Machine Learning Algorithms for Cyber Threats
Machine Learning Algorithms for Cyber Threats( Literature review )
Literature Review 5 pages Doc
Instructions:
1
Use suitable content names Like Introduction, Theoretical framework, existing work, future scope, research findings, etc
2
Everything should be cited from provided references only.1.
3
Be sure you know that you must keep your literature in line with your theoretical framework. When conducting literature reviews. You must review one at a time. Then, document the next review, one author at a time.
3.
Use Grammarly and APA format only
References
1
Alkahtani, H., & Aldhyani, T. H. H. (2021). Intrusion Detection System to Advance Internet of
Things Infrastructure-Based Deep Learning Algorithms. Complexity (New York, N.Y.),
2021. https://doi.org/10.1155/2021/
2
Al-Mhiqani, M. N., Ahmad, R., Zainal Abidin, Z., Yassin, W., Hassan, A., Abdulkareem, K. H., Ali, N. S., & Yunos, Z. (2020). A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations. Applied Sciences, 10(15), 5208–. https://doi.org/10.3390/
3
Aravindan, C., Frederick, T., Hemamalini, V., & Cathirine, M. V. J. (2020). An Extensive Research on Cyber Threats using Learning Algorithm. 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE), 1–8. https://doi.org/10.1109/ic-
4
Bilen, A., & Özer, A. B. (2021). Cyber-attack method and perpetrator prediction using machine learning algorithms. PeerJ. Computer Science, 7, e475–e475. https://doi.org/10.7717/peerj-
5
Laghrissi, F., Douzi, S., Douzi, K., & Hssina, B. (2021). Intrusion detection systems using long
short-term memory (LSTM). Journal of Big Data, 8(1), 1–16. https://doi.org/10.1186/
6
Wani, A., S, R., & Khaliq, R. (2021). SDN‐based intrusion detection system for IoT using deep
learning classifier (IDSIoT‐SDL). CAAI Transactions on Intelligence Technology.
https://doi.org/10.1049/cit2.
7
Hammad, M., Hewahi, N., & Elmedany, W. (2021). T‐SNERF: A novel high accuracy machine
learning approach for Intrusion Detection Systems. IET Information Security, 15(2),
178–190. https://doi.org/10.1049/ise2.
8
Rincy N, T., & Gupta, R. (2021). Design and Development of an Efficient Network Intrusion
Detection System Using Machine Learning Techniques. Wireless Communications and Mobile Computing, 2021, 1–35. https://doi.org/10.1155/2021/
9
Sabir, B., Ullah, F., Babar, M. A., & Gaire, R. (2021). Machine Learning for Detecting Data
Exfiltration: A Review. ACM Computing Surveys, 54(3), 1–47.
https://doi.org/10.1145/
10
Slayton, R. (2021). Governing Uncertainty or Uncertain Governance? Information Security and
the Challenge of Cutting Ties. Science, Technology, & Human Values, 46(1), 81–111. https://doi.org/10.1177/
11
Yeboah-Ofori, A., Islam, S., Lee, S. W., Shamszaman, Z. U., Muhammad, K., Altaf, M., & Al-
Rakhami, M. S. (2021). Cyber Threat Predictive Analytics for Improving Cyber Supply
Chain Security. IEEE Access, 1–1. https://doi.org/10.1109/
Requirements: 5 pages Doc APA Format | .doc file
Answer preview Machine Learning Algorithms for Cyber Threats
APA
1678 words