{"id":"https://openalex.org/W4401314842","doi":"https://doi.org/10.1186/s40537-024-00957-y","title":"Advancing cybersecurity: a comprehensive review of AI-driven detection techniques","display_name":"Advancing cybersecurity: a comprehensive review of AI-driven detection techniques","publication_year":2024,"publication_date":"2024-08-04","ids":{"openalex":"https://openalex.org/W4401314842","doi":"https://doi.org/10.1186/s40537-024-00957-y"},"language":"en","primary_location":{"id":"doi:10.1186/s40537-024-00957-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s40537-024-00957-y","pdf_url":"https://journalofbigdata.springeropen.com/counter/pdf/10.1186/s40537-024-00957-y","source":{"id":"https://openalex.org/S2737955091","display_name":"Journal Of Big Data","issn_l":"2196-1115","issn":["2196-1115"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Big Data","raw_type":"journal-article"},"type":"review","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journalofbigdata.springeropen.com/counter/pdf/10.1186/s40537-024-00957-y","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Aya H. Salem","orcid":null},"institutions":[{"id":"https://openalex.org/I84058292","display_name":"Helwan University","ror":"https://ror.org/00h55v928","country_code":"EG","type":"education","lineage":["https://openalex.org/I84058292"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Aya H. Salem","raw_affiliation_strings":["Faculty of Computer and Artificial Intelligence, Helwan University, Cairo, Egypt"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Faculty of Computer and Artificial Intelligence, Helwan University, Cairo, Egypt","institution_ids":["https://openalex.org/I84058292"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004544323","display_name":"Safaa M. Azzam","orcid":null},"institutions":[{"id":"https://openalex.org/I84058292","display_name":"Helwan University","ror":"https://ror.org/00h55v928","country_code":"EG","type":"education","lineage":["https://openalex.org/I84058292"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Safaa M. Azzam","raw_affiliation_strings":["Faculty of Computer and Artificial Intelligence, Helwan University, Cairo, Egypt"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Faculty of Computer and Artificial Intelligence, Helwan University, Cairo, Egypt","institution_ids":["https://openalex.org/I84058292"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108746618","display_name":"O. E. Emam","orcid":null},"institutions":[{"id":"https://openalex.org/I84058292","display_name":"Helwan University","ror":"https://ror.org/00h55v928","country_code":"EG","type":"education","lineage":["https://openalex.org/I84058292"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"O. E. Emam","raw_affiliation_strings":["Faculty of Computer and Artificial Intelligence, Helwan University, Cairo, Egypt"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Faculty of Computer and Artificial Intelligence, Helwan University, Cairo, Egypt","institution_ids":["https://openalex.org/I84058292"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059775848","display_name":"Amr A. Abohany","orcid":"https://orcid.org/0000-0002-7408-5073"},"institutions":[{"id":"https://openalex.org/I130309236","display_name":"Kafrelsheikh University","ror":"https://ror.org/04a97mm30","country_code":"EG","type":"education","lineage":["https://openalex.org/I130309236"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Amr A. Abohany","raw_affiliation_strings":["Faculty of Computer and Information, Kafr El-Sheikh University, Cairo, Egypt"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Faculty of Computer and Information, Kafr El-Sheikh University, Cairo, Egypt","institution_ids":["https://openalex.org/I130309236"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I84058292"],"apc_list":{"value":1060,"currency":"GBP","value_usd":1300},"apc_paid":{"value":1060,"currency":"GBP","value_usd":1300},"fwci":67.5796,"has_fulltext":false,"cited_by_count":205,"citation_normalized_percentile":{"value":0.99986167,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"11","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8019059896469116},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.6951007843017578},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6419536471366882},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5842412710189819},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.49764254689216614},{"id":"https://openalex.org/keywords/cyberwarfare","display_name":"Cyberwarfare","score":0.43994638323783875},{"id":"https://openalex.org/keywords/metaheuristic","display_name":"Metaheuristic","score":0.43893197178840637},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.36070477962493896}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8019059896469116},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.6951007843017578},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6419536471366882},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5842412710189819},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.49764254689216614},{"id":"https://openalex.org/C171769113","wikidata":"https://www.wikidata.org/wiki/Q849340","display_name":"Cyberwarfare","level":2,"score":0.43994638323783875},{"id":"https://openalex.org/C109718341","wikidata":"https://www.wikidata.org/wiki/Q1385229","display_name":"Metaheuristic","level":2,"score":0.43893197178840637},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.36070477962493896}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s40537-024-00957-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s40537-024-00957-y","pdf_url":"https://journalofbigdata.springeropen.com/counter/pdf/10.1186/s40537-024-00957-y","source":{"id":"https://openalex.org/S2737955091","display_name":"Journal Of Big Data","issn_l":"2196-1115","issn":["2196-1115"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Big Data","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:c51d6368264e436a9feef175f66d34ea","is_oa":false,"landing_page_url":"https://doaj.org/article/c51d6368264e436a9feef175f66d34ea","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Big Data, Vol 11, Iss 1, Pp 1-38 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s40537-024-00957-y","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s40537-024-00957-y","pdf_url":"https://journalofbigdata.springeropen.com/counter/pdf/10.1186/s40537-024-00957-y","source":{"id":"https://openalex.org/S2737955091","display_name":"Journal Of Big Data","issn_l":"2196-1115","issn":["2196-1115"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Big Data","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5099999904632568,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320322165","display_name":"Helwan University","ror":"https://ror.org/00h55v928"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4401314842.pdf"},"referenced_works_count":112,"referenced_works":["https://openalex.org/W1988245217","https://openalex.org/W2908954810","https://openalex.org/W2945594226","https://openalex.org/W2958285686","https://openalex.org/W2967532333","https://openalex.org/W2991435551","https://openalex.org/W2996343483","https://openalex.org/W2999538200","https://openalex.org/W3009983180","https://openalex.org/W3038955483","https://openalex.org/W3112746081","https://openalex.org/W3113519107","https://openalex.org/W3114468998","https://openalex.org/W3115944121","https://openalex.org/W3117829857","https://openalex.org/W3127432888","https://openalex.org/W3146778731","https://openalex.org/W3156337861","https://openalex.org/W3167041328","https://openalex.org/W3169084863","https://openalex.org/W3169253335","https://openalex.org/W3173768230","https://openalex.org/W3179438752","https://openalex.org/W3184844904","https://openalex.org/W3187104866","https://openalex.org/W3191884578","https://openalex.org/W3203003543","https://openalex.org/W4200224268","https://openalex.org/W4205531827","https://openalex.org/W4205608240","https://openalex.org/W4205648436","https://openalex.org/W4214482096","https://openalex.org/W4214699222","https://openalex.org/W4214733302","https://openalex.org/W4220762966","https://openalex.org/W4225258030","https://openalex.org/W4225285764","https://openalex.org/W4226319939","https://openalex.org/W4229003780","https://openalex.org/W4255072004","https://openalex.org/W4281654741","https://openalex.org/W4282042832","https://openalex.org/W4285278771","https://openalex.org/W4292182791","https://openalex.org/W4298122478","https://openalex.org/W4307873385","https://openalex.org/W4308415672","https://openalex.org/W4310153191","https://openalex.org/W4312933237","https://openalex.org/W4319596448","https://openalex.org/W4319791240","https://openalex.org/W4320016096","https://openalex.org/W4322705921","https://openalex.org/W4323056351","https://openalex.org/W4323307499","https://openalex.org/W4323842737","https://openalex.org/W4327736930","https://openalex.org/W4360602045","https://openalex.org/W4362632616","https://openalex.org/W4362704894","https://openalex.org/W4362724099","https://openalex.org/W4365512282","https://openalex.org/W4365813082","https://openalex.org/W4366541802","https://openalex.org/W4366809011","https://openalex.org/W4367856745","https://openalex.org/W4372341076","https://openalex.org/W4377984372","https://openalex.org/W4379514871","https://openalex.org/W4380372584","https://openalex.org/W4380483109","https://openalex.org/W4382584179","https://openalex.org/W4383196772","https://openalex.org/W4383346073","https://openalex.org/W4384343495","https://openalex.org/W4384694228","https://openalex.org/W4385409614","https://openalex.org/W4385769503","https://openalex.org/W4386413518","https://openalex.org/W4386832027","https://openalex.org/W4386850845","https://openalex.org/W4386952649","https://openalex.org/W4387014276","https://openalex.org/W4387653636","https://openalex.org/W4387826905","https://openalex.org/W4388201606","https://openalex.org/W4388778196","https://openalex.org/W4388893996","https://openalex.org/W4389513574","https://openalex.org/W4389622975","https://openalex.org/W4390134829","https://openalex.org/W4390274324","https://openalex.org/W4390737701","https://openalex.org/W4390913672","https://openalex.org/W4390970201","https://openalex.org/W4391197583","https://openalex.org/W4391258395","https://openalex.org/W4391407086","https://openalex.org/W4391450188","https://openalex.org/W4391589697","https://openalex.org/W4391790800","https://openalex.org/W4391942074","https://openalex.org/W4392103307","https://openalex.org/W4392198329","https://openalex.org/W4392405536","https://openalex.org/W4392469887","https://openalex.org/W4392556256","https://openalex.org/W4392729593","https://openalex.org/W4393946410","https://openalex.org/W4393970641","https://openalex.org/W6602357013","https://openalex.org/W6888822977"],"related_works":["https://openalex.org/W4241558023","https://openalex.org/W3096091498","https://openalex.org/W2746847679","https://openalex.org/W1986218267","https://openalex.org/W1517610072","https://openalex.org/W4200456794","https://openalex.org/W2606110690","https://openalex.org/W2770241567","https://openalex.org/W2942539564","https://openalex.org/W2009794968"],"abstract_inverted_index":{"Abstract":[0],"As":[1],"the":[2,176,194,197,209,241],"number":[3],"and":[4,22,29,41,61,89,112,117,131,148,158,185,196,202,225],"cleverness":[5],"of":[6,94,103,179,199,243,257],"cyber-attacks":[7,70,246],"keep":[8],"increasing":[9,177],"rapidly,":[10],"it's":[11],"more":[12],"important":[13],"than":[14],"ever":[15],"to":[16,20,39,68,79,133,141,208,231,254],"have":[17],"good":[18,146],"ways":[19],"detect":[21,69],"prevent":[23],"them.":[24],"Recognizing":[25,212],"cyber":[26,95,134,172,180],"threats":[27],"quickly":[28],"accurately":[30],"is":[31,190,215],"crucial":[32],"because":[33],"they":[34,150],"can":[35,52,129,229],"cause":[36],"severe":[37],"damage":[38],"individuals":[40],"businesses.":[42],"This":[43,161],"paper":[44,162],"takes":[45],"a":[46,91,100,164],"close":[47],"look":[48],"at":[49,87,147],"how":[50,81,126],"we":[51,128,155],"use":[53],"artificial":[54],"intelligence":[55],"(AI),":[56],"including":[57],"machine":[58],"learning":[59,63],"(ML)":[60],"deep":[62],"(DL),":[64],"alongside":[65],"metaheuristic":[66,122,210],"algorithms":[67],"better.":[71],"We've":[72],"thoroughly":[73],"examined":[74],"over":[75],"sixty":[76],"recent":[77],"studies":[78],"measure":[80],"effective":[82],"these":[83,138,213],"AI":[84,139,169,183,252],"tools":[85],"are":[86],"identifying":[88],"fighting":[90],"wide":[92],"range":[93],"threats.":[96,135],"Our":[97],"research":[98,238],"includes":[99],"diverse":[101],"array":[102],"cyberattacks":[104],"such":[105],"as":[106,154],"malware":[107],"attacks,":[108],"network":[109],"intrusions,":[110],"spam,":[111],"others,":[113],"showing":[114],"that":[115,228,240],"ML":[116,201],"DL":[118,203],"methods,":[119],"together":[120],"with":[121],"algorithms,":[123],"significantly":[124],"improve":[125],"well":[127],"find":[130,142],"respond":[132],"We":[136,192],"compare":[137],"methods":[140,184,253],"out":[143],"what":[144],"they're":[145],"where":[149],"could":[151],"improve,":[152],"especially":[153],"face":[156],"new":[157,232],"changing":[159],"cyber-attacks.":[160],"presents":[163],"straightforward":[165],"framework":[166],"for":[167,217,223],"assessing":[168],"Methods":[170],"in":[171,206],"threat":[173],"detection.":[174],"Given":[175],"complexity":[178],"threats,":[181],"enhancing":[182],"regularly":[186],"ensuring":[187],"strong":[188],"protection":[189],"critical.":[191],"evaluate":[193],"effectiveness":[195],"limitations":[198,214],"current":[200],"proposed":[204],"models,":[205],"addition":[207],"algorithms.":[211],"vital":[216],"guiding":[218],"future":[219,242],"enhancements.":[220],"We're":[221],"pushing":[222],"smart":[224],"flexible":[226],"solutions":[227],"adapt":[230],"challenges.":[233],"The":[234],"findings":[235],"from":[236],"our":[237],"suggest":[239],"protecting":[244],"against":[245],"will":[247],"rely":[248],"on":[249],"continuously":[250],"updating":[251],"stay":[255],"ahead":[256],"hackers'":[258],"latest":[259],"tricks.":[260]},"counts_by_year":[{"year":2026,"cited_by_count":36},{"year":2025,"cited_by_count":150},{"year":2024,"cited_by_count":19}],"updated_date":"2026-05-07T13:39:58.223016","created_date":"2025-10-10T00:00:00"}
