{"id":"https://openalex.org/W4391114985","doi":"https://doi.org/10.1145/3633598.3633605","title":"Deep Learning Approaches for Cyber Threat Detection and Mitigation","display_name":"Deep Learning Approaches for Cyber Threat Detection and Mitigation","publication_year":2023,"publication_date":"2023-10-13","ids":{"openalex":"https://openalex.org/W4391114985","doi":"https://doi.org/10.1145/3633598.3633605"},"language":"en","primary_location":{"id":"doi:10.1145/3633598.3633605","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3633598.3633605","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 7th International Conference on Advances in Artificial Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092068364","display_name":"Aayush Juyal","orcid":null},"institutions":[{"id":"https://openalex.org/I74885063","display_name":"Sharda University","ror":"https://ror.org/03b6ffh07","country_code":"IN","type":"education","lineage":["https://openalex.org/I74885063"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Aayush Juyal","raw_affiliation_strings":["Department of Computer Science and Engineering, School of Engineering and Technology, Sharda University, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, School of Engineering and Technology, Sharda University, India","institution_ids":["https://openalex.org/I74885063"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101728059","display_name":"Bharat Bhushan","orcid":"https://orcid.org/0000-0002-9345-4786"},"institutions":[{"id":"https://openalex.org/I74885063","display_name":"Sharda University","ror":"https://ror.org/03b6ffh07","country_code":"IN","type":"education","lineage":["https://openalex.org/I74885063"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Bharat Bhushan","raw_affiliation_strings":["Department of Computer Science and Engineering, School of Engineering and Technology, Sharda University, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, School of Engineering and Technology, Sharda University, India","institution_ids":["https://openalex.org/I74885063"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008739586","display_name":"Alaa Ali Hameed","orcid":"https://orcid.org/0000-0002-8514-9255"},"institutions":[{"id":"https://openalex.org/I4210121333","display_name":"Istinye University","ror":"https://ror.org/03081nz23","country_code":"TR","type":"education","lineage":["https://openalex.org/I4210121333"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Alaa Ali Hameed","raw_affiliation_strings":["Department of Computer Engineering, Istinye University, Turkey"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Istinye University, Turkey","institution_ids":["https://openalex.org/I4210121333"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090975154","display_name":"Akhtar Jam\u0131l","orcid":"https://orcid.org/0000-0002-2592-1039"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Akhtar Jamil","raw_affiliation_strings":["Department of Computer Science, National University of Computer and Engineering Sciences, Pakistan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National University of Computer and Engineering Sciences, Pakistan","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5092068364"],"corresponding_institution_ids":["https://openalex.org/I74885063"],"apc_list":null,"apc_paid":null,"fwci":1.0271,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.78928509,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"34","last_page":"41"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7787464261054993},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.7038489580154419},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6931387782096863},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6885060667991638},{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.640039324760437},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.4669512212276459},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.4608229398727417},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.45921704173088074},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4514334797859192},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.434100478887558},{"id":"https://openalex.org/keywords/cyberwarfare","display_name":"Cyberwarfare","score":0.432212233543396},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.32573941349983215},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.168695330619812}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7787464261054993},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.7038489580154419},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6931387782096863},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6885060667991638},{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.640039324760437},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.4669512212276459},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.4608229398727417},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.45921704173088074},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4514334797859192},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.434100478887558},{"id":"https://openalex.org/C171769113","wikidata":"https://www.wikidata.org/wiki/Q849340","display_name":"Cyberwarfare","level":2,"score":0.432212233543396},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.32573941349983215},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.168695330619812}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3633598.3633605","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3633598.3633605","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 7th International Conference on Advances in Artificial Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6200000047683716}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W2921573932","https://openalex.org/W2947934595","https://openalex.org/W2981025625","https://openalex.org/W3006325478","https://openalex.org/W3020985685","https://openalex.org/W3035311645","https://openalex.org/W3036629615","https://openalex.org/W3037316620","https://openalex.org/W3044405156","https://openalex.org/W3048207230","https://openalex.org/W3081279800","https://openalex.org/W3086579950","https://openalex.org/W3094686023","https://openalex.org/W3105703341","https://openalex.org/W3134340954","https://openalex.org/W3136238191","https://openalex.org/W3138102940","https://openalex.org/W3175620393","https://openalex.org/W3185895012","https://openalex.org/W3198242498","https://openalex.org/W3212351452","https://openalex.org/W4206130810","https://openalex.org/W4211016117","https://openalex.org/W4212957446","https://openalex.org/W4212986808","https://openalex.org/W4213081600","https://openalex.org/W4226338460","https://openalex.org/W4285120130","https://openalex.org/W4285604261","https://openalex.org/W4318275390","https://openalex.org/W4327572266","https://openalex.org/W4367056892","https://openalex.org/W4376108380","https://openalex.org/W4385286121"],"related_works":["https://openalex.org/W2374270253","https://openalex.org/W2078167669","https://openalex.org/W1510448193","https://openalex.org/W4250327053","https://openalex.org/W2385674486","https://openalex.org/W279204092","https://openalex.org/W306982053","https://openalex.org/W1947736446","https://openalex.org/W2357052968","https://openalex.org/W3092159181"],"abstract_inverted_index":{"Cyberspace":[0],"has":[1,110],"inflated":[2],"over":[3],"the":[4,16,70,124,164,180,200],"past":[5],"decade,":[6],"primarily":[7],"driven":[8],"by":[9,34,183],"pervasive":[10],"development":[11],"and":[12,20,94,118,138,149,162,192],"widespread":[13],"usage":[14],"of":[15,40,69,126,145,166,203],"internet.":[17],"Prolonged":[18],"cyber-attacks":[19],"security":[21,74],"vulnerabilities":[22],"have":[23,42,51],"become":[24,52],"more":[25],"common":[26,127,155],"as":[27],"a":[28,143],"consequence.":[29],"A":[30],"recent":[31],"study":[32,122,141,159,178],"conducted":[33],"Ponemon":[35],"Institute":[36],"revealed":[37],"that":[38,57,153],"64%":[39],"businesses":[41],"suffered":[43],"web-based":[44],"attacks":[45],"in":[46,54,105,114,131,156,175,187,206],"2023.":[47],"Thus,":[48],"cybersecurity":[49,115,132],"measures":[50,75],"mandatory":[53],"every":[55,107],"sector,":[56],"leverages":[58],"technology,":[59],"to":[60,79,90,116,133,198],"protect":[61],"confidential":[62],"information":[63],"from":[64],"malignant":[65],"threats.":[66,96],"The":[67],"majority":[68],"sectors":[71],"use":[72],"conventional":[73],"like":[76],"anti-virus":[77],"products":[78,88],"defend":[80],"their":[81,150],"systems":[82],"against":[83],"outside":[84],"attacks,":[85],"however,":[86],"these":[87],"fail":[89],"work":[91,165],"on":[92],"unseen":[93],"polymorphic":[95],"With":[97],"cutting-edge":[98],"deep":[99,128,146,172,184,204],"learning":[100,129,147,173,185,205],"(DL)":[101],"processes":[102],"getting":[103],"adopted":[104],"nearly":[106],"field,":[108],"it":[109],"been":[111],"widely":[112],"exploited":[113],"detect":[117,134],"classify":[119],"cyber-attacks.":[120],"This":[121,140,158,177],"discusses":[123],"application":[125],"models":[130,148,174,186],"malware,":[135],"intrusion,":[136],"phishes,":[137],"spam.":[139],"provides":[142],"description":[144],"mathematical":[151],"backgrounds":[152],"are":[154,196],"cybersecurity.":[157,176,188,207],"also":[160],"reviews":[161],"analyses":[163],"other":[167],"researchers":[168],"who":[169],"experimented":[170],"with":[171],"delineates":[179],"challenges":[181],"faced":[182],"Finally,":[189],"concluding":[190],"remarks":[191],"future":[193],"research":[194],"directions":[195],"summarized":[197],"foresee":[199],"potential":[201],"improvement":[202]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3}],"updated_date":"2026-03-03T08:47:05.690250","created_date":"2025-10-10T00:00:00"}
