This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Shiravi, H., Shiravi, A., & Ghorbani, A. A. (2011). A survey of visualization systems for network security. IEEE Transactions on visualization and computer graphics, 18(8), 1313-1329.ShiraviH.ShiraviA.GhorbaniA. A. (2011). A survey of visualization systems for network security. IEEE Transactions on visualization and computer graphics, 18(8), 1313-1329.Search in Google Scholar
Mistry, H. K., Mavani, C., Goswami, A., & Patel, R. (2024). A Survey Visualization Systems For Network Security. Educational Administration: Theory and Practice, 30(7), 805-812.MistryH. K.MavaniC.GoswamiA.PatelR. (2024). A Survey Visualization Systems For Network Security. Educational Administration: Theory and Practice, 30(7), 805-812.Search in Google Scholar
Parvin, S., Hussain, F. K., Hussain, O. K., Han, S., Tian, B., & Chang, E. (2012). Cognitive radio network security: A survey. Journal of Network and Computer Applications, 35(6), 1691-1708.ParvinS.HussainF. K.HussainO. K.HanS.TianB.ChangE. (2012). Cognitive radio network security: A survey. Journal of Network and Computer Applications, 35(6), 1691-1708.Search in Google Scholar
Acemoglu, D., Malekian, A., & Ozdaglar, A. (2016). Network security and contagion. Journal of Economic Theory, 166, 536-585.AcemogluD.MalekianA.OzdaglarA. (2016). Network security and contagion. Journal of Economic Theory, 166, 536-585.Search in Google Scholar
Kaur, G. (2016). Network Security: Anti-virus. International Journal of Advanced Research in Computer Science, 7(6).KaurG. (2016). Network Security: Anti-virus. International Journal of Advanced Research in Computer Science, 7(6).Search in Google Scholar
Petrenko, S. A., & Makoveichuk, K. A. (2017). Big data technologies for cybersecurity. In CEUR workshop (pp. 107-111).PetrenkoS. A.MakoveichukK. A. (2017). Big data technologies for cybersecurity. In CEUR workshop (pp. 107-111).Search in Google Scholar
Alazab, M., & Tang, M. (Eds.). (2019). Deep learning applications for cyber security. Springer.AlazabM.TangM. (Eds.). (2019). Deep learning applications for cyber security. Springer.Search in Google Scholar
Alani, M. M. (2021). Big data in cybersecurity: a survey of applications and future trends. Journal of Reliable Intelligent Environments, 7(2), 85-114.AlaniM. M. (2021). Big data in cybersecurity: a survey of applications and future trends. Journal of Reliable Intelligent Environments, 7(2), 85-114.Search in Google Scholar
Mahmood, T., & Afzal, U. (2013, December). Security analytics: Big data analytics for cybersecurity: A review of trends, techniques and tools. In 2013 2nd national conference on Information assurance (ncia) (pp. 129-134). IEEE.MahmoodT.AfzalU. (2013, December). Security analytics: Big data analytics for cybersecurity: A review of trends, techniques and tools. In 2013 2nd national conference on Information assurance (ncia) (pp. 129-134). IEEE.Search in Google Scholar
Kotenko, I., Saenko, I., & Branitskiy, A. (2020). Machine learning and big data processing for cybersecurity data analysis. Data science in cybersecurity and cyberthreat intelligence, 61-85.KotenkoI.SaenkoI.BranitskiyA. (2020). Machine learning and big data processing for cybersecurity data analysis. Data science in cybersecurity and cyberthreat intelligence, 61-85.Search in Google Scholar
Ullah, F., & Babar, M. A. (2019). Architectural tactics for big data cybersecurity analytics systems: a review. Journal of Systems and Software, 151, 81-118.UllahF.BabarM. A. (2019). Architectural tactics for big data cybersecurity analytics systems: a review. Journal of Systems and Software, 151, 81-118.Search in Google Scholar
Nwobodo, L. K., Nwaimo, C. S., & Adegbola, A. E. (2024). Enhancing cybersecurity protocols in the era of big data and advanced analytics. GSC Advanced Research and Reviews, 19(3), 203-214.NwobodoL. K.NwaimoC. S.AdegbolaA. E. (2024). Enhancing cybersecurity protocols in the era of big data and advanced analytics. GSC Advanced Research and Reviews, 19(3), 203-214.Search in Google Scholar
Tang, M., Alazab, M., & Luo, Y. (2017). Big data for cybersecurity: Vulnerability disclosure trends and dependencies. IEEE Transactions on Big Data, 5(3), 317-329.TangM.AlazabM.LuoY. (2017). Big data for cybersecurity: Vulnerability disclosure trends and dependencies. IEEE Transactions on Big Data, 5(3), 317-329.Search in Google Scholar
Geetha, R., & Thilagam, T. (2021). A review on the effectiveness of machine learning and deep learning algorithms for cyber security. Archives of Computational Methods in Engineering, 28(4), 2861-2879.GeethaR.ThilagamT. (2021). A review on the effectiveness of machine learning and deep learning algorithms for cyber security. Archives of Computational Methods in Engineering, 28(4), 2861-2879.Search in Google Scholar
Shaukat, K., Luo, S., Varadharajan, V., Hameed, I. A., & Xu, M. (2020). A survey on machine learning techniques for cyber security in the last decade. IEEE access, 8, 222310-222354.ShaukatK.LuoS.VaradharajanV.HameedI. A.XuM. (2020). A survey on machine learning techniques for cyber security in the last decade. IEEE access, 8, 222310-222354.Search in Google Scholar
Liu, Q., & Zhang, T. (2023). Deep learning technology of computer network security detection based on artificial intelligence. Computers and Electrical Engineering, 110, 108813.LiuQ.ZhangT. (2023). Deep learning technology of computer network security detection based on artificial intelligence. Computers and Electrical Engineering, 110, 108813.Search in Google Scholar
Salloum, S. A., Alshurideh, M., Elnagar, A., & Shaalan, K. (2020, March). Machine learning and deep learning techniques for cybersecurity: a review. In The International Conference on Artificial Intelligence and Computer Vision (pp. 50-57). Cham: Springer International Publishing.SalloumS. A.AlshuridehM.ElnagarA.ShaalanK. (2020, March). Machine learning and deep learning techniques for cybersecurity: a review. In The International Conference on Artificial Intelligence and Computer Vision (pp. 50-57). Cham: Springer International Publishing.Search in Google Scholar
Du, M. (2022). Application of information communication network security management and control based on big data technology. International Journal of Communication Systems, 35(5), e4643.DuM. (2022). Application of information communication network security management and control based on big data technology. International Journal of Communication Systems, 35(5), e4643.Search in Google Scholar
Zhang, Q., & Ma, D. (2021, February). Research on network security analysis based on big data technology application. In Journal of Physics: Conference Series (Vol. 1744, No. 3, p. 032199). IOP Publishing.ZhangQ.MaD. (2021, February). Research on network security analysis based on big data technology application. In Journal of Physics: Conference Series (Vol. 1744, No. 3, p. 032199). IOP Publishing.Search in Google Scholar
Ning, Y. (2021, June). Research on the Application of Big Data Technology in Network Security Analysis. In Journal of Physics: Conference Series (Vol. 1955, No. 1, p. 012015). IOP Publishing.NingY. (2021, June). Research on the Application of Big Data Technology in Network Security Analysis. In Journal of Physics: Conference Series (Vol. 1955, No. 1, p. 012015). IOP Publishing.Search in Google Scholar
Wang, L., & Jones, R. (2021). Big data analytics in cyber security: network traffic and attacks. Journal of Computer Information Systems, 61(5), 410-417.WangL.JonesR. (2021). Big data analytics in cyber security: network traffic and attacks. Journal of Computer Information Systems, 61(5), 410-417.Search in Google Scholar
Bachupally, Y. R., Yuan, X., & Roy, K. (2016, March). Network security analysis using Big Data technology. In SoutheastCon 2016 (pp. 1-4). IEEE.BachupallyY. R.YuanX.RoyK. (2016, March). Network security analysis using Big Data technology. In SoutheastCon 2016 (pp. 1-4). IEEE.Search in Google Scholar
Wang, L., & Jones, R. (2017). Big data analytics for network intrusion detection: A survey. International Journal of Networks and communications, 7(1), 24-31.WangL.JonesR. (2017). Big data analytics for network intrusion detection: A survey. International Journal of Networks and communications, 7(1), 24-31.Search in Google Scholar
Cárdenas, A. A., Manadhata, P. K., & Rajan, S. P. (2013). Big data analytics for security. IEEE security & privacy, 11(6), 74-76.CárdenasA. A.ManadhataP. K.RajanS. P. (2013). Big data analytics for security. IEEE security & privacy, 11(6), 74-76.Search in Google Scholar
Zeng, H., Liu, Z., & Cai, H. (2020, October). Research on the application of deep learning in computer network information security. In Journal of Physics: Conference Series (Vol. 1650, No. 3, p. 032117). IOP Publishing.ZengH.LiuZ.CaiH. (2020, October). Research on the application of deep learning in computer network information security. In Journal of Physics: Conference Series (Vol. 1650, No. 3, p. 032117). IOP Publishing.Search in Google Scholar
Zhou, P., & Zhang, W. (2020, September). Research on computer network information security and protection strategy based on deep learning algorithm. In 2020 International Conference on Advance in Ambient Computing and Intelligence (ICAACI) (pp. 181-184). IEEE.ZhouP.ZhangW. (2020, September). Research on computer network information security and protection strategy based on deep learning algorithm. In 2020 International Conference on Advance in Ambient Computing and Intelligence (ICAACI) (pp. 181-184). IEEE.Search in Google Scholar
Dushyant, K., Muskan, G., Annu, Gupta, A., & Pramanik, S. (2022). Utilizing machine learning and deep learning in cybesecurity: an innovative approach. Cyber security and digital forensics, 271-293.DushyantK.MuskanG.AnnuGuptaA.PramanikS. (2022). Utilizing machine learning and deep learning in cybesecurity: an innovative approach. Cyber security and digital forensics, 271-293.Search in Google Scholar
Sathya, K., Premalatha, J., & Suwathika, S. (2020, July). Reinforcing cyber world security with deep learning approaches. In 2020 international conference on communication and signal processing (ICCSP) (pp. 0766-0769). IEEE.SathyaK.PremalathaJ.SuwathikaS. (2020, July). Reinforcing cyber world security with deep learning approaches. In 2020 international conference on communication and signal processing (ICCSP) (pp. 0766-0769). IEEE.Search in Google Scholar
Liao, X., & Xie, J. (2021, July). Research on network intrusion detection method based on deep learning algorithm. In Journal of Physics: Conference Series (Vol. 1982, No. 1, p. 012121). IOP Publishing.LiaoX.XieJ. (2021, July). Research on network intrusion detection method based on deep learning algorithm. In Journal of Physics: Conference Series (Vol. 1982, No. 1, p. 012121). IOP Publishing.Search in Google Scholar
Li, G., Sharma, P., Pan, L., Rajasegarar, S., Karmakar, C., & Patterson, N. (2021). Deep learning algorithms for cyber security applications: A survey. Journal of Computer Security, 29(5), 447-471.LiG.SharmaP.PanL.RajasegararS.KarmakarC.PattersonN. (2021). Deep learning algorithms for cyber security applications: A survey. Journal of Computer Security, 29(5), 447-471.Search in Google Scholar
Alsyaibani, O. M. A., Utami, E., & Hartanto, A. D. (2021). Survey on deep learning based intrusion detection system. Telematika, 14(2), 86-100.AlsyaibaniO. M. A.UtamiE.HartantoA. D. (2021). Survey on deep learning based intrusion detection system. Telematika, 14(2), 86-100.Search in Google Scholar
Vitalina Holubenko,Diogo Gaspar,Rúben Leal & Paulo Silva. (2024). Autonomous intrusion detection for IoT: a decentralized and privacy preserving approach. International Journal of Information Security(1),7-7.VitalinaHolubenkoDiogoGasparRúben LealPaulo Silva (2024). Autonomous intrusion detection for IoT: a decentralized and privacy preserving approach. International Journal of Information Security(1),7-7.Search in Google Scholar
Mostafa Mahmoud El Gayar,Faheed A. F. Alrslani & Shaker El Sappagh. (2024). Smart Collaborative Intrusion Detection System for Securing Vehicular Networks Using Ensemble Machine Learning Model. Information(10),583-583.Mostafa Mahmoud ElGayarFaheed A. F.AlrslaniShakerEl Sappagh (2024). Smart Collaborative Intrusion Detection System for Securing Vehicular Networks Using Ensemble Machine Learning Model. Information(10),583-583.Search in Google Scholar
Abdullah Baihan,Ahmed I. Alutaibi,Mohammed Alshehri & Sunil Kumar Sharma. (2024). Sign language recognition using modified deep learning network and hybrid optimization: a hybrid optimizer (HO) based optimized CNNSa-LSTM approach. Scientific Reports(1),26111-26111.AbdullahBaihanAhmed I.AlutaibiMohammedAlshehriSunil KumarSharma (2024). Sign language recognition using modified deep learning network and hybrid optimization: a hybrid optimizer (HO) based optimized CNNSa-LSTM approach. Scientific Reports(1),26111-26111.Search in Google Scholar
Yang B.,Liu Y.,Zhang G.,Dai J. & Men K.. (2023). Prediction of Anatomical Presentation during Radiotherapy of Nasopharyngeal Carcinoma Using GAN-LSTM for Plan Adaption Decision. International Journal of Radiation Oncology, Biology, Physics(2S),S156-S157.YangB.LiuY.ZhangG.DaiJ.MenK. (2023). Prediction of Anatomical Presentation during Radiotherapy of Nasopharyngeal Carcinoma Using GAN-LSTM for Plan Adaption Decision. International Journal of Radiation Oncology, Biology, Physics(2S),S156-S157.Search in Google Scholar