{"id":"https://openalex.org/W4224986562","doi":"https://doi.org/10.1177/15501329221084882","title":"Artificial intelligence analysis in cyber domain: A review","display_name":"Artificial intelligence analysis in cyber domain: A review","publication_year":2022,"publication_date":"2022-04-01","ids":{"openalex":"https://openalex.org/W4224986562","doi":"https://doi.org/10.1177/15501329221084882"},"language":"en","primary_location":{"id":"doi:10.1177/15501329221084882","is_oa":true,"landing_page_url":"https://doi.org/10.1177/15501329221084882","pdf_url":null,"source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},"type":"review","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1177/15501329221084882","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044064957","display_name":"Liguo Zhao","orcid":"https://orcid.org/0000-0002-3563-878X"},"institutions":[{"id":"https://openalex.org/I72565114","display_name":"Luoyang Institute of Science and Technology","ror":"https://ror.org/04nraex26","country_code":"CN","type":"education","lineage":["https://openalex.org/I72565114"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liguo Zhao","raw_affiliation_strings":["School of Computer and Information Engineering, Luoyang Instiute of Science and Technology, Henan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer and Information Engineering, Luoyang Instiute of Science and Technology, Henan, China","institution_ids":["https://openalex.org/I72565114"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113883090","display_name":"Derong Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I72565114","display_name":"Luoyang Institute of Science and Technology","ror":"https://ror.org/04nraex26","country_code":"CN","type":"education","lineage":["https://openalex.org/I72565114"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Derong Zhu","raw_affiliation_strings":["School of Intelligent Manufacturing, Luoyang Institute of Science and Technology, Luoyang, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Intelligent Manufacturing, Luoyang Institute of Science and Technology, Luoyang, China","institution_ids":["https://openalex.org/I72565114"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007717900","display_name":"Wasswa Shafik","orcid":"https://orcid.org/0000-0002-9320-3186"},"institutions":[{"id":"https://openalex.org/I112536369","display_name":"Yazd University","ror":"https://ror.org/02x99ac45","country_code":"IR","type":"education","lineage":["https://openalex.org/I112536369"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Wasswa Shafik","raw_affiliation_strings":["Intelligent Connectivity Research Laboratory, Department of Computer Engineering, Yazd University, Yazd, Iran"],"raw_orcid":"https://orcid.org/0000-0002-9320-3186","affiliations":[{"raw_affiliation_string":"Intelligent Connectivity Research Laboratory, Department of Computer Engineering, Yazd University, Yazd, Iran","institution_ids":["https://openalex.org/I112536369"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067997994","display_name":"S. Mojtaba Matinkhah","orcid":"https://orcid.org/0000-0002-3800-8396"},"institutions":[{"id":"https://openalex.org/I112536369","display_name":"Yazd University","ror":"https://ror.org/02x99ac45","country_code":"IR","type":"education","lineage":["https://openalex.org/I112536369"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"S Mojtaba Matinkhah","raw_affiliation_strings":["Intelligent Connectivity Research Laboratory, Department of Computer Engineering, Yazd University, Yazd, Iran"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Intelligent Connectivity Research Laboratory, Department of Computer Engineering, Yazd University, Yazd, Iran","institution_ids":["https://openalex.org/I112536369"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100746143","display_name":"Zubair Ahmad","orcid":"https://orcid.org/0000-0003-3782-4081"},"institutions":[{"id":"https://openalex.org/I112536369","display_name":"Yazd University","ror":"https://ror.org/02x99ac45","country_code":"IR","type":"education","lineage":["https://openalex.org/I112536369"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Zubair Ahmad","raw_affiliation_strings":["Department of Statistics, Yazd University, Yazd, Iran"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Statistics, Yazd University, Yazd, Iran","institution_ids":["https://openalex.org/I112536369"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013332220","display_name":"Lule Sharif","orcid":null},"institutions":[{"id":"https://openalex.org/I185474147","display_name":"Islamic University in Uganda","ror":"https://ror.org/03ph49z03","country_code":"UG","type":"education","lineage":["https://openalex.org/I185474147"]}],"countries":["UG"],"is_corresponding":false,"raw_author_name":"Lule Sharif","raw_affiliation_strings":["Department of Management Studies, Islamic University in Uganda, Kampala, Uganda"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Management Studies, Islamic University in Uganda, Kampala, Uganda","institution_ids":["https://openalex.org/I185474147"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061199032","display_name":"Alisa Craig","orcid":null},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alisa Craig","raw_affiliation_strings":["Department of Statistics, Pennsylvania State University, State College, PA, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Statistics, Pennsylvania State University, State College, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5007717900"],"corresponding_institution_ids":["https://openalex.org/I112536369"],"apc_list":{"value":2200,"currency":"USD","value_usd":2200},"apc_paid":{"value":2200,"currency":"USD","value_usd":2200},"fwci":6.9856,"has_fulltext":false,"cited_by_count":51,"citation_normalized_percentile":{"value":0.97418842,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"18","issue":"4","first_page":"155013292210848","last_page":"155013292210848"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9063421487808228},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6551884412765503},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4885352551937103},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4695205092430115},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4489249885082245},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.44037994742393494},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.42382919788360596},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.42318540811538696},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.4174352288246155},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.41250404715538025},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.37585344910621643},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24940618872642517},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.1849910020828247}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9063421487808228},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6551884412765503},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4885352551937103},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4695205092430115},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4489249885082245},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.44037994742393494},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.42382919788360596},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.42318540811538696},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.4174352288246155},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.41250404715538025},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.37585344910621643},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24940618872642517},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.1849910020828247},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1177/15501329221084882","is_oa":true,"landing_page_url":"https://doi.org/10.1177/15501329221084882","pdf_url":null,"source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:sae:intdis:v:18:y:2022:i:4:p:15501329221084882","is_oa":false,"landing_page_url":"https://journals.sagepub.com/doi/10.1177/15501329221084882","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:doaj.org/article:1f0e965a77fc4b739f3744db6f761eb8","is_oa":true,"landing_page_url":"https://doaj.org/article/1f0e965a77fc4b739f3744db6f761eb8","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"International Journal of Distributed Sensor Networks, Vol 18 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1177/15501329221084882","is_oa":true,"landing_page_url":"https://doi.org/10.1177/15501329221084882","pdf_url":null,"source":{"id":"https://openalex.org/S64417657","display_name":"International Journal of Distributed Sensor Networks","issn_l":"1550-1329","issn":["1550-1329","1550-1477"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Distributed Sensor Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1191482210","https://openalex.org/W1436652029","https://openalex.org/W2317515691","https://openalex.org/W2342408547","https://openalex.org/W2408246687","https://openalex.org/W2417999172","https://openalex.org/W2560070550","https://openalex.org/W2586068811","https://openalex.org/W2591102410","https://openalex.org/W2593914038","https://openalex.org/W2620689220","https://openalex.org/W2803881474","https://openalex.org/W2883387735","https://openalex.org/W2888333559","https://openalex.org/W2907351452","https://openalex.org/W2908954810","https://openalex.org/W2916909342","https://openalex.org/W2955427431","https://openalex.org/W2979750067","https://openalex.org/W2998820416","https://openalex.org/W2999375812","https://openalex.org/W3005507771","https://openalex.org/W3009152417","https://openalex.org/W3082299611","https://openalex.org/W3196024140","https://openalex.org/W3201081033","https://openalex.org/W3209096099","https://openalex.org/W3210020128","https://openalex.org/W4200326929","https://openalex.org/W4200365281","https://openalex.org/W4200567870"],"related_works":["https://openalex.org/W4390608645","https://openalex.org/W4405901645","https://openalex.org/W4394895745","https://openalex.org/W4247566972","https://openalex.org/W2960264696","https://openalex.org/W3090563135","https://openalex.org/W2497432351","https://openalex.org/W4206777497","https://openalex.org/W2910064364","https://openalex.org/W4200136508"],"abstract_inverted_index":{"The":[0,63,110,129,147],"application":[1],"of":[2,27,72,80,100,120,123,136,158,181],"Big":[3],"Data":[4],"Analytics":[5],"is":[6,51,197],"identified":[7],"through":[8,87,186],"the":[9,16,25,70,96,121,142,162,179],"Cyber":[10],"Research":[11],"Alliance":[12],"for":[13,19,37,53,58,178],"cybersecurity":[14],"as":[15],"foremost":[17],"preference":[18],"future":[20],"studies":[21],"and":[22,44,191],"advancement":[23],"in":[24,40,92,139,149],"field":[26],"cybersecurity.":[28],"In":[29],"this":[30,150],"study,":[31],"we":[32],"develop":[33],"a":[34,55,88,101,107,133,155,166,187,193,198],"repeatable":[35],"procedure":[36],"detecting":[38,59],"cyber-attacks":[39],"an":[41],"accurate,":[42],"scalable,":[43],"timely":[45],"manner.":[46],"An":[47],"in-depth":[48],"learning":[49,164],"algorithm":[50],"utilized":[52],"training":[54],"neural":[56],"network":[57],"suspicious":[60,173],"user":[61],"activities.":[62],"proposed":[64],"system":[65],"architecture":[66],"was":[67],"implemented":[68],"with":[69,127,141,161],"help":[71],"Splunk":[73,89],"Enterprise":[74],"Edition":[75],"6.42.":[76],"A":[77],"data":[78,97,168],"set":[79,169],"average":[81],"feature":[82],"counts":[83],"has":[84],"been":[85],"executed":[86],"search":[90],"command":[91],"1-min":[93],"intervals.":[94],"All":[95],"sets":[98],"consisted":[99],"minute":[102],"trait":[103],"total":[104],"derived":[105],"from":[106],"sparkling":[108],"file.":[109],"attack":[111],"patterns":[112],"that":[113,153],"were":[114,118,125],"not":[115],"anonymized":[116],"or":[117],"indicative":[119],"vulnerability":[122],"cyber-attack":[124],"denoted":[126],"yellow.":[128],"rule-based":[130],"method":[131,176],"dispensed":[132],"low":[134],"quantity":[135],"irregular":[137],"illustrations":[138],"contrast":[140],"Partitioning":[143],"Around":[144],"Medoids":[145],"method.":[146],"results":[148],"study":[151],"demonstrated":[152],"using":[154],"proportional":[156],"collection":[157],"instances":[159],"trained":[160],"deep":[163],"algorithm,":[165],"classified":[167],"can":[170],"accurately":[171],"detect":[172],"behavior.":[174],"This":[175],"permits":[177],"allocation":[180],"multiple":[182],"log":[183],"source":[184],"types":[185],"sliding":[188],"time":[189],"window":[190],"provides":[192],"scalable":[194],"solution,":[195],"which":[196],"much-needed":[199],"function.":[200]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":24},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":4}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
