{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T07:10:58Z","timestamp":1777533058301,"version":"3.51.4"},"reference-count":28,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,11,16]],"date-time":"2024-11-16T00:00:00Z","timestamp":1731715200000},"content-version":"vor","delay-in-days":320,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1016\/j.procs.2024.11.176","type":"journal-article","created":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T12:19:12Z","timestamp":1733487552000},"page":"727-733","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":2,"special_numbering":"C","title":["Evaluating AI and ML in Network Security: A Comprehensive Literature Review"],"prefix":"10.1016","volume":"251","author":[{"given":"Ouissale El","family":"Gharbaoui","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ikrame","family":"Kiyadi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hayat El","family":"Boukhari","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"issue":"11","key":"10.1016\/j.procs.2024.11.176_bib0001","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1007\/s12243-022-00926-7","article-title":"Explainable artificial intelligence for cybersecurity: a literature survey","volume":"77","author":"Charmet","year":"2022","journal-title":"Annals of Telecommunications"},{"key":"10.1016\/j.procs.2024.11.176_bib0002","doi-asserted-by":"crossref","DOI":"10.1109\/BADGERS.2015.014","article-title":"The significant features of the UNSW-NB15 and the KDD99 data sets for network intrusion detection systems","author":"Moustafa","year":"2015","journal-title":"international workshop on building analysis datasets and gathering experience returns for security"},{"issue":"1","key":"10.1016\/j.procs.2024.11.176_bib0003","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.jnca.2012.09.004","article-title":"Intrusion detection system: A comprehensive review","volume":"36","author":"Liao","year":"2013","journal-title":"Journal of Network and Computer Applications"},{"issue":"2","key":"10.1016\/j.procs.2024.11.176_bib0004","doi-asserted-by":"crossref","first-page":"121","DOI":"10.3233\/IP-229006","article-title":"Introduction to the Special Issue Questioning Modern Surveillance Technologies: Ethical and Legal Challenges of Emerging Information and Communication Technologies","volume":"27","author":"Cas","year":"2022","journal-title":"Information Polity"},{"issue":"4","key":"10.1016\/j.procs.2024.11.176_bib0005","doi-asserted-by":"crossref","first-page":"1328","DOI":"10.1057\/s41284-021-00321-2","article-title":"Reliability: Understanding cognitive human bias in artificial intelligence for national security and intelligence analysis","volume":"35","author":"Sanclemente","year":"2022","journal-title":"Security Journal"},{"issue":"1","key":"10.1016\/j.procs.2024.11.176_bib0006","doi-asserted-by":"crossref","first-page":"147","DOI":"10.12785\/ijcds\/160112","article-title":"A Unique Approach for Ex-filtering Sensitive Data through an Audio Covert Channel in Android Application","volume":"16","author":"Shah","year":"2023","journal-title":"International Journal of Computing and Digital Systems"},{"issue":"105948","key":"10.1016\/j.procs.2024.11.176_bib0007","article-title":"Findings from the Polish InsurTech market as a roadmap for regulators","volume":"52","author":"Tereszkiewicz","year":"2024","journal-title":"Computer Law & Security Review"},{"issue":"101046","key":"10.1016\/j.procs.2024.11.176_bib0008","article-title":"Detecting cyberthreats in Metaverse learning platforms using an explainable DNN. Internet of Things","volume":"25","author":"Nkoro","year":"2024","journal-title":"Internet of Things"},{"issue":"1","key":"10.1016\/j.procs.2024.11.176_bib0009","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/s10922-023-09793-6","article-title":"Unsupervised Clustering for a Comparative Methodology of Machine Learning Models to Detect Domain-Generated Algorithms Based on an Alphanumeric Features Analysis","volume":"32","author":"Hassaoui","year":"2024","journal-title":"ournal of Network and Systems Management"},{"issue":"3","key":"10.1016\/j.procs.2024.11.176_bib0010","doi-asserted-by":"crossref","first-page":"908","DOI":"10.3390\/pr11030908","article-title":"Ensemble machine-learning models for accurate prediction of solar irradiation in Bangladesh","volume":"11","author":"Alam","year":"2023","journal-title":"Processes"},{"issue":"10","key":"10.1016\/j.procs.2024.11.176_bib0011","article-title":"An AI-Enabled Blockchain Algorithm: A Novel Approach to Counteract Blockchain Network Security Attacks","author":"Rajawat","year":"2024","journal-title":"EAI Endorsed Transactions on Internet of Things"},{"issue":"100965","key":"10.1016\/j.procs.2024.11.176_bib0012","article-title":"A federated and explainable approach for insider threat detection in IoT","volume":"24","author":"Amiri-Zarandi","year":"2023","journal-title":"Internet of Things"},{"key":"10.1016\/j.procs.2024.11.176_bib0013","unstructured":"R. K. Muna, H. T. Maliha and M. Hasan, \u201cDemystifying machine learning models for iot attack detection with explainable ai,\u201d 2021."},{"key":"10.1016\/j.procs.2024.11.176_bib0014","doi-asserted-by":"crossref","first-page":"1141","DOI":"10.1007\/s12652-017-0558-5","article-title":"Detecting crypto-ransomware in IoT networks based on energy consumption footprint","volume":"9","author":"Azmoodeh","year":"2018","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"2","key":"10.1016\/j.procs.2024.11.176_bib0015","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1016\/j.bushor.2022.07.004","article-title":"Brace yourself! Why managers should adopt a synthetic media incident response playbook in an age of falsity and synthetic media","volume":"66","author":"Whittaker","year":"2023","journal-title":"Business Horizons"},{"key":"10.1016\/j.procs.2024.11.176_bib0016","doi-asserted-by":"crossref","first-page":"1141","DOI":"10.1007\/s12652-017-0558-5","article-title":"Detecting crypto-ransomware in IoT networks based on energy consumption footprint","volume":"9","author":"Azmoodeh","year":"2018","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"1","key":"10.1016\/j.procs.2024.11.176_bib0017","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/EMR.2022.3186154","article-title":"A survey on information communication technologies in modern demand-side management for smart grids: Challenges, solutions, and opportunities","volume":"51","author":"Said","year":"2022","journal-title":"IEEE Engineering Management Review"},{"issue":"4","key":"10.1016\/j.procs.2024.11.176_bib0018","doi-asserted-by":"crossref","first-page":"110","DOI":"10.3390\/bdcc6040110","article-title":"Combining sociocultural intelligence with Artificial Intelligence to increase organizational cyber security provision through enhanced resilience","volume":"6","author":"Trim","year":"2022","journal-title":"Big Data and Cognitive Computing"},{"key":"10.1016\/j.procs.2024.11.176_bib0019","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10922-021-09633-5","article-title":"Machine-learning-enabled ddos attacks detection in p4 programmable networks","volume":"30","author":"Musumeci","year":"2022","journal-title":"Journal of Network and Systems Management"},{"issue":"4","key":"10.1016\/j.procs.2024.11.176_bib0020","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3430360","article-title":"Trailblazing the artificial intelligence for cybersecurity discipline: A multi-disciplinary research roadmap","volume":"11","author":"Samtani","year":"2020","journal-title":"ACM Transactions on Management Information Systems (TMIS)"},{"issue":"102104","key":"10.1016\/j.procs.2024.11.176_bib0021","article-title":"Artificial intelligence for sustainability: Challenges, opportunities, and a research agenda","volume":"53","author":"Nishant","year":"2020","journal-title":"International Journal of Information Management"},{"issue":"4","key":"10.1016\/j.procs.2024.11.176_bib0022","article-title":"IOT SECURITY AND THE ROLE OF AI\/ML TO COMBAT EMERGING CYBER THREATS IN CLOUD COMPUTING ENVIRONMENT","volume":"21","author":"Zewdie","year":"2020","journal-title":"Issues in Information Systems"},{"key":"10.1016\/j.procs.2024.11.176_bib0023","article-title":"The impact of artificial intelligence on organisational cyber security: An outcome of a systematic literature review","author":"Jada","year":"2023","journal-title":"Data and Information Management"},{"key":"10.1016\/j.procs.2024.11.176_bib0024","article-title":"Cybersecurity Education in the Age of Artificial Intelligence: A Novel Proactive and Collaborative Learning Paradigm","author":"Wei-Kocsis","year":"2023","journal-title":"IEEE Transactions on Education."},{"issue":"2","key":"10.1016\/j.procs.2024.11.176_bib0025","doi-asserted-by":"crossref","first-page":"419","DOI":"10.26599\/BDMA.2023.9020023","article-title":"E-Commerce Fraud Detection Based on Machine Learning Techniques: Systematic Literature Review","volume":"7","author":"A.","year":"2024","journal-title":"Big Data Mining and Analytics"},{"key":"10.1016\/j.procs.2024.11.176_bib0026","series-title":"2023 International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication Engineering (RMKMATE)","article-title":"Enhancing Trust and Privacy in E-Commerce Platforms by Preventing DNS Heavyweight Attacks","author":"Kumari","year":"2023"},{"issue":"5","key":"10.1016\/j.procs.2024.11.176_bib0027","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1016\/j.bushor.2021.02.022","article-title":"Cybersecurity: Risk management framework and investment cost analysis","volume":"64","author":"Lee","year":"2021","journal-title":"Business Horizons"},{"issue":"100393","key":"10.1016\/j.procs.2024.11.176_bib0028","article-title":"CyberLearning: Effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks","volume":"14","author":"Sarker","year":"2021","journal-title":"Internet of Things"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050924034100?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050924034100?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T18:28:25Z","timestamp":1734028105000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050924034100"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":28,"alternative-id":["S1877050924034100"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2024.11.176","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Evaluating AI and ML in Network Security: A Comprehensive Literature Review","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2024.11.176","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}