共 52 条
- [1] Kumar A., Fahad M., Arif H., Hussain H.K., Advancements in detection and mitigation: Fortifying against APTs-a comprehensive review, BULLET: J. Multidisiplin Ilmu, 3, 1, pp. 141-150, (2024)
- [2] Obi O.C., Akagha O.V., Dawodu S.O., Anyanwu A.C., Onwusinkwue S., Ahmad I.A.I., Comprehensive review on cybersecurity: modern threats and advanced defense strategies, Comput. Sci. & IT Res. J., 5, 2, pp. 293-310, (2024)
- [3] Alhamed M., Rahman M.M.H., A systematic literature review on penetration testing in networks: Future research directions, Appl. Sci., 13, 12, (2023)
- [4] Mohammadzadeh H., Gharehchopogh F.S., Feature selection with binary symbiotic organisms search algorithm for email spam detection, Int. J. Inf. Technol. Decis. Mak., 20, 1, pp. 469-515, (2021)
- [5] Pillai S., Sharma A., Hybrid unsupervised web-attack detection and classification–A deep learning approach, Comput. Stand. Interfaces, 86, (2023)
- [6] Xu Y., Fang Y., Liu Z., Zhang Q., PWAGAT: Potential web attacker detection based on graph attention network, Neurocomputing, 557, (2023)
- [7] Tong X., Tan X., Sun X., Abnormal behavior detection based on GCN-BiLSTM, Third International Conference on Machine Learning and Computer Application, Vol. 12636, ICMLCA 2022, pp. 468-474, (2023)
- [8] Park J.-T., Shin C.-Y., Baek U.-J., Kim M.-S., User behavior detection using multi-modal signatures of encrypted network traffic, IEEE Access, (2023)
- [9] Xu Y., Fang Y., Huang C., Liu Z., Hghan: Hacker group identification based on heterogeneous graph attention network, Inform. Sci., 612, pp. 848-863, (2022)
- [10] Ajala O.A., Okoye C.C., Ofodile O.C., Arinze C.A., Daraojimba O.D., Et al., Review of AI and machine learning applications to predict and Thwart cyber-attacks in real-time, Magna Sci. Adv. Res. Rev., 10, 1, pp. 312-320, (2024)