{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T12:11:02Z","timestamp":1778155862441,"version":"3.51.4"},"reference-count":119,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,8,4]],"date-time":"2024-08-04T00:00:00Z","timestamp":1722729600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,8,4]],"date-time":"2024-08-04T00:00:00Z","timestamp":1722729600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100003789","name":"Helwan University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100003789","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>As the number and cleverness of cyber-attacks keep increasing rapidly, it's more important than ever to have good ways to detect and prevent them. Recognizing cyber threats quickly and accurately is crucial because they can cause severe damage to individuals and businesses. This paper takes a close look at how we can use artificial intelligence (AI), including machine learning (ML) and deep learning (DL), alongside metaheuristic algorithms to detect cyber-attacks better. We've thoroughly examined over sixty recent studies to measure how effective these AI tools are at identifying and fighting a wide range of cyber threats. Our research includes a diverse array of cyberattacks such as malware attacks, network intrusions, spam, and others, showing that ML and DL methods, together with metaheuristic algorithms, significantly improve how well we can find and respond to cyber threats. We compare these AI methods to find out what they're good at and where they could improve, especially as we face new and changing cyber-attacks. This paper presents a straightforward framework for assessing AI Methods in cyber threat detection. Given the increasing complexity of cyber threats, enhancing AI methods and regularly ensuring strong protection is critical. We evaluate the effectiveness and the limitations of current ML and DL proposed models, in addition to the metaheuristic algorithms. Recognizing these limitations is vital for guiding future enhancements. We're pushing for smart and flexible solutions that can adapt to new challenges. The findings from our research suggest that the future of protecting against cyber-attacks will rely on continuously updating AI methods to stay ahead of hackers' latest tricks.<\/jats:p>","DOI":"10.1186\/s40537-024-00957-y","type":"journal-article","created":{"date-parts":[[2024,8,4]],"date-time":"2024-08-04T13:01:59Z","timestamp":1722776519000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":197,"title":["Advancing cybersecurity: a comprehensive review of AI-driven detection techniques"],"prefix":"10.1186","volume":"11","author":[{"given":"Aya H.","family":"Salem","sequence":"first","affiliation":[]},{"given":"Safaa M.","family":"Azzam","sequence":"additional","affiliation":[]},{"given":"O. E.","family":"Emam","sequence":"additional","affiliation":[]},{"given":"Amr A.","family":"Abohany","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,4]]},"reference":[{"key":"957_CR1","doi-asserted-by":"publisher","unstructured":"Parkar P, Bilimoria A. A survey on cyber security IDS using ML methods. Proceedings\u20145th International Conference on Intelligent Computing and Control Systems, ICICCS 2021, no. ICICCS, pp. 352\u2013360, 2021, https:\/\/doi.org\/10.1109\/ICICCS51141.2021.9432210.","DOI":"10.1109\/ICICCS51141.2021.9432210"},{"issue":"January","key":"957_CR2","doi-asserted-by":"publisher","first-page":"17982","DOI":"10.1109\/ACCESS.2024.3360868","volume":"12","author":"NS Musa","year":"2024","unstructured":"Musa NS, Mirza NM, Rafique SH, Abdallah AM, Murugan T. Machine learning and deep learning techniques for distributed denial of service anomaly detection in software defined networks\u2014current research solutions. IEEE Access. 2024;12(January):17982\u20138011. https:\/\/doi.org\/10.1109\/ACCESS.2024.3360868.","journal-title":"IEEE Access"},{"issue":"1","key":"957_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17762\/turcomat.v12i2.2406","volume":"12","author":"M Eswaran","year":"2023","unstructured":"Eswaran M, et al. Survey of cyber security approaches for attack detection and prevention. IEEE Access. 2023;12(1):1\u20136. https:\/\/doi.org\/10.17762\/turcomat.v12i2.2406.","journal-title":"IEEE Access"},{"issue":"12","key":"957_CR4","doi-asserted-by":"publisher","first-page":"627","DOI":"10.14569\/ijacsa.2019.0101280","volume":"10","author":"J Alsamiri","year":"2019","unstructured":"Alsamiri J, Alsubhi K. Internet of things cyber attacks detection using machine learning. Int J Adv Comput Sci Appl. 2019;10(12):627\u201334. https:\/\/doi.org\/10.14569\/ijacsa.2019.0101280.","journal-title":"Int J Adv Comput Sci Appl"},{"issue":"1","key":"957_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/electronics11010016","volume":"11","author":"W Ahmad","year":"2022","unstructured":"Ahmad W, Rasool A, Javed AR, Baker T, Jalil Z. Cyber security in IoT-based cloud computing: a comprehensive survey. Electronics (Switzerland). 2022;11(1):1\u201334. https:\/\/doi.org\/10.3390\/electronics11010016.","journal-title":"Electronics (Switzerland)"},{"key":"957_CR6","doi-asserted-by":"publisher","unstructured":"Morovat K, Panda B. A survey of artificial intelligence in cybersecurity. Proceedings\u20142020 International conference on computational science and computational intelligence, CSCI 2020, pp. 109\u2013115, 2020, https:\/\/doi.org\/10.1109\/CSCI51800.2020.00026.","DOI":"10.1109\/CSCI51800.2020.00026"},{"key":"957_CR7","doi-asserted-by":"publisher","unstructured":"Uma M, Padmavathi G. A survey on various cyber attacks and their classification. Int J Netw Secur. 2013;15(5):390\u20136. https:\/\/doi.org\/10.6633\/IJNS.201309.","DOI":"10.6633\/IJNS.201309"},{"issue":"2","key":"957_CR8","doi-asserted-by":"publisher","first-page":"221","DOI":"10.13052\/jcsm2245-1439.1225","volume":"12","author":"U Rauf","year":"2023","unstructured":"Rauf U, Mohsen F, Wei Z. A taxonomic classification of insider threats: existing techniques, future directions and recommendations. J Cyber Secur Mobil. 2023;12(2):221\u201352. https:\/\/doi.org\/10.13052\/jcsm2245-1439.1225.","journal-title":"J Cyber Secur Mobil"},{"key":"957_CR9","doi-asserted-by":"publisher","DOI":"10.3390\/fi13080198","author":"SN Thanh","year":"2021","unstructured":"Thanh SN, Stege M, El-Habr PI, Bang J, Dragoni N. Survey on botnets: incentives, evolution, detection and current trends. Future Internet. 2021. https:\/\/doi.org\/10.3390\/fi13080198.","journal-title":"Future Internet"},{"issue":"12","key":"957_CR10","doi-asserted-by":"publisher","first-page":"669","DOI":"10.18535\/ijsrm\/v9i12.ec04","volume":"9","author":"Y Perwej","year":"2021","unstructured":"Perwej Y, Qamar Abbas S, Pratap Dixit J, Akhtar N, Kumar Jaiswal A. A systematic literature review on the cyber security. Int J Sci Res Manag. 2021;9(12):669\u2013710. https:\/\/doi.org\/10.18535\/ijsrm\/v9i12.ec04.","journal-title":"Int J Sci Res Manag"},{"issue":"2","key":"957_CR11","doi-asserted-by":"publisher","first-page":"733","DOI":"10.35629\/5252-0502733741","volume":"5","author":"A AbuBakar","year":"2023","unstructured":"AbuBakar A, Zolkipli MF. Cyber security threats and predictions: a survey. Int J Adv Eng Manag (IJAEM). 2023;5(2):733. https:\/\/doi.org\/10.35629\/5252-0502733741.","journal-title":"Int J Adv Eng Manag (IJAEM)"},{"issue":"6","key":"957_CR12","doi-asserted-by":"publisher","first-page":"4848","DOI":"10.1109\/TSG.2022.3176311","volume":"13","author":"A Parizad","year":"2022","unstructured":"Parizad A, Hatziadoniu CJ. Cyber-attack detection using principal component analysis and noisy clustering algorithms: a collaborative machine learning-based framework. IEEE Trans Smart Grid. 2022;13(6):4848\u201361. https:\/\/doi.org\/10.1109\/TSG.2022.3176311.","journal-title":"IEEE Trans Smart Grid"},{"key":"957_CR13","doi-asserted-by":"publisher","unstructured":"Philosophical logic and artificial intelligence. Springer Netherlands, 1989. https:\/\/doi.org\/10.1007\/978-94-009-2448-2.","DOI":"10.1007\/978-94-009-2448-2"},{"issue":"1","key":"957_CR14","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/S0377-2217(96)00378-5","volume":"99","author":"J-C Pomerol","year":"1997","unstructured":"Pomerol J-C. Artificial intelligence and human decision making. Eur J Oper Res. 1997;99(1):3\u201325. https:\/\/doi.org\/10.1016\/S0377-2217(96)00378-5.","journal-title":"Eur J Oper Res"},{"key":"957_CR15","unstructured":"Dokur NB. Artificial Intelligence (AI) applications in cyber security. https:\/\/www.researchgate.net\/publication\/367253331."},{"issue":"12","key":"957_CR16","doi-asserted-by":"publisher","first-page":"1462","DOI":"10.1631\/FITEE.1800573","volume":"19","author":"J Hua Li","year":"2018","unstructured":"Hua Li J. Cyber security meets artificial intelligence: a survey. Front Inf Technol Electron Eng. 2018;19(12):1462\u201374. https:\/\/doi.org\/10.1631\/FITEE.1800573.","journal-title":"Front Inf Technol Electron Eng"},{"key":"957_CR17","doi-asserted-by":"publisher","DOI":"10.32628\/IJSRST218675","author":"JN Welukar","year":"2021","unstructured":"Welukar JN, Bajoria GP. Artificial intelligence in cyber security\u2014a review. Int J Sci Res Sci Technol. 2021. https:\/\/doi.org\/10.32628\/IJSRST218675.","journal-title":"Int J Sci Res Sci Technol"},{"key":"957_CR18","doi-asserted-by":"publisher","unstructured":"Thomas T, Vijayaraghavan AP, Emmanuel S. Machine learning approaches in cyber security analytics. 2019. https:\/\/doi.org\/10.1007\/978-981-15-1706-8.","DOI":"10.1007\/978-981-15-1706-8"},{"key":"957_CR19","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2022.2055399","author":"K Barik","year":"2022","unstructured":"Barik K, Misra S, Konar K, Fernandez-Sanz L, Koyuncu M. Cybersecurity deep: approaches, attacks dataset, and comparative study. Appl Artif Intell. 2022. https:\/\/doi.org\/10.1080\/08839514.2022.2055399.","journal-title":"Appl Artif Intell"},{"issue":"2","key":"957_CR20","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.11591\/ijeecs.v23.i2.pp1146-1158","volume":"23","author":"NS Nordin","year":"2021","unstructured":"Nordin NS, et al. A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection. Indonesian J Electr Eng Comput Sci. 2021;23(2):1146\u201358. https:\/\/doi.org\/10.11591\/ijeecs.v23.i2.pp1146-1158.","journal-title":"Indonesian J Electr Eng Comput Sci"},{"key":"957_CR21","doi-asserted-by":"publisher","first-page":"26766","DOI":"10.1109\/ACCESS.2021.3056407","volume":"9","author":"P Agrawal","year":"2021","unstructured":"Agrawal P, Abutarboush HF, Ganesh T, Mohamed AW. Metaheuristic algorithms on feature selection: a survey of one decade of research (2009\u20132019). IEEE Access. 2021;9:26766\u201391. https:\/\/doi.org\/10.1109\/ACCESS.2021.3056407.","journal-title":"IEEE Access"},{"issue":"3","key":"957_CR22","doi-asserted-by":"publisher","first-page":"224","DOI":"10.48009\/3_iis_2021_242-258","volume":"22","author":"GS Kuntla","year":"2021","unstructured":"Kuntla GS, Tian X, Li Z. Security and privacy in machine learning: a survey. Issues Inf Syst. 2021;22(3):224\u201340. https:\/\/doi.org\/10.48009\/3_iis_2021_242-258.","journal-title":"Issues Inf Syst"},{"issue":"September","key":"957_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3389\/fphar.2021.720694","volume":"12","author":"J Peng","year":"2021","unstructured":"Peng J, Jury EC, D\u00f6nnes P, Ciurtin C. Machine learning techniques for personalised medicine approaches in immune-mediated chronic inflammatory diseases: applications and challenges. Front Pharmacol. 2021;12(September):1\u201318. https:\/\/doi.org\/10.3389\/fphar.2021.720694.","journal-title":"Front Pharmacol"},{"issue":"6","key":"957_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/sym14061095","volume":"14","author":"M Alduailij","year":"2022","unstructured":"Alduailij M, Khan QW, Tahir M, Sardaraz M, Alduailij M, Malik F. Machine-learning-based DDoS attack detection using mutual information and random forest feature importance method. Symmetry (Basel). 2022;14(6):1\u201315. https:\/\/doi.org\/10.3390\/sym14061095.","journal-title":"Symmetry (Basel)"},{"key":"957_CR25","doi-asserted-by":"publisher","unstructured":"Gawand MKSP. A comparative study of cyber attack detection & prediction using machine learning algorithms. Researchgate. 2013. https:\/\/doi.org\/10.21203\/rs.3.rs-3238552\/v1","DOI":"10.21203\/rs.3.rs-3238552\/v1"},{"key":"957_CR26","doi-asserted-by":"publisher","first-page":"100393","DOI":"10.1016\/j.iot.2021.100393","volume":"14","author":"IH Sarker","year":"2021","unstructured":"Sarker IH. CyberLearning: effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks. Internet Things. 2021;14:100393. https:\/\/doi.org\/10.1016\/j.iot.2021.100393.","journal-title":"Internet Things"},{"key":"957_CR27","doi-asserted-by":"publisher","first-page":"100059","DOI":"10.1016\/j.iot.2019.100059","volume":"7","author":"M Hasan","year":"2019","unstructured":"Hasan M, Islam MM, Zarif MII, Hashem MMA. Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet Things. 2019;7:100059. https:\/\/doi.org\/10.1016\/j.iot.2019.100059.","journal-title":"Internet Things"},{"key":"957_CR28","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-020-00318-5","author":"IH Sarker","year":"2020","unstructured":"Sarker IH, Kayes ASM, Badsha S, Alqahtani H, Watters P, Ng A. Cybersecurity data science: an overview from machine learning perspective. J Big Data. 2020. https:\/\/doi.org\/10.1186\/s40537-020-00318-5.","journal-title":"J Big Data"},{"issue":"3","key":"957_CR29","doi-asserted-by":"publisher","first-page":"1920","DOI":"10.1109\/COMST.2021.3086296","volume":"23","author":"E Rodriguez","year":"2021","unstructured":"Rodriguez E, Otero B, Gutierrez N, Canal R. A survey of deep learning techniques for cybersecurity in mobile networks. IEEE Commun Surv Tutor. 2021;23(3):1920\u201355. https:\/\/doi.org\/10.1109\/COMST.2021.3086296.","journal-title":"IEEE Commun Surv Tutor"},{"issue":"2","key":"957_CR30","first-page":"1089","volume":"7","author":"F Pourafshin","year":"2021","unstructured":"Pourafshin F. Big data mining in internet of things using fusion of deep features. Int J Sci Res Eng Trends. 2021;7(2):1089\u201393.","journal-title":"Int J Sci Res Eng Trends"},{"key":"957_CR31","doi-asserted-by":"publisher","first-page":"110722","DOI":"10.1109\/ACCESS.2019.2934354","volume":"7","author":"H Gu","year":"2019","unstructured":"Gu H, Wang Y, Hong S, Gui G. Blind channel identification aided generalized automatic modulation recognition based on deep learning. IEEE Access. 2019;7:110722\u20139. https:\/\/doi.org\/10.1109\/ACCESS.2019.2934354.","journal-title":"IEEE Access"},{"key":"957_CR32","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/B978-0-323-91781-0.00006-5","volume-title":"Comprehensive metaheuristics","author":"IH Hassan","year":"2023","unstructured":"Hassan IH, Mohammed A, Masama MA. Metaheuristic algorithms in network intrusion detection. In: Comprehensive metaheuristics. Elsevier; 2023. p. 95\u2013129. https:\/\/doi.org\/10.1016\/B978-0-323-91781-0.00006-5."},{"key":"957_CR33","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-023-10470-y","author":"K Rajwar","year":"2023","unstructured":"Rajwar K, Deep K, Das S. An exhaustive review of the metaheuristic algorithms for search and optimization: taxonomy, applications, and open challenges. Artif Intell Rev. 2023. https:\/\/doi.org\/10.1007\/s10462-023-10470-y.","journal-title":"Artif Intell Rev"},{"key":"957_CR34","doi-asserted-by":"publisher","unstructured":"Role of AI in cyber security through Anomaly detection and Predictive analysis. J Inf Educ Res. 2023;3:2.  https:\/\/doi.org\/10.52783\/jier.v3i2.314.","DOI":"10.52783\/jier.v3i2.314"},{"key":"957_CR35","doi-asserted-by":"publisher","first-page":"12229","DOI":"10.1109\/ACCESS.2024.3355547","volume":"12","author":"M Ozkan-Okay","year":"2024","unstructured":"Ozkan-Okay M, et al. A comprehensive survey: evaluating the efficiency of artificial intelligence and machine learning techniques on cyber security solutions. IEEE Access. 2024;12:12229\u201356. https:\/\/doi.org\/10.1109\/ACCESS.2024.3355547.","journal-title":"IEEE Access"},{"issue":"2","key":"957_CR36","doi-asserted-by":"publisher","first-page":"166","DOI":"10.3390\/jcp3020010","volume":"3","author":"RS Sangwan","year":"2023","unstructured":"Sangwan RS, Badr Y, Srinivasan SM. Cybersecurity for AI systems: a survey. J Cybersecur Privacy. 2023;3(2):166\u201390. https:\/\/doi.org\/10.3390\/jcp3020010.","journal-title":"J Cybersecur Privacy"},{"key":"957_CR37","doi-asserted-by":"publisher","DOI":"10.1080\/23311916.2023.2272358","author":"N Mohamed","year":"2023","unstructured":"Mohamed N. Current trends in AI and ML for cybersecurity: a state-of-the-art survey. Cogent Eng. 2023. https:\/\/doi.org\/10.1080\/23311916.2023.2272358.","journal-title":"Cogent Eng"},{"key":"957_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.101804","author":"R Kaur","year":"2023","unstructured":"Kaur R, Gabrijel\u010di\u010d D, Klobu\u010dar T. Artificial intelligence for cybersecurity: literature review and future research directions. Inf Fusion. 2023. https:\/\/doi.org\/10.1016\/j.inffus.2023.101804.","journal-title":"Inf Fusion."},{"key":"957_CR39","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12183927","author":"S Bin Hulayyil","year":"2023","unstructured":"Bin Hulayyil S, Li S, Xu L. Machine-learning-based vulnerability detection and classification in internet of things device security. Electronics (Switzerland). 2023. https:\/\/doi.org\/10.3390\/electronics12183927.","journal-title":"Electronics (Switzerland)"},{"issue":"2","key":"957_CR40","doi-asserted-by":"publisher","first-page":"1679","DOI":"10.32604\/csse.2023.031063","volume":"45","author":"MM Asiri","year":"2023","unstructured":"Asiri MM, et al. Hybrid metaheuristics feature selection with stacked deep learning-enabled cyber-attack detection model. Comput Syst Sci Eng. 2023;45(2):1679\u201394. https:\/\/doi.org\/10.32604\/csse.2023.031063.","journal-title":"Comput Syst Sci Eng"},{"key":"957_CR41","doi-asserted-by":"publisher","first-page":"5371","DOI":"10.1109\/ACCESS.2020.3048319","volume":"9","author":"L Caviglione","year":"2021","unstructured":"Caviglione L, et al. Tight arms race: overview of current malware threats and trends in their detection. IEEE Access. 2021;9:5371\u201396. https:\/\/doi.org\/10.1109\/ACCESS.2020.3048319.","journal-title":"IEEE Access"},{"key":"957_CR42","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-023-02255-2","author":"JH An","year":"2023","unstructured":"An JH, Wang Z, Joe I. A CNN-based automatic vulnerability detection. EURASIP J Wirel Commun Netw. 2023. https:\/\/doi.org\/10.1186\/s13638-023-02255-2.","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"957_CR43","doi-asserted-by":"publisher","unstructured":"Lucky G, Jjunju F, Marshall A. A lightweight decision-tree algorithm for detecting DDoS flooding attacks. In Proceedings\u2014companion of the 2020 IEEE 20th international conference on software quality, reliability, and security, QRS-C 2020, Institute of Electrical and Electronics Engineers Inc., Dec. 2020, pp. 382\u2013389. https:\/\/doi.org\/10.1109\/QRS-C51114.2020.00072.","DOI":"10.1109\/QRS-C51114.2020.00072"},{"key":"957_CR44","doi-asserted-by":"publisher","unstructured":". Mynuddin M, Hossain MI, Uddin Khan S, Islam MA, Mohammed Abdul Ahad D, Tanvir MS. Cyber security system using fuzzy logic. In International Conference on Electrical, Computer, Communications and Mechatronics Engineering, ICECCME 2023, Institute of Electrical and Electronics Engineers Inc., 2023. https:\/\/doi.org\/10.1109\/ICECCME57830.2023.10252778.","DOI":"10.1109\/ICECCME57830.2023.10252778"},{"key":"957_CR45","doi-asserted-by":"publisher","DOI":"10.3390\/computers11120170","author":"KA ElDahshan","year":"2022","unstructured":"ElDahshan KA, AlHabshy AAA, Hameed BI. Meta-heuristic optimization algorithm-based hierarchical intrusion detection system. Computers. 2022. https:\/\/doi.org\/10.3390\/computers11120170.","journal-title":"Computers"},{"key":"957_CR46","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.aej.2023.09.023","volume":"81","author":"S Soliman","year":"2023","unstructured":"Soliman S, Oudah W, Aljuhani A. Deep learning-based intrusion detection approach for securing industrial Internet of Things. Alex Eng J. 2023;81:371\u201383. https:\/\/doi.org\/10.1016\/j.aej.2023.09.023.","journal-title":"Alex Eng J"},{"issue":"3","key":"957_CR47","doi-asserted-by":"publisher","first-page":"73","DOI":"10.3390\/fi16030073","volume":"16","author":"K Psychogyios","year":"2024","unstructured":"Psychogyios K, Papadakis A, Bourou S, Nikolaou N, Maniatis A, Zahariadis T. Deep learning for intrusion detection systems (IDSs) in time series data. Future Internet. 2024;16(3):73. https:\/\/doi.org\/10.3390\/fi16030073.","journal-title":"Future Internet"},{"key":"957_CR48","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106997","volume":"100","author":"R SaiSindhuTheja","year":"2021","unstructured":"SaiSindhuTheja R, Shyam GK. An efficient metaheuristic algorithm based feature selection and recurrent neural network for DoS attack detection in cloud computing environment. Appl Soft Comput. 2021;100: 106997. https:\/\/doi.org\/10.1016\/j.asoc.2020.106997.","journal-title":"Appl Soft Comput"},{"issue":"3","key":"957_CR49","doi-asserted-by":"publisher","first-page":"353","DOI":"10.47839\/ijc.21.3.2691","volume":"21","author":"R Sanjeetha","year":"2022","unstructured":"Sanjeetha R, Kanavalli A, Gupta A, Pattanaik A, Agarwal S. Real-time DDoS detection and mitigation in software defined networks using machine learning techniques. Int J Comput. 2022;21(3):353\u20139. https:\/\/doi.org\/10.47839\/ijc.21.3.2691.","journal-title":"Int J Comput"},{"issue":"2","key":"957_CR50","doi-asserted-by":"publisher","first-page":"1353","DOI":"10.1007\/s13369-021-05947-3","volume":"47","author":"V Gaur","year":"2022","unstructured":"Gaur V, Kumar R. Analysis of machine learning classifiers for early detection of DDoS attacks on IoT devices. Arab J Sci Eng. 2022;47(2):1353\u201374. https:\/\/doi.org\/10.1007\/s13369-021-05947-3.","journal-title":"Arab J Sci Eng"},{"key":"957_CR51","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-55098-2","author":"KK Jyothi","year":"2024","unstructured":"Jyothi KK, et al. A novel optimized neural network model for cyber attack detection using enhanced whale optimization algorithm. Sci Rep. 2024. https:\/\/doi.org\/10.1038\/s41598-024-55098-2.","journal-title":"Sci Rep"},{"key":"957_CR52","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12204261","author":"S Atawneh","year":"2023","unstructured":"Atawneh S, Aljehani H. Phishing email detection model using deep learning. Electronics (Switzerland). 2023. https:\/\/doi.org\/10.3390\/electronics12204261.","journal-title":"Electronics (Switzerland)"},{"key":"957_CR53","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103843","volume":"141","author":"S Asiri","year":"2024","unstructured":"Asiri S, Xiao Y, Alzahrani S, Li T. PhishingRTDS: a real-time detection system for phishing attacks using a Deep Learning model. Comput Secur. 2024;141: 103843. https:\/\/doi.org\/10.1016\/j.cose.2024.103843.","journal-title":"Comput Secur"},{"key":"957_CR54","doi-asserted-by":"publisher","DOI":"10.1016\/j.seta.2023.103114","author":"M AbdullahAlohali","year":"2023","unstructured":"AbdullahAlohali M, et al. Metaheuristics with deep learning driven phishing detection for sustainable and secure environment. Sustain Energy Technol Assess. 2023. https:\/\/doi.org\/10.1016\/j.seta.2023.103114.","journal-title":"Sustain Energy Technol Assess"},{"key":"957_CR55","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.120977","author":"S Zavrak","year":"2023","unstructured":"Zavrak S, Yilmaz S. Email spam detection using hierarchical attention hybrid deep learning method. Expert Syst Appl. 2023. https:\/\/doi.org\/10.1016\/j.eswa.2023.120977.","journal-title":"Expert Syst Appl"},{"issue":"3","key":"957_CR56","doi-asserted-by":"publisher","first-page":"3043","DOI":"10.1007\/s40747-022-00760-3","volume":"9","author":"UA Butt","year":"2023","unstructured":"Butt UA, Amin R, Aldabbas H, Mohan S, Alouffi B, Ahmadian A. Cloud-based email phishing attack using machine and deep learning algorithm. Complex Intell Syst. 2023;9(3):3043\u201370. https:\/\/doi.org\/10.1007\/s40747-022-00760-3.","journal-title":"Complex Intell Syst"},{"key":"957_CR57","unstructured":"Kitchenham S, Charters B. Guidelines for performing systematic literature reviews in software engineering. Technical report, Ver. 2.3 EBSE, vol. 1, no. January 2007, pp. 1\u201354, 2007. https:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.117.471&rep=rep1&type=pdf."},{"key":"957_CR58","doi-asserted-by":"publisher","unstructured":"Shaukat K, Luo S, Chen S, Liu D. Cyber threat detection using machine learning techniques: a performance evaluation perspective. 1st Annual international conference on cyber warfare and security, ICCWS 2020\u2014Proceedings, 2020, https:\/\/doi.org\/10.1109\/ICCWS48432.2020.9292388.","DOI":"10.1109\/ICCWS48432.2020.9292388"},{"issue":"3","key":"957_CR59","doi-asserted-by":"publisher","first-page":"3313","DOI":"10.1007\/s13369-023-08016-z","volume":"49","author":"A Prasad","year":"2024","unstructured":"Prasad A, Chandra S. BotDefender: a collaborative defense framework against botnet attacks using network traffic analysis and machine learning. Arab J Sci Eng. 2024;49(3):3313\u201329. https:\/\/doi.org\/10.1007\/s13369-023-08016-z.","journal-title":"Arab J Sci Eng"},{"key":"957_CR60","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-024-01023-7","author":"Z Wei","year":"2024","unstructured":"Wei Z, Rauf U, Mohsen F. E-Watcher: insider threat monitoring and detection for enhanced security. Ann Telecommun. 2024. https:\/\/doi.org\/10.1007\/s12243-024-01023-7.","journal-title":"Ann Telecommun"},{"key":"957_CR61","doi-asserted-by":"publisher","first-page":"37586","DOI":"10.1109\/ACCESS.2024.3373202","volume":"12","author":"F Mohsen","year":"2024","unstructured":"Mohsen F, Rauf U, Lavric V, Kokushkin A, Wei Z, Martinez A. On identification of intrusive applications: a step toward heuristics-based adaptive security policy. IEEE Access. 2024;12:37586\u201399. https:\/\/doi.org\/10.1109\/ACCESS.2024.3373202.","journal-title":"IEEE Access"},{"issue":"2021","key":"957_CR62","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107716","volume":"98","author":"A Mihoub","year":"2022","unstructured":"Mihoub A, Ben Fredj O, Cheikhrouhou O, Derhab A, Krichen M. Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques. Comput Electr Eng. 2022;98(2021): 107716. https:\/\/doi.org\/10.1016\/j.compeleceng.2022.107716.","journal-title":"Comput Electr Eng"},{"issue":"1","key":"957_CR63","doi-asserted-by":"publisher","first-page":"687","DOI":"10.32604\/csse.2023.030188","volume":"45","author":"F Alrowais","year":"2023","unstructured":"Alrowais F, Althahabi S, Alotaibi SS, Mohamed A, Hamza MA, Marzouk R. Automated machine learning enabled cybersecurity threat detection in internet of things environment. Comput Syst Sci Eng. 2023;45(1):687\u2013700. https:\/\/doi.org\/10.32604\/csse.2023.030188.","journal-title":"Comput Syst Sci Eng"},{"key":"957_CR64","doi-asserted-by":"publisher","DOI":"10.3390\/s23136176","author":"Z Liu","year":"2023","unstructured":"Liu Z, Wang Y, Feng F, Liu Y, Li Z, Shan Y. A DDoS detection method based on feature engineering and machine learning in software-defined networks. Sensors. 2023. https:\/\/doi.org\/10.3390\/s23136176.","journal-title":"Sensors"},{"key":"957_CR65","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/j.aej.2023.03.093","volume":"72","author":"N Omer","year":"2023","unstructured":"Omer N, Samak AH, Taloba AI, Abd El-Aziz RM. A novel optimized probabilistic neural network approach for intrusion detection and categorization. Alex Eng J. 2023;72:351\u201361. https:\/\/doi.org\/10.1016\/j.aej.2023.03.093.","journal-title":"Alex Eng J"},{"issue":"January","key":"957_CR66","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.aej.2024.01.073","volume":"91","author":"NO Aljehane","year":"2024","unstructured":"Aljehane NO, Mengash HA, Hassine SBH, Alotaibi FA, Salama AS, Abdelbagi S. Optimizing intrusion detection using intelligent feature selection with machine learning model. Alex Eng J. 2024;91(January):39\u201349. https:\/\/doi.org\/10.1016\/j.aej.2024.01.073.","journal-title":"Alex Eng J"},{"key":"957_CR67","doi-asserted-by":"publisher","unstructured":"Talpur F, Korejo IA, Chandio AA, Ghulam A. ML-based detection of DDoS attacks using evolutionary algorithms optimization. 2024;24(5):1672. https:\/\/doi.org\/10.3390\/s24051672","DOI":"10.3390\/s24051672"},{"key":"957_CR68","doi-asserted-by":"publisher","first-page":"74","DOI":"10.52756\/10.52756\/ijerr.2023.v31spl.008","volume":"31","author":"A Kumar","year":"2023","unstructured":"Kumar A, Dutta S, Pranav P. Supervised learning for attack detection in cloud. Int J Exp Res Rev. 2023;31:74\u201384. https:\/\/doi.org\/10.52756\/10.52756\/ijerr.2023.v31spl.008.","journal-title":"Int J Exp Res Rev"},{"issue":"2","key":"957_CR69","doi-asserted-by":"publisher","first-page":"64","DOI":"10.3390\/a17020064","volume":"17","author":"S More","year":"2024","unstructured":"More S, Idrissi M, Mahmoud H, Asyhari AT. Enhanced intrusion detection systems performance with UNSW-NB15 data analysis. Algorithms. 2024;17(2):64. https:\/\/doi.org\/10.3390\/a17020064.","journal-title":"Algorithms"},{"issue":"1","key":"957_CR70","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4108\/eetsc.3222","volume":"7","author":"MN Chohan","year":"2023","unstructured":"Chohan MN, Haider U, Ayub MY, Shoukat H, Bhatia TK, Ul Hassan MF. Detection of cyber attacks using machine learning based intrusion detection system for IoT based smart cities. EAI Endorsed Trans Smart Cities. 2023;7(1):1\u20137. https:\/\/doi.org\/10.4108\/eetsc.3222.","journal-title":"EAI Endorsed Trans Smart Cities"},{"key":"957_CR71","doi-asserted-by":"publisher","DOI":"10.1063\/5.0184539","volume":"2742","author":"A Singh","year":"2024","unstructured":"Singh A, Shibargatti A, Jena MA, Manvi S. Machine learning based detection of phishing websites in chrome. 1st Int Conf Emma-2021. 2024;2742: 020072. https:\/\/doi.org\/10.1063\/5.0184539.","journal-title":"1st Int Conf Emma-2021"},{"key":"957_CR72","doi-asserted-by":"publisher","DOI":"10.3991\/ijoe.v19i18.45483","author":"B Rexha","year":"2023","unstructured":"Rexha B, Thaqi R, Mazrekaj A, Vishi K. Guarding the Cloud: an effective detection of cloud-based cyber attacks using machine learning algorithm. Int J Online Biomed Eng. 2023. https:\/\/doi.org\/10.3991\/ijoe.v19i18.45483.","journal-title":"Int J Online Biomed Eng"},{"issue":"7","key":"957_CR73","doi-asserted-by":"publisher","first-page":"213","DOI":"10.12700\/APH.19.7.2022.7.12","volume":"19","author":"AN \u00d6zalp","year":"2022","unstructured":"\u00d6zalp AN, Albayrak Z. Detecting cyber attacks with high-frequency features using machine learning algorithms. Acta Polytech Hungarica. 2022;19(7):213\u201333. https:\/\/doi.org\/10.12700\/APH.19.7.2022.7.12.","journal-title":"Acta Polytech Hungarica"},{"issue":"1","key":"957_CR74","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2023.e23574","volume":"10","author":"M Azeem","year":"2024","unstructured":"Azeem M, Khan D, Iftikhar S, Bawazeer S, Alzahrani M. Analyzing and comparing the effectiveness of malware detection: a study of machine learning approaches. Heliyon. 2024;10(1): e23574. https:\/\/doi.org\/10.1016\/j.heliyon.2023.e23574.","journal-title":"Heliyon"},{"issue":"1","key":"957_CR75","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1080\/25765299.2023.2261219","volume":"30","author":"M Hammad","year":"2023","unstructured":"Hammad M, Hewahi N, Elmedany W. Enhancing network intrusion recovery in SDN with machine learning: an innovative approach. Arab J Basic Appl Sci. 2023;30(1):561\u201372. https:\/\/doi.org\/10.1080\/25765299.2023.2261219.","journal-title":"Arab J Basic Appl Sci"},{"issue":"August","key":"957_CR76","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103462","volume":"134","author":"MA Ribeiro","year":"2023","unstructured":"Ribeiro MA, Pereira Fonseca MS, de Santi J. Detecting and mitigating DDoS attacks with moving target defense approach based on automated flow classification in SDN networks. Comput Secur. 2023;134(August): 103462. https:\/\/doi.org\/10.1016\/j.cose.2023.103462.","journal-title":"Comput Secur"},{"key":"957_CR77","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103644","author":"X Yuan","year":"2024","unstructured":"Yuan X, Han S, Huang W, Ye H, Kong X, Zhang F. A simple framework to enhance the adversarial robustness of deep learning-based intrusion detection system. Comput Secur. 2024. https:\/\/doi.org\/10.1016\/j.cose.2023.103644.","journal-title":"Comput Secur"},{"key":"957_CR78","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.123027","author":"R Devendiran","year":"2024","unstructured":"Devendiran R, Turukmane AV. Dugat-LSTM: deep learning based network intrusion detection system using chaotic optimization strategy. Expert Syst Appl. 2024. https:\/\/doi.org\/10.1016\/j.eswa.2023.123027.","journal-title":"Expert Syst Appl"},{"key":"957_CR79","doi-asserted-by":"publisher","unstructured":"Yaras S, Dener M. IoT-Based Intrusion Detection System Using New Hybrid Deep Learning Algorithm. Electronics. 2024;13(6):1053. https:\/\/doi.org\/10.3390\/electronics.","DOI":"10.3390\/electronics"},{"key":"957_CR80","doi-asserted-by":"publisher","DOI":"10.1016\/j.teler.2023.100077","author":"V Hnamte","year":"2023","unstructured":"Hnamte V, Hussain J. Dependable intrusion detection system using deep convolutional neural network: a novel framework and performance evaluation approach. Telemat Inform Rep. 2023. https:\/\/doi.org\/10.1016\/j.teler.2023.100077.","journal-title":"Telemat Inform Rep"},{"key":"957_CR81","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1016\/j.future.2020.03.004","volume":"108","author":"A Makkar","year":"2020","unstructured":"Makkar A, Kumar N. An efficient deep learning-based scheme for web spam detection in IoT environment. Futur Gener Comput Syst. 2020;108:467\u201387. https:\/\/doi.org\/10.1016\/j.future.2020.03.004.","journal-title":"Futur Gener Comput Syst"},{"key":"957_CR82","doi-asserted-by":"publisher","first-page":"87936","DOI":"10.1109\/ACCESS.2021.3089586","volume":"9","author":"O Aslan","year":"2021","unstructured":"Aslan O, Yilmaz AA. A new malware classification framework based on deep learning algorithms. IEEE Access. 2021;9:87936\u201351. https:\/\/doi.org\/10.1109\/ACCESS.2021.3089586.","journal-title":"IEEE Access"},{"key":"957_CR83","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102748","volume":"118","author":"D Akgun","year":"2022","unstructured":"Akgun D, Hizal S, Cavusoglu U. A new DDoS attacks intrusion detection model based on deep learning for cybersecurity. Comput Secur. 2022;118: 102748. https:\/\/doi.org\/10.1016\/j.cose.2022.102748.","journal-title":"Comput Secur"},{"key":"957_CR84","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12081861","author":"\u00d6 Aslan","year":"2023","unstructured":"Aslan \u00d6. Separating malicious from benign software using deep learning algorithm. Electronics (Switzerland). 2023. https:\/\/doi.org\/10.3390\/electronics12081861.","journal-title":"Electronics (Switzerland)"},{"issue":"3","key":"957_CR85","doi-asserted-by":"publisher","first-page":"6784","DOI":"10.3934\/math.2024331","volume":"9","author":"IR Alzahrani","year":"2024","unstructured":"Alzahrani IR, Allafi R. Integrating Ebola optimization search algorithm for enhanced deep learning-based ransomware detection in Internet of Things security. AIMS Math. 2024;9(3):6784\u2013802. https:\/\/doi.org\/10.3934\/math.2024331.","journal-title":"AIMS Math"},{"issue":"6","key":"957_CR86","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.3390\/electronics12061423","volume":"12","author":"RM Balajee","year":"2023","unstructured":"Balajee RM, Jayanthi Kannan MK. Intrusion detection on AWS cloud through hybrid deep learning algorithm. Electronics. 2023;12(6):1423. https:\/\/doi.org\/10.3390\/electronics12061423.","journal-title":"Electronics"},{"issue":"2","key":"957_CR87","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.11591\/ijeecs.v26.i2.pp1165-1172","volume":"26","author":"BI Farhan","year":"2022","unstructured":"Farhan BI, Jasim AD. Performance analysis of intrusion detection for deep learning model based on CSE-CIC-IDS2018 dataset. Indonesian J Electric Eng Comput Sci. 2022;26(2):1165\u201372. https:\/\/doi.org\/10.11591\/ijeecs.v26.i2.pp1165-1172.","journal-title":"Indonesian J Electric Eng Comput Sci"},{"key":"957_CR88","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.1793","volume":"10","author":"S Abbas","year":"2024","unstructured":"Abbas S, et al. Evaluating deep learning variants for cyber-attacks detection and multi-class classification in IoT networks. PeerJ Comput Sci. 2024;10: e1793. https:\/\/doi.org\/10.7717\/peerj-cs.1793.","journal-title":"PeerJ Comput Sci"},{"key":"957_CR89","doi-asserted-by":"crossref","unstructured":"Alamyar AM, License RF. Detecting malicious attacks using cyber-security models using deep learning approach. pp. 0\u201326, 2023.","DOI":"10.21203\/rs.3.rs-3160305\/v1"},{"key":"957_CR90","unstructured":"Salam A, Ullah F, Amin F, Mohammad A. Deep learning techniques for web-based attack detection in, MDPI, pp. 1\u201318, 2023."},{"issue":"2","key":"957_CR91","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10922-023-09722-7","volume":"31","author":"O Jullian","year":"2023","unstructured":"Jullian O, Otero B, Rodriguez E, Gutierrez N, Antona H, Canal R. Deep-learning based detection for cyber-attacks in IoT networks: a distributed attack detection framework. J Netw Syst Manage. 2023;31(2):1\u201324. https:\/\/doi.org\/10.1007\/s10922-023-09722-7.","journal-title":"J Netw Syst Manage"},{"issue":"11","key":"957_CR92","doi-asserted-by":"publisher","first-page":"221","DOI":"10.14569\/IJACSA.2022.0131125","volume":"13","author":"SF Ghazal","year":"2022","unstructured":"Ghazal SF, Mjlae SA. Cybersecurity in deep learning techniques: detecting network attacks. Int J Adv Comput Sci Appl. 2022;13(11):221\u201330. https:\/\/doi.org\/10.14569\/IJACSA.2022.0131125.","journal-title":"Int J Adv Comput Sci Appl"},{"issue":"3","key":"957_CR93","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/ett.3803","volume":"33","author":"Y Otoum","year":"2022","unstructured":"Otoum Y, Liu D, Nayak A. DL-IDS: a deep learning-based intrusion detection framework for securing IoT. Trans Emerg Telecommun Technol. 2022;33(3):1\u201314. https:\/\/doi.org\/10.1002\/ett.3803.","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"12","key":"957_CR94","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/su15129395","volume":"15","author":"HM Chuang","year":"2023","unstructured":"Chuang HM, Ye LJ. Applying transfer learning approaches for intrusion detection in software-defined networking. Sustainability (Switzerland). 2023;15(12):1\u201324. https:\/\/doi.org\/10.3390\/su15129395.","journal-title":"Sustainability (Switzerland)"},{"key":"957_CR95","doi-asserted-by":"publisher","DOI":"10.3390\/a16040197","author":"L Chen","year":"2023","unstructured":"Chen L, Wang Z, Huo R, Huang T. An adversarial DBN-LSTM method for detecting and defending against DDoS attacks in SDN environments. Algorithms. 2023. https:\/\/doi.org\/10.3390\/a16040197.","journal-title":"Algorithms"},{"key":"957_CR96","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1016\/j.procs.2023.01.014","volume":"218","author":"AK Dey","year":"2022","unstructured":"Dey AK, Gupta GP, Sahu SP. Hybrid meta-heuristic based feature selection mechanism for cyber-attack detection in IoT-enabled networks. Procedia Comput Sci. 2022;218:318\u201327. https:\/\/doi.org\/10.1016\/j.procs.2023.01.014.","journal-title":"Procedia Comput Sci"},{"issue":"January","key":"957_CR97","doi-asserted-by":"publisher","DOI":"10.1016\/j.dajour.2023.100206","volume":"7","author":"AK Dey","year":"2023","unstructured":"Dey AK, Gupta GP, Sahu SP. A metaheuristic-based ensemble feature selection framework for cyber threat detection in IoT-enabled networks. Decis Anal J. 2023;7(January): 100206. https:\/\/doi.org\/10.1016\/j.dajour.2023.100206.","journal-title":"Decis Anal J"},{"issue":"4s","key":"957_CR98","first-page":"122","volume":"2024","author":"P Mange","year":"2023","unstructured":"Mange P, Lule A, Savant R. Advanced spam email detection using machine learning and bio-inspired meta-heuristics algorithms. Int J Intell Syst Appl Eng IJISAE. 2023;2024(4s):122\u201335.","journal-title":"Int J Intell Syst Appl Eng IJISAE"},{"key":"957_CR99","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13556","author":"H Naeem","year":"2024","unstructured":"Naeem H, Ullah F, Srivastava G. Classification of intrusion cyber-attacks in smart power grids using deep ensemble learning with metaheuristic-based optimization. Expert Syst. 2024. https:\/\/doi.org\/10.1111\/exsy.13556.","journal-title":"Expert Syst"},{"key":"957_CR100","doi-asserted-by":"publisher","DOI":"10.3390\/app13042172","author":"A Albakri","year":"2023","unstructured":"Albakri A, Alhayan F, Alturki N, Ahamed S, Shamsudheen S. Metaheuristics with deep learning model for cybersecurity and android malware detection and classification. Appl Sci (Switzerland). 2023. https:\/\/doi.org\/10.3390\/app13042172.","journal-title":"Appl Sci (Switzerland)"},{"issue":"February","key":"957_CR101","doi-asserted-by":"publisher","first-page":"18660","DOI":"10.1109\/ACCESS.2023.3247193","volume":"11","author":"SY Diaba","year":"2023","unstructured":"Diaba SY, Shafie-Khah M, Elmusrati M. Cyber security in power systems using meta-heuristic and deep learning algorithms. IEEE Access. 2023;11(February):18660\u201372. https:\/\/doi.org\/10.1109\/ACCESS.2023.3247193.","journal-title":"IEEE Access"},{"issue":"9","key":"957_CR102","first-page":"369","volume":"12","author":"MA Alshammari","year":"2024","unstructured":"Alshammari MA, Abd El-Aziz AA, Hamdi H. Detecting traffic diversion using metaheuristic algorithm in SDN. Int J Intell Syst Appl Eng. 2024;12(9):369\u201379.","journal-title":"Int J Intell Syst Appl Eng"},{"issue":"2","key":"957_CR103","doi-asserted-by":"publisher","first-page":"2677","DOI":"10.32604\/cmc.2023.033273","volume":"74","author":"R Alkanhel","year":"2023","unstructured":"Alkanhel R, et al. Network intrusion detection based on feature selection and hybrid metaheuristic optimization. Comput Mater Continua. 2023;74(2):2677\u201393. https:\/\/doi.org\/10.32604\/cmc.2023.033273.","journal-title":"Comput Mater Continua"},{"issue":"1","key":"957_CR104","doi-asserted-by":"publisher","first-page":"265","DOI":"10.32604\/cmes.2023.027581","volume":"137","author":"O Mjahed","year":"2023","unstructured":"Mjahed O, El Hadaj S, El Guarmah EM, Mjahed S. Improved supervised and unsupervised metaheuristic-based approaches to detect intrusion in various datasets. CMES Comput Model Eng Sci. 2023;137(1):265\u201398. https:\/\/doi.org\/10.32604\/cmes.2023.027581.","journal-title":"CMES Comput Model Eng Sci"},{"key":"957_CR105","doi-asserted-by":"publisher","DOI":"10.1108\/IJWIS-06-2023-0089","author":"M Thomas","year":"2024","unstructured":"Thomas M, Meshram BB. DoS attack detection using Aquila deer hunting optimization enabled deep belief network. Int J Web Inf Syst. 2024. https:\/\/doi.org\/10.1108\/IJWIS-06-2023-0089.","journal-title":"Int J Web Inf Syst"},{"issue":"3","key":"957_CR106","doi-asserted-by":"publisher","first-page":"1044","DOI":"10.3390\/app14031044","volume":"14","author":"HN Mohsenabad","year":"2024","unstructured":"Mohsenabad HN, Tut MA. Optimizing cybersecurity attack detection in computer networks: a comparative analysis of bio-inspired optimization algorithms using the CSE-CIC-IDS 2018 dataset. Appl Sci. 2024;14(3):1044. https:\/\/doi.org\/10.3390\/app14031044.","journal-title":"Appl Sci"},{"key":"957_CR107","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102164","volume":"102","author":"A Nazir","year":"2021","unstructured":"Nazir A, Khan RA. A novel combinatorial optimization based feature selection method for network intrusion detection. Comput Secur. 2021;102: 102164. https:\/\/doi.org\/10.1016\/j.cose.2020.102164.","journal-title":"Comput Secur"},{"issue":"6","key":"957_CR108","doi-asserted-by":"publisher","first-page":"7575","DOI":"10.1007\/s12652-023-04571-3","volume":"14","author":"R Ghanbarzadeh","year":"2023","unstructured":"Ghanbarzadeh R, Hosseinalipour A, Ghaffari A. A novel network intrusion detection method based on metaheuristic optimisation algorithms. J Ambient Intell Human Comput. 2023;14(6):7575\u201392. https:\/\/doi.org\/10.1007\/s12652-023-04571-3.","journal-title":"J Ambient Intell Human Comput"},{"key":"957_CR109","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13050899","author":"A Zeinalpour","year":"2024","unstructured":"Zeinalpour A, McElroy CP. Comparing metaheuristic search techniques in addressing the effectiveness of clustering-based DDoS attack detection methods. Electronics (Switzerland). 2024. https:\/\/doi.org\/10.3390\/electronics13050899.","journal-title":"Electronics (Switzerland)."},{"issue":"3","key":"957_CR110","doi-asserted-by":"publisher","first-page":"99","DOI":"10.22059\/JITM.2023.93627","volume":"15","author":"N Goyal","year":"2023","unstructured":"Goyal N, Trivedi MC. Metaheuristic algorithms for optimization and feature selection in cloud data classification using convolutional neural network. J Inf Technol Manag. 2023;15(3):99\u2013112. https:\/\/doi.org\/10.22059\/JITM.2023.93627.","journal-title":"J Inf Technol Manag"},{"issue":"4","key":"957_CR111","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1177\/15485129221094881","volume":"20","author":"A Prasad","year":"2023","unstructured":"Prasad A, Chandra S. Machine learning to combat cyberattack: a survey of datasets and challenges. J Model Simul. 2023;20(4):577\u201388. https:\/\/doi.org\/10.1177\/15485129221094881.","journal-title":"J Model Simul"},{"key":"957_CR112","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102675","author":"Z Yang","year":"2022","unstructured":"Yang Z, et al. A systematic literature review of methods and datasets for anomaly-based network intrusion detection. Comput Secur. 2022. https:\/\/doi.org\/10.1016\/j.cose.2022.102675.","journal-title":"Comput Secur"},{"key":"957_CR113","doi-asserted-by":"publisher","first-page":"40281","DOI":"10.1109\/ACCESS.2022.3165809","volume":"10","author":"MA Ferrag","year":"2022","unstructured":"Ferrag MA, Friha O, Hamouda D, Maglaras L, Janicke H. Edge-IIoTset: a new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access. 2022;10:40281\u2013306. https:\/\/doi.org\/10.1109\/ACCESS.2022.3165809.","journal-title":"IEEE Access"},{"key":"957_CR114","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-019-0038-7","author":"A Khraisat","year":"2019","unstructured":"Khraisat A, Gondal I, Vamplew P, Kamruzzaman J. Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity. 2019. https:\/\/doi.org\/10.1186\/s42400-019-0038-7.","journal-title":"Cybersecurity"},{"key":"957_CR115","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103545","author":"A Prasad","year":"2024","unstructured":"Prasad A, Chandra S. PhiUSIIL: a diverse security profile empowered phishing URL detection framework based on similarity index and incremental learning. Comput Secur. 2024. https:\/\/doi.org\/10.1016\/j.cose.2023.103545.","journal-title":"Comput Secur"},{"key":"957_CR116","doi-asserted-by":"publisher","unstructured":"Kim Y, Hakak S, Ghorbani A. DDoS Attack Dataset (CICEV2023) against EV Authentication in Charging Infrastructure. In 2023 20th Annual International Conference on Privacy, Security and Trust, PST 2023, Institute of Electrical and Electronics Engineers Inc., 2023. https:\/\/doi.org\/10.1109\/PST58708.2023.10320202.","DOI":"10.1109\/PST58708.2023.10320202"},{"key":"957_CR117","doi-asserted-by":"publisher","DOI":"10.3390\/s23115348","author":"SS Shafin","year":"2023","unstructured":"Shafin SS, Karmakar G, Mareels I. Obfuscated memory malware detection in resource-constrained IoT devices for smart city applications. Sensors. 2023. https:\/\/doi.org\/10.3390\/s23115348.","journal-title":"Sensors"},{"issue":"5","key":"957_CR118","doi-asserted-by":"publisher","first-page":"3962","DOI":"10.1109\/JIOT.2021.3102056","volume":"9","author":"M Al-Hawawreh","year":"2022","unstructured":"Al-Hawawreh M, Sitnikova E, Aboutorab N. X-IIoTID: a connectivity-agnostic and device-agnostic intrusion data set for industrial internet of things. IEEE Internet Things J. 2022;9(5):3962\u201377. https:\/\/doi.org\/10.1109\/JIOT.2021.3102056.","journal-title":"IEEE Internet Things J"},{"key":"957_CR119","doi-asserted-by":"publisher","unstructured":"Thota S, Menaka D. Botnet detection in the internet-of-things networks using convolutional neural network with pelican optimization algorithm. Automatika 2024;65(1):250\u201360. https:\/\/doi.org\/10.1080\/00051144.2023.2288486","DOI":"10.1080\/00051144.2023.2288486"}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-024-00957-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s40537-024-00957-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-024-00957-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,4]],"date-time":"2024-08-04T13:02:58Z","timestamp":1722776578000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofbigdata.springeropen.com\/articles\/10.1186\/s40537-024-00957-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,4]]},"references-count":119,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["957"],"URL":"https:\/\/doi.org\/10.1186\/s40537-024-00957-y","relation":{},"ISSN":["2196-1115"],"issn-type":[{"value":"2196-1115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,4]]},"assertion":[{"value":"4 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 August 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"105"}}