References
- AI4Cyber. (2025). AI4Cyber EU Project. Available at:https://ai4cyber.eu, accessed on October 01, 2025.
- Chandola, V., Banerjee, A., & Kumar, V. (2021). Anomaly detection: a survey. ACM Computing Surveys, Vol. 41, no. 3, 1-58. Available at:https://doi.org/10.1145/1541880.1541882.
- Cunningham, M. (2025). Serge Egelman receives 2025 CyLab Distinguished Alumni Award. Available at:https://www.cylab.cmu.edu, accessed on October 01, 2025.
- DARPA. (n.d.). CGC: Cyber Grand Challenge. Available at:https://www.darpa.mil/program/cyber-grand-challenge, accessed on October 01, 2025.
- European School of Data Science and Technology. (n.d.). Artificial Intelligence: The Future and Its Applications. Available at:https://esdst.eu/arti%EF%AC%81cial-intelligence-the-future-and-its-applications/, accessed on October 01, 2025.
- Khalaf, L., et al. (2024). Deep Learning–Based Anomaly Detection in Network Traffic for Cybersecurity. ACM Digital Library. AICCONF ‘24: Proceedings of the Cognitive Models and Artificial Intelligence Conference, 303-309. DOI:10.1145/3660853.3660932.
- Mutalib, N.H.A., et al. (2024). Explainable deep learning approach for advanced persistent threats. Artificial Intelligence Review, Vol. 57(11), 297. Available at: https://doi.org/10.1007/s10462-024-10890-4.
- Nguyen, M.-D., et al. (2023). A deep learning anomaly detection framework with explainability and robustness. ACM Digital Library. ARES 2023: Proceedings of the 18th International Conference on Availability, Reliability and Security, 1-7. Available at: https://doi.org/10.1145/3600160.3605052.
- Pallavi, S. (2025). Redefining OT security with dedicated OT workflows & NEXT-gen visibility for industrial teams. Darktrace. Available at:https://www.darktrace.com/blog/darktrace-announces-unified-ot-security-introducing-dedicated-workflows-for-ot-engineers-segmentation-aware-risk-modeling-and-next-generation-endpoint-visibility-for-industrial-teams, accessed on October 01, 2025.
- Salem, A.H., et al. (2024). Advancing Cybersecurity: A Comprehensive Review of AI-Driven Detection Techniques. Journal of Big Data, Vol. 11. SpringerOpen. DOI: https://doi.org/10.1186/s40537-024-00957-y.
- Talukder, A., et al. (2024). Machine learning–based network intrusion detection for big and imbalanced data. Journal of Big Data, Vol. 11. SpringerOpen. DOI:https://doi.org/10.1186/s40537-024-00886-w.
