Makkar et al., 2018
| Publication | Publication Date | Title |
|---|---|---|
| Sun et al. | Data-driven cybersecurity incident prediction: A survey | |
| Wei et al. | Deephunter: A graph neural network based approach for robust cyber threat hunting | |
| Gardiner et al. | On the security of machine learning in malware c&c detection: A survey | |
| Kim et al. | Design of network threat detection and classification based on machine learning on cloud computing | |
| Rekha et al. | Intrusion detection in cyber security: role of machine learning and data mining in cyber security | |
| Xuan et al. | A multi-layer approach for advanced persistent threat detection using machine learning based on network traffic | |
| Babiker et al. | Web application attack detection and forensics: A survey | |
| Wang et al. | Heterogeneous graph matching networks: Application to unknown malware detection | |
| Krishnaveni et al. | Ensemble approach for network threat detection and classification on cloud computing | |
| Kuppa et al. | Finding rats in cats: Detecting stealthy attacks using group anomaly detection | |
| Concone | Twitter spam account detection by effective labeling | |
| Chapaneri et al. | Multi-level Gaussian mixture modeling for detection of malicious network traffic. | |
| Mummadi et al. | An appraisal of cyber-attacks and countermeasures using machine learning algorithms | |
| Pasupathi et al. | Proactive DDoS detection: integrating packet marking, traffic analysis, and machine learning for enhanced network security | |
| Rani et al. | Analysis of machine learning and deep learning intrusion detection system in Internet of Things network | |
| Patil et al. | Learning to Detect Phishing Web Pages Using Lexical and String Complexity Analysis. | |
| Bhardwaj et al. | Integrating a Rule-Based Approach to Malware Detection with an LSTM-Based Feature Selection Technique | |
| Latah | The art of social bots: A review and a refined taxonomy | |
| Oueslati et al. | A survey on intrusion detection systems for IoT networks based on long short-term memory | |
| Makkar et al. | Network intrusion detection in an enterprise: unsupervised analytical methodology | |
| Gore et al. | Assessing cyber-incidents using machine learning | |
| Punna et al. | Responsive Mechanism for Cloud Offloading Data Intrusion Detection Using Spark—Machine Learning Model | |
| Hu et al. | Method for cyber threats detection and identification in modern cloud services | |
| Abuowaida et al. | Evidence Detection in Cloud Forensics: Classifying Cyber-Attacks in IaaS Environments using machine learning | |
| Zoghi | Ensemble Classifier Design and Performance Evaluation for Intrusion Detection Using UNSW-NB15 Dataset |