Secure Software Engineering"},{"issue":"3","key":"10.1016\/j.procs.2024.11.112_bib0015","first-page":"252","article-title":"Code Injection Vulnerabilities in Web Applications: Consequences and Prevention","volume":"3","author":"Johns","year":"2009","journal-title":"International Journal of Computer Science and Security"},{"issue":"1-2","key":"10.1016\/j.procs.2024.11.112_bib0016","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","article-title":"Anomaly-based network intrusion detection: Techniques, systems and challenges","volume":"28","author":"Garc\u00eda-Teodoro","year":"2009","journal-title":"computers & security"},{"key":"10.1016\/j.procs.2024.11.112_bib0017","doi-asserted-by":"crossref","unstructured":"Vikram, Aditya, Mohana. (2020). Anomaly detection in Network Traffic Using Unsupervised Machine learning Approach. 476-479. 10.1109\/ICCES48766.2020.9137987.","DOI":"10.1109\/ICCES48766.2020.9137987"},{"key":"10.1016\/j.procs.2024.11.112_bib0018","first-page":"156903","article-title":"On the effectiveness of machine learning in the context of threats identification for network security","volume":"7","author":"Apruzzese","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.procs.2024.11.112_bib0019","series-title":"2023 International Conference on Circuit Power and Computing Technologies (ICCPCT)","first-page":"109","article-title":"Intelligent Malware Detection System Based on Behavior Analysis in Cloud Computing Environment","author":"Samuel","year":"2023"},{"issue":"4","key":"10.1016\/j.procs.2024.11.112_bib0020","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3005714","article-title":"A survey on systems security metrics","volume":"49","author":"Pendleton","year":"2016","journal-title":"ACM Computing Surveys (CSUR)"},{"issue":"4","key":"10.1016\/j.procs.2024.11.112_bib0021","doi-asserted-by":"crossref","first-page":"134","DOI":"10.3390\/a15040134","article-title":"Research and Challenges of Reinforcement Learning in Cyber Defense Decision-Making for Intranet Security","volume":"15","author":"Wang","year":"2022","journal-title":"Algorithms"},{"key":"10.1016\/j.procs.2024.11.112_bib0022","doi-asserted-by":"crossref","first-page":"1075","DOI":"10.1016\/j.neucom.2022.06.002","article-title":"A survey on neural networks for (cyber-) security and (cyber-) security of neural networks","volume":"500","author":"Pawlicki","year":"2022","journal-title":"Neurocomputing"},{"key":"10.1016\/j.procs.2024.11.112_bib0023","series-title":"2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","first-page":"87","article-title":"Bringing a GAN to a Knife-Fight: Adapting Malware Delivery Generative Adversarial Networks to Adversarial Settings","author":"Rigaki","year":"2018"},{"key":"10.1016\/j.procs.2024.11.112_bib0024","series-title":"2016 IEEE Military Communications Conference","first-page":"49","article-title":"Crafting adversarial input sequences for recurrent neural networks","author":"Papernot","year":"2016"},{"issue":"4","key":"10.1016\/j.procs.2024.11.112_bib0025","doi-asserted-by":"crossref","first-page":"3392","DOI":"10.1109\/TDSC.2022.3202544","article-title":"Interpreting Universal Adversarial Example Attacks on Image Classification Models","volume":"20","author":"Ding","year":"2023","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"10.1016\/j.procs.2024.11.112_bib0026","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.jnca.2016.10.015","article-title":"Intrusion detection techniques in cloud environment: A survey","volume":"77","author":"Mishra","year":"2017","journal-title":"Journal of Network and Computer Applications"},{"key":"10.1016\/j.procs.2024.11.112_bib0027","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1016\/j.patcog.2018.07.023","article-title":"Wild patterns: Ten years after the rise of adversarial machine learning","volume":"84","author":"Biggio","year":"2018","journal-title":"Pattern Recognition"},{"key":"10.1016\/j.procs.2024.11.112_bib0028","doi-asserted-by":"crossref","DOI":"10.1016\/j.icte.2024.05.007","article-title":"Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects","author":"Sarker","year":"2024","journal-title":"ICT Express"},{"issue":"3","key":"10.1016\/j.procs.2024.11.112_bib0029","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/3236386.3241340","article-title":"The Mythos of Model Interpretability","volume":"16","author":"Lipton","year":"2018","journal-title":"Queue"},{"key":"10.1016\/j.procs.2024.11.112_bib0030","article-title":"The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation","author":"Brundage","year":"2018","journal-title":"arXiv preprint"},{"key":"10.1016\/j.procs.2024.11.112_bib0031","doi-asserted-by":"crossref","first-page":"4924","DOI":"10.1109\/TIFS.2021.3117075","article-title":"Adversarial XAI Methods in Cybersecurity","volume":"16","author":"Kuppa","year":"2021","journal-title":"Trans. Info. For. Sec."},{"issue":"7553","key":"10.1016\/j.procs.2024.11.112_bib0032","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"LeCun","year":"2015","journal-title":"Nature"},{"issue":"3","key":"10.1016\/j.procs.2024.11.112_bib0033","doi-asserted-by":"crossref","first-page":"1646","DOI":"10.1109\/COMST.2020.2988293","article-title":"A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security","volume":"22","author":"Al-Garadi","year":"2020","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"1","key":"10.1016\/j.procs.2024.11.112_bib0034","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/TETCI.2017.2772792","article-title":"A Deep Learning Approach to Network Intrusion Detection","volume":"2","author":"Shone","year":"2018","journal-title":"IEEE Transactions on Emerging Topics in Computational Intelligence"},{"key":"10.1016\/j.procs.2024.11.112_bib0035","series-title":"2018 10th International Conference on Cyber Conflict (CyCon)","first-page":"371","article-title":"On the effectiveness of machine and deep learning for cyber security","author":"Apruzzese","year":"2018"},{"key":"10.1016\/j.procs.2024.11.112_bib0036","doi-asserted-by":"crossref","first-page":"949","DOI":"10.1007\/s10586-017-1117-8","article-title":"A survey of deep learning-based network anomaly detection","volume":"22","author":"Kwon","year":"2019","journal-title":"Cluster Computing"},{"issue":"1","key":"10.1016\/j.procs.2024.11.112_bib0037","doi-asserted-by":"crossref","first-page":"37","DOI":"10.5120\/4787-7016","article-title":"A review of financial accounting fraud detection based on data mining techniques","volume":"39","author":"Sharma","year":"2013","journal-title":"International Journal of Computer Applications"},{"issue":"1","key":"10.1016\/j.procs.2024.11.112_bib0038","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Machine learning"},{"key":"10.1016\/j.procs.2024.11.112_bib0039","first-page":"62","article-title":"A Bayesian approach to filtering junk e-mail","author":"Sahami","year":"1998","journal-title":"Learning for Text Categorization: Papers from the 1998 Workshop"},{"issue":"3","key":"10.1016\/j.procs.2024.11.112_bib0040","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1541880.1541882","article-title":"Anomaly detection: A survey","volume":"41","author":"Chandola","year":"2009","journal-title":"ACM computing surveys (CSUR)"},{"issue":"3-4","key":"10.1016\/j.procs.2024.11.112_bib0041","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1561\/2000000039","article-title":"Deep learning: methods and applications","volume":"7","author":"Deng","year":"2014","journal-title":"Foundations and trends in signal processing"},{"key":"10.1016\/j.procs.2024.11.112_bib0042","unstructured":"Sindiramutty. Autonomous Threat Hunting: A Future Paradigm for AI-Driven Threat Intelligence, https:\/\/arxiv.org\/abs\/2401.00286"},{"key":"10.1016\/j.procs.2024.11.112_bib0043","series-title":"proceedings of the 2014 3rd international conference on advanced computer science applications and technologies (ACSAT \u201914)","first-page":"37","article-title":"A survey of intrusion detection system using case study Kuwait Governments entities","author":"Abdulkareem","year":"2014"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050924033465?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050924033465?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T17:06:21Z","timestamp":1734023181000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050924033465"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":43,"alternative-id":["S1877050924033465"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2024.11.112","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Applying AI and Machine Learning to Enhance Automated Cybersecurity and Network Threat Identification","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2024.11.112","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}