{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T15:35:31Z","timestamp":1772897731018,"version":"3.50.1"},"reference-count":76,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T00:00:00Z","timestamp":1748822400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>As cyberattacks continue to rise alongside the rapid expansion of digital systems, effective threat detection remains a critical yet challenging task. While several machine learning approaches have been proposed, the use of graph neural networks (GNNs) for cyberattack detection has not yet been systematically explored in depth. This paper presents a systematic literature review (SLR) that analyzes 28 recent academic studies published between 2020 and 2025, retrieved from major databases including IEEE, ACM, Scopus, and Springer. The review focuses on evaluating how GNN models are applied in detecting various types of attacks, particularly those targeting IoT environments, web services, phishing, and network traffic. Studies were classified based on the type of dataset, GNN model architecture, and attack domain. Additionally, key limitations and future research directions were extracted and analyzed. The findings provide a structured comparison of current methodologies and highlight gaps that warrant further exploration. This review contributes a focused perspective on the potential of GNNs in cybersecurity and offers insights to guide future developments in the field.<\/jats:p>","DOI":"10.3390\/info16060470","type":"journal-article","created":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T10:21:49Z","timestamp":1748859709000},"page":"470","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Systematic Review of Graph Neural Network for Malicious Attack Detection"],"prefix":"10.3390","volume":"16","author":[{"given":"Sarah Mohammed","family":"Alshehri","sequence":"first","affiliation":[{"name":"Computer Science Department, King Abdulaziz University, Jeddah 21589, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0806-1396","authenticated-orcid":false,"given":"Sanaa Abdullah","family":"Sharaf","sequence":"additional","affiliation":[{"name":"Computer Science Department, King Abdulaziz University, Jeddah 21589, Saudi Arabia"}]},{"given":"Rania Abdullrahman","family":"Molla","sequence":"additional","affiliation":[{"name":"Computer Science Department, King Abdulaziz University, Jeddah 21589, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2025,6,2]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Ongsulee, P. (2017, January 22\u201324). Artificial Intelligence, Machine Learning and Deep Learning. Proceedings of the 2017 15th International Conference on ICT and Knowledge Engineering (ICT&KE), Bangkok, Thailand.","DOI":"10.1109\/ICTKE.2017.8259629"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"648","DOI":"10.1109\/TCCN.2018.2881442","article-title":"A Very Brief Introduction to Machine Learning with Applications to Communication Systems","volume":"4","author":"Simeone","year":"2018","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Varlamis, I., Michail, D., Glykou, F., and Tsantilas, P. (2022). A Survey on the Use of Graph Convolutional Networks for Combating Fake News. Future Internet, 14.","DOI":"10.3390\/fi14030070"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Thapa, N., Liu, Z., Kc, D.B., Gokaraju, B., and Roy, K. (2020). Comparison of Machine Learning and Deep Learning Models for Network Intrusion Detection Systems. Future Internet, 12.","DOI":"10.3390\/fi12100167"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Dhingra, M., Jain, M., and Jadon, R.S. (2016, January 22\u201324). Role of Artificial Intelligence in Enterprise Information Security: A Review. Proceedings of the 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC), Waknaghat, India.","DOI":"10.1109\/PDGC.2016.7913142"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Apruzzese, G., Colajanni, M., Ferretti, L., Guido, A., and Marchetti, M. (June, January 29). On the Effectiveness of Machine and Deep Learning for Cyber Security. Proceedings of the 2018 10th International Conference on Cyber Conflict (CyCon), Tallinn, Estonia.","DOI":"10.23919\/CYCON.2018.8405026"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"100365","DOI":"10.1016\/j.iot.2021.100365","article-title":"Machine Learning Approaches to IoT Security: A Systematic Literature Review","volume":"14","author":"Ahmad","year":"2021","journal-title":"Internet Things"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Aljofey, A., Jiang, Q., Qu, Q., Huang, M., and Niyigena, J.-P. (2020). An Effective Phishing Detection Model Based on Character Level Convolutional Neural Network from URL. Electronics, 9.","DOI":"10.3390\/electronics9091514"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"22","DOI":"10.3991\/ijim.v14i11.13903","article-title":"Efficient Detection of Phishing Websites Using Multilayer Perceptron","volume":"14","author":"Odeh","year":"2020","journal-title":"Int. J. Interact. Mob. Technol. (iJIM)"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Teoh, T.T., Chiew, G., Franco, E.J., Ng, P.C., Benjamin, M.P., and Goh, Y.J. (2018, January 11\u201312). Anomaly Detection in Cyber Security Attacks on Networks Using MLP Deep Learning. Proceedings of the 2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE), Kuala Lumpur, Malaysia.","DOI":"10.1109\/ICSCEE.2018.8538395"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1495","DOI":"10.1016\/S0893-6080(97)00002-6","article-title":"An Efficient Method to Construct a Radial Basis Function Neural Network Classifier","volume":"10","author":"Hwang","year":"1997","journal-title":"Neural Netw."},{"key":"ref_12","unstructured":"Rapaka, A., Novokhodko, A., and Wunsch, D. (2003, January 20\u201324). Intrusion Detection Using Radial Basis Function Network on Sequences of System Calls. Proceedings of the International Joint Conference on Neural Networks, Portland, OR, USA."},{"key":"ref_13","first-page":"1512","article-title":"RBF-Based Real-Time Hierarchical Intrusion Detection Systems","volume":"Volume 2","author":"Jiang","year":"2003","journal-title":"Proceedings of the International Joint Conference on Neural Networks"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Berman, D.S., Buczak, A.L., Chavis, J.S., and Corbett, C.L. (2019). A Survey of Deep Learning Methods for Cyber Security. Information, 10.","DOI":"10.3390\/info10040122"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/j.neucom.2019.02.056","article-title":"Application of Deep Learning to Cybersecurity: A Survey","volume":"347","author":"Mahdavifar","year":"2019","journal-title":"Neurocomputing"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1007\/s42979-021-00535-6","article-title":"Deep Cybersecurity: A Comprehensive Overview from Neural Network and Deep Learning Perspective","volume":"2","author":"Sarker","year":"2021","journal-title":"SN Comput. Sci."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Arivukarasi, M., and Antonidoss, A. (2020, January 11\u201313). Performance Analysis of Malicious URL Detection by Using RNN and LSTM. Proceedings of the 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC), Erode, India.","DOI":"10.1109\/ICCMC48092.2020.ICCMC-00085"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"3","DOI":"10.3233\/ICA-1999-6102","article-title":"Process Monitoring and Modeling Using the Self-Organizing Map","volume":"6","author":"Alhoniemi","year":"1999","journal-title":"Integr. Comput. Aided Eng."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Markovi\u0107, V.S., Marjanovi\u0107 Jakovljevi\u0107, M., and Njegu\u0161, A. (2020, January 26). Anomalies Detection in the Application Logs Using Kohonen SOM Machine Learning Algorithm. Proceedings of the SINTEZA 2020\u2014International Scientific Conference on Information Technology and Data Related Research, Belgrade, Serbia.","DOI":"10.15308\/Sinteza-2020-275-282"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Ramadas, M., Ostermann, S., and Tjaden, B. (2003). Detecting Anomalous Network Traffic with Self-Organizing Maps, Springer.","DOI":"10.1007\/978-3-540-45248-5_3"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"2923","DOI":"10.1109\/COMST.2018.2844341","article-title":"Deep Learning for IoT Big Data and Streaming Analytics: A Survey","volume":"20","author":"Mohammadi","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Yousefi-Azar, M., Varadharajan, V., Hamey, L., and Tupakula, U. (2017, January 14\u201319). Autoencoder-Based Feature Learning for Cyber Security Applications. Proceedings of the 2017 International Joint Conference on Neural Networks (IJCNN), Anchorage, AK, USA.","DOI":"10.1109\/IJCNN.2017.7966342"},{"key":"ref_23","unstructured":"Wong, M.C.K. (2019). Deep Learning Models for Malicious Web Content Detection: An Enterprise Study, University of Toronto."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"36429","DOI":"10.1109\/ACCESS.2022.3151903","article-title":"Deep Learning for Phishing Detection: Taxonomy, Current Challenges and Future Directions","volume":"10","author":"Do","year":"2022","journal-title":"IEEE Access"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Ren, F., Jiang, Z., and Liu, J. (2019, January 20\u201322). A Bi-Directional LSTM Model with Attention for Malicious URL Detection. Proceedings of the 2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chengdu, China.","DOI":"10.1109\/IAEAC47372.2019.8997947"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"8872923","DOI":"10.1155\/2020\/8872923","article-title":"Network Attacks Detection Methods Based on Deep Learning Techniques: A Survey","volume":"2020","author":"Wu","year":"2020","journal-title":"Secur. Commun. Netw."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1527","DOI":"10.1162\/neco.2006.18.7.1527","article-title":"A Fast Learning Algorithm for Deep Belief Nets","volume":"18","author":"Hinton","year":"2006","journal-title":"Neural Comput."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.inffus.2017.10.006","article-title":"A Survey on Deep Learning for Big Data","volume":"42","author":"Zhang","year":"2018","journal-title":"Inf. Fusion"},{"key":"ref_29","first-page":"205","article-title":"A Hybrid Malicious Code Detection Method Based on Deep Learning","volume":"9","author":"Li","year":"2015","journal-title":"Int. J. Secur. Its Appl."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Asharf, J., Moustafa, N., Khurshid, H., Debie, E., Haider, W., and Wahab, A. (2020). A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions. Electronics, 9.","DOI":"10.3390\/electronics9071177"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Hinton, G.E. (2012). A Practical Guide to Training Restricted Boltzmann Machines, Springer.","DOI":"10.1007\/978-3-642-35289-8_32"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1016\/j.jnca.2019.02.026","article-title":"Intrusion Detection in Smart Cities Using Restricted Boltzmann Machines","volume":"135","author":"Elseaidy","year":"2019","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.neucom.2012.11.050","article-title":"Network Anomaly Detection with the Restricted Boltzmann Machine","volume":"122","author":"Fiore","year":"2013","journal-title":"Neurocomputing"},{"key":"ref_34","first-page":"2672","article-title":"Generative Adversarial Nets","volume":"2","author":"Goodfellow","year":"2014","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref_35","first-page":"431","article-title":"A Secure Architecture for IoT with Supply Chain Risk Management","volume":"Volume 1","author":"Hiromoto","year":"2017","journal-title":"Proceedings of the 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"104005","DOI":"10.1016\/j.cose.2024.104005","article-title":"Enhancing Network Intrusion Detection Performance Using Generative Adversarial Networks","volume":"145","author":"Zhao","year":"2024","journal-title":"Comput. Secur."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"2861","DOI":"10.1007\/s11831-020-09478-2","article-title":"A Review on the Effectiveness of Machine Learning and Deep Learning Algorithms for Cyber Security","volume":"28","author":"Geetha","year":"2021","journal-title":"Arch. Comput. Methods Eng."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Pooja, A.L., and Sridhar, M. (2020, January 5\u20137). Analysis of Phishing Website Detection Using CNN and Bidirectional LSTM. Proceedings of the 2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, India.","DOI":"10.1109\/ICECA49313.2020.9297395"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.aiopen.2021.01.001","article-title":"Graph Neural Networks: A Review of Methods and Applications","volume":"1","author":"Zhou","year":"2020","journal-title":"AI Open"},{"key":"ref_40","unstructured":"Glisic, S.G., and Lorenzo, B. (2022). Graph Neural Networks, Wiley."},{"key":"ref_41","unstructured":"Kipf, T.N., and Welling, M. (2016). Semi-Supervised Classification with Graph Convolutional Networks. arXiv."},{"key":"ref_42","first-page":"7370","article-title":"Graph Convolutional Networks for Text Classification","volume":"33","author":"Yao","year":"2019","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"5966","DOI":"10.1109\/TGRS.2020.3015157","article-title":"Graph Convolutional Networks for Hyperspectral Image Classification. IEEE Trans","volume":"59","author":"Hong","year":"2021","journal-title":"Geosci. Remote Sens."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1186\/s40649-019-0069-y","article-title":"Graph Convolutional Networks: A Comprehensive Review","volume":"6","author":"Zhang","year":"2019","journal-title":"Comput. Soc. Netw."},{"key":"ref_45","unstructured":"Veli\u010dkovi\u0107, P., Cucurull, G., Casanova, A., Romero, A., Lio, P., and Bengio, Y. (2017). Graph Attention Networks. arXiv."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Ma, X., Yin, Y., Jin, Y., He, M., and Zhu, M. (2022). Short-Term Prediction of Bike-Sharing Demand Using Multi-Source Data: A Spatial-Temporal Graph Attentional LSTM Approach. Appl. Sci., 12.","DOI":"10.3390\/app12031161"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"111820","DOI":"10.1109\/ACCESS.2022.3211306","article-title":"Graph Anomaly Detection with Graph Neural Networks: Current Status and Challenges","volume":"10","author":"Kim","year":"2022","journal-title":"IEEE Access"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"7497","DOI":"10.1109\/TKDE.2024.3454328","article-title":"A Survey on Privacy in Graph Neural Networks: Attacks, Preservation, and Applications","volume":"36","author":"Zhang","year":"2024","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Zhao, C., Xin, Y., Li, X., Zhu, H., Yang, Y., and Chen, Y. (2020). An Attention-Based Graph Neural Network for Spam Bot Detection in Social Networks. Appl. Sci., 10.","DOI":"10.3390\/app10228160"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Ren, Y., Wang, B., Zhang, J., and Chang, Y. (2020, January 17\u201320). Adversarial Active Learning Based Heterogeneous Graph Neural Network for Fake News Detection. Proceedings of the 2020 IEEE International Conference on Data Mining (ICDM), Sorrento, Italy.","DOI":"10.1109\/ICDM50108.2020.00054"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Wang, Y., Qian, S., Hu, J., Fang, Q., and Xu, C. (2020, January 8\u201311). Fake News Detection via Knowledge-Driven Multimodal Graph Convolutional Networks. Proceedings of the 2020 International Conference on Multimedia Retrieval, Dublin, Ireland.","DOI":"10.1145\/3372278.3390713"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/j.future.2020.11.028","article-title":"Deep Graph Neural Network-Based Spammer Detection under the Perspective of Heterogeneous Cyberspace","volume":"117","author":"Guo","year":"2021","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Ouyang, L., and Zhang, Y. (2021, January 20\u201322). Phishing Web Page Detection with HTML-Level Graph Neural Network. Proceedings of the 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Shenyang, China.","DOI":"10.1109\/TrustCom53373.2021.00133"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"102715","DOI":"10.1016\/j.cose.2022.102715","article-title":"JStrong: Malicious JavaScript Detection Based on Code Semantic Representation and Graph Neural Network","volume":"118","author":"Fang","year":"2022","journal-title":"Comput. Secur."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"82355","DOI":"10.1109\/ACCESS.2022.3196018","article-title":"Combining Long-Term Recurrent Convolutional and Graph Convolutional Networks to Detect Phishing Sites Using URL and HTML","volume":"10","author":"Ariyadasa","year":"2022","journal-title":"IEEE Access"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"3857","DOI":"10.1007\/s40747-022-00838-y","article-title":"Graph Neural Networks and Cross-Protocol Analysis for Detecting Malicious IP Addresses","volume":"9","author":"Huang","year":"2023","journal-title":"Complex Intell. Syst."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Zhang, B., Li, J., Chen, C., Lee, K., and Lee, I. (2022). A Practical Botnet Traffic Detection System Using GNN, Springer.","DOI":"10.1007\/978-3-030-94029-4_5"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Pan, Y., Cai, L., Leng, T., Zhao, L., Ma, J., Yu, A., and Meng, D. (2023). AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs, Springer.","DOI":"10.1007\/978-3-031-25538-0_27"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Yang, Z., Pei, W., Chen, M., and Yue, C. (2022, January 22\u201326). WTAGRAPH: Web Tracking and Advertising Detection Using Graph Neural Networks. Proceedings of the 2022 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.","DOI":"10.1109\/SP46214.2022.9833670"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"9310","DOI":"10.1109\/JIOT.2021.3130434","article-title":"Hierarchical Adversarial Attacks Against Graph-Neural-Network-Based IoT Network Intrusion Detection System","volume":"9","author":"Zhou","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Li, Y., Li, R., Zhou, Z., Guo, J., Yang, W., Du, M., and Liu, Q. (2022, January 4\u20136). GraphDDoS: Effective DDoS Attack Detection Using Graph Neural Networks. Proceedings of the 2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD), Hangzhou, China.","DOI":"10.1109\/CSCWD54268.2022.9776097"},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"100747","DOI":"10.1016\/j.iot.2023.100747","article-title":"XG-BoT: An Explainable Deep Graph Neural Network for Botnet Detection and Forensics","volume":"22","author":"Lo","year":"2023","journal-title":"Internet Things"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1007\/s44196-023-00369-5","article-title":"APT Attack Detection Based on Graph Convolutional Neural Networks","volume":"16","author":"Ren","year":"2023","journal-title":"Int. J. Comput. Intell. Syst."},{"key":"ref_64","first-page":"103532","article-title":"Anomaly Traffic Detection in IoT Security Using Graph Neural Networks","volume":"76","author":"Gao","year":"2023","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Bao, H., Li, W., Wang, X., Tang, Z., Wang, Q., Wang, W., and Liu, F. (2023). Payload Level Graph Attention Network for Web Attack Traffic Detection, Springer.","DOI":"10.1007\/978-3-031-36030-5_32"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Maksimoski, A., Woungang, I., Traore, I., and Dhurandher, S.K. (2023). Bonet Detection Mechanism Using Graph Neural Network, Springer.","DOI":"10.1007\/978-3-031-28451-9_22"},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Lin, H.-C., Wang, P., Lin, W.-H., Lin, Y.-H., and Chen, J.-H. (2023, January 27\u201329). Malware Detection and Classification by Graph Neural Network. Proceedings of the 2023 IEEE 5th Eurasia Conference on IOT, Communication and Engineering (ECICE), Yunlin, Taiwan.","DOI":"10.1109\/ECICE59523.2023.10383172"},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Hosseini, D., and Jin, R. (2023, January 25\u201327). Graph Neural Network Based Approach for Rumor Detection on Social Networks. Proceedings of the 2023 International Conference on Smart Applications, Communications and Networking (SmartNets), Istanbul, Turkey.","DOI":"10.1109\/SmartNets58706.2023.10215926"},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Hussain, S., Nadeem, M., Baber, J., Hamdi, M., Rajab, A., Al Reshan, M.S., and Shaikh, A. (2024). Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based hybrid feature extraction. Sci. Rep., 14.","DOI":"10.1038\/s41598-024-56871-z"},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1007\/s44196-024-00496-7","article-title":"SStackGNN: Graph Data Augmentation Simplified Stacking Graph Neural Network for Twitter Bot Detection","volume":"17","author":"Shi","year":"2024","journal-title":"Int. J. Comput. Intell. Syst."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1145\/3639408","article-title":"Bayesian Graph Local Extrema Convolution with Long-tail Strategy for Misinformation Detection","volume":"18","author":"Zhang","year":"2024","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"5153","DOI":"10.1007\/s40747-024-01413-3","article-title":"Clip-GCN: An adaptive detection model for multimodal emergent fake news domains","volume":"10","author":"Zhou","year":"2024","journal-title":"Complex Intell. Syst."},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Altaf, T., Wang, X., Ni, W., Yu, G., Liu, R.P., and Braun, R. (2024). GNN-Based Network Traffic Analysis for the Detection of Sequential Attacks in IoT. Electronics, 13.","DOI":"10.3390\/electronics13122274"},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1007\/s44163-024-00193-6","article-title":"Rumor detection using dual embeddings and text-based graph convolutional network","volume":"4","author":"Pattanaik","year":"2024","journal-title":"Discov. Artif. Intell."},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Chukka, R.B., Suneetha, M., Ahmed, M.A., Babu, P.R., Ishak, M.K., Alkahtani, H.K., and Mostafa, S.M. (2024). Hybridization of synergistic swarm and differential evolution with graph convolutional network for distributed denial of service detection and mitigation in IoT environment. Sci. Rep., 14.","DOI":"10.1038\/s41598-024-81116-4"},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Guo, W., Du, W., Yang, X., Xue, J., Wang, Y., Han, W., and Hu, J. (2025). MalHAPGNN: An Enhanced Call Graph-Based Malware Detection Framework Using Hierarchical Attention Pooling Graph Neural Network. Sensors, 25.","DOI":"10.3390\/s25020374"}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/16\/6\/470\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:46:15Z","timestamp":1760031975000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/16\/6\/470"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,2]]},"references-count":76,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["info16060470"],"URL":"https:\/\/doi.org\/10.3390\/info16060470","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,2]]}}}