|
1. M. Mashfiquer Rahman et al., “AI integration in cybersecurity software: Threat detection and response,” IEEE Access, 2025 2. B. Xu et al., “ProcSAGE: an efficient host threat detection method based on graph representation learning,” Cybersecurity, 2024. 3. M. M. Shirmohammadi, AI Unboxed: Tools & Techniques for the Future, 1st ed., vol. 1. [Online]. Available: https://www.researchgate.net/publication/389659219_AI_UNBOXED_TOOLS_TECHNIQUES_FOR_THE_FUTURE#fullTextFileContent, Mar. 2025, p. 144. 4. M. Ma et al., “ActMiner: Applying Causality Tracking and Increment Aligning for Graph-based Cyber Threat Hunting,” 2025 5. M. Zhong, M. Lin, C. Zhang, Z. Xu, "A Survey on Graph Neural Networks for Intrusion Detection Systems: Methods, Trends and Challenges , 2024 6. Pinto, L.-C. Herrera, Y. Donoso, J. A. Gutiérrez, "Survey on Intrusion Detection Systems Based on Machine Learning Techniques for the Protection of Critical Infrastructure. 2023 7. Z. Sun, A. M. H. Teixeira, S. Toor, "GNN-IDS: Graph Neural Network based Intrusion Detection System , Vienna, Austria, 2024 8. J. Huang, "Improved Intrusion Detection Based on Hybrid Deep Learning Models and Federated Learning 2024
|