{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T23:15:12Z","timestamp":1768432512848,"version":"3.49.0"},"reference-count":25,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T00:00:00Z","timestamp":1756598400000},"content-version":"vor","delay-in-days":242,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.066892","type":"journal-article","created":{"date-parts":[[2025,8,5]],"date-time":"2025-08-05T07:42:29Z","timestamp":1754379749000},"page":"1751-1777","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":2,"title":["AI-Driven Identification of Attack Precursors: A Machine Learning Approach to Predictive Cybersecurity"],"prefix":"10.32604","volume":"85","author":[{"given":"Abdulwahid Al","family":"Abdulwahid","sequence":"first","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"123","DOI":"10.30574\/wjarr.2024.24.2.3182","article-title":"Detecting insider threats in banking using AI-driven anomaly detection with a data science approach to cybersecurity","volume":"24","author":"Ajayi","year":"2024","journal-title":"World J Adv Res Rev"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"e5056","DOI":"10.1002\/ett.5056","article-title":"Botnets unveiled: a comprehensive survey on evolving threats and defense strategies","volume":"35","author":"Asadi","year":"2024","journal-title":"Trans Emerging Tel Tech"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1003","DOI":"10.1016\/j.procs.2023.01.080","article-title":"Anomaly detection using ensemble techniques for boosting the security of intrusion detection system","volume":"218","author":"Bukhari","year":"2023","journal-title":"Procedia Comput Sci"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3691338","article-title":"Deep learning for time series anomaly detection: a survey","volume":"57","author":"Zamanzadeh Darban","year":"2025","journal-title":"ACM Comput Surv"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"4580","DOI":"10.3390\/app11104580","article-title":"Internet of Things meet Internet of threats: new concern cyber security issues of critical cyber infrastructure","volume":"11","author":"Djenna","year":"2021","journal-title":"Appl Sci"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1558","DOI":"10.47772\/IJRISS.2023.7011121","article-title":"The role of cyber security in a digitalizing economy: a development perspective","volume":"7","author":"Erondu","year":"2023","journal-title":"Int J Res Innov Soc Sci"},{"key":"ref7","series-title":"Proceedings of the 2024 2nd International Conference on Cyber Resilience (ICCR); 2024 Feb 26\u201328","article-title":"AI-driven solutions for social engineering attacks: detection, prevention, and response","author":"Fakhouri"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1007\/s42484-024-00163-2","article-title":"Quantum deep learning-based anomaly detection for enhanced network security","volume":"6","author":"Hdaib","year":"2024","journal-title":"Quantum Mach Intell"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"46717","DOI":"10.1109\/ACCESS.2019.2906934","article-title":"Robust intelligent malware detection using deep learning","volume":"7","author":"Vinayakumar","year":"2019","journal-title":"IEEE Access"},{"key":"ref10","series-title":"Proceedings of the 2023 IEEE 3rd International Conference on Computer Communication and Artificial Intelligence (CCAI); 2023 May 26\u201328","article-title":"Review of network anomaly detection in the high-speed railway signal system based on artificial intelligence","author":"Li"},{"key":"ref11","article-title":"Machine learning in adaptive cyber defense: combatting advanced persistent threats","author":"Saghar","year":"2023","journal-title":"Int J Adv Cybersecur Syst Technol"},{"key":"ref12","unstructured":"Makrakis GM, Kolias C, Kambourakis G, Rieger C, Benjamin J. Vulnerabilities and attacks against industrial control systems and critical infrastructures. arXiv:2109.03945. 2021. doi:10.48550\/arXiv.2109.03945."},{"key":"ref13","first-page":"15","article-title":"Future trends in AI driven cyber security","volume":"3","author":"Mamidi","year":"2024","journal-title":"IRE J"},{"key":"ref14","series-title":"Proceedings of the 2023 IEEE 20th India Council International Conference (INDICON)","article-title":"An empirical evaluation of machine learning algorithms for intrusion detection in IIoT networks","author":"Matke"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"17982","DOI":"10.1109\/ACCESS.2024.3360868","article-title":"Machine learning and deep learning techniques for distributed denial of service anomaly detection in software defined networks\u2014current research solutions","volume":"12","author":"Musa","year":"2024","journal-title":"IEEE Access"},{"key":"ref16","first-page":"345","article-title":"AI-driven cloud security: examining the impact of user behavior analysis on threat detection","volume":"23","author":"Olabanji","year":"2024","journal-title":"Asian J Inf Technol"},{"key":"ref17","unstructured":"Peddavenkatagari CR. Ai-powered cybersecurity: transformative strategies for industry 4.0 resilience; 2024 [cited 2025 Jul 12]. Available from: https:\/\/d1wqtxts1xzle7.cloudfront.net\/113271584\/AI_Powered_Cybersecurity_Transformative_Strategies_for_Industry_4.0_Resilience-libre.pdf."},{"key":"ref18","doi-asserted-by":"crossref","first-page":"102164","DOI":"10.1016\/j.jksuci.2024.102164","article-title":"Systematic review of deep learning solutions for malware detection and forensic analysis in IoT","volume":"36","author":"Qureshi","year":"2024","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"2005","DOI":"10.30574\/wjarr.2023.20.3.2741","article-title":"Integrating Artificial Intelligence, machine learning, and data analytics in cybersecurity: a holistic approach to advanced threat detection and response","volume":"20","author":"Raji","year":"2023","journal-title":"World J Adv Res Rev"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"e7865","DOI":"10.1002\/cpe.7865","article-title":"A hybrid ensemble machine learning model for detecting APT attacks based on network behavior anomaly detection","volume":"35","author":"Saini","year":"2023","journal-title":"Concurr Comput"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"119462","DOI":"10.1109\/ACCESS.2023.3325929","article-title":"IoT network anomaly detection in smart homes using machine learning","volume":"11","author":"Sarwar","year":"2023","journal-title":"IEEE Access"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"12619","DOI":"10.1007\/s11042-020-10354-1","article-title":"Anomaly events classification and detection system in critical industrial Internet of Things infrastructure using machine learning algorithms","volume":"80","author":"Selim","year":"2021","journal-title":"Multimed Tools Appl"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.58679\/mm28378","author":"Sfetcu","year":"2024","journal-title":"Advanced persistent threats in cybersecurity\u2013cyber warfare"},{"key":"ref24","first-page":"210","article-title":"Using artificial intelligence for automated incidence response in cybersecurity","volume":"12","author":"Uzoma","year":"2023","journal-title":"Int J Inf Secur"},{"key":"ref25","first-page":"52565","volume":"12","author":"Sadia","year":"2024","journal-title":"Intrusion detection system for wireless sensor networks: a machine learning based approach"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-1\/TSP_CMC_66892\/TSP_CMC_66892.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:08:36Z","timestamp":1763345316000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n1\/63553"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":25,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.066892","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-04-19","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-14","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-29","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}