<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>ORCID:</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Searching for the Strong AI for Cybersecurity</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Diana E. Vorobieva</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alexei S. Petrenko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergei A. Petrenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Innopolis University</institution>
          ,
          <addr-line>Universitetskaya St, 1, Innopolis</addr-line>
          ,
          <country>Republic of</country>
          <addr-line>Tatarstan, 420500, 420500</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Saint-Petersburg Electrotechnical University «lETI»</institution>
          ,
          <addr-line>ul. Professora Popova, 5, St Petersburg, 197022</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2021</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>Currently, the creation of strong artificial intelligence (eng. Strong Artificial Intelligence (AI)) to ensure the required cybersecurity of digital platforms Industry 4.0 is one of the most interesting scientific and technical problems of our time. In the 1940s, when Norbert Wiener's book Cybernetics, or Control and Communication in the Animal and in the Machine, and other scientific papers on this topic were published, when the first computers of the von Neumann architecture appeared and began to be distributed. The mentioned problem was transferred from the field of science fiction to the field of real theoretical research and engineering developments. Since then, experts in the field of cyber security have been eagerly awaiting the emergence of fundamentally new technical information protection systems, the level of intelligence of which will be comparable to that of humans. That is, such engineering solutions, the distinctive ability of which will be the independent association and synthesis of new knowledge. Let's take a brief look at the history of the issue and dwell in more detail on the possible formulation of tasks for creating strong cybersecurity artificial intelligence.</p>
      </abstract>
      <kwd-group>
        <kwd>2 Industry 4</kwd>
        <kwd>0</kwd>
        <kwd>digital economy</kwd>
        <kwd>cybersecurity</kwd>
        <kwd>artificial intelligence</kwd>
        <kwd>artificial neural network</kwd>
        <kwd>genetic programming</kwd>
        <kwd>cognitive computing</kwd>
        <kwd>big data</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <sec id="sec-1-1">
        <title>Lisp and Prolog programming languages</title>
        <p>
          In 1960, at the Massachusetts Institute of Technology under the guidance of John McCarthy, the
first functional Lisp programming language was created, based on the theoretical foundation of the
lambda calculus by the famous mathematician Alonzo Church (1903–1995) [
          <xref ref-type="bibr" rid="ref10 ref22 ref23 ref24 ref8 ref9">8-10, 22-24</xref>
          ]. Afterwards,
at the University of Edinburgh (Scotland), Robert Kowalski had developed the first logic programming
language - Prolog, the practical implementation of which was implemented by Alain Colmari at the
University of Marseille (France) in 1972. Then followed the period of the development of the first
computer programs, including the Logical Theorist for the mathematical proof of the well-known
Russell theorems, the General Problem Solver (GPS) for solving the formally defined problems, the
UNIMATE robot in production. General Motors, ELIZA program that imitated the work of a
psychotherapist, the Dendral system for studying the atomic structure of compounds of organic origin,
various diagnostic programs, systems for generating the new scientific hypotheses and inventions, and
much more. However, the results obtained in the form of the first models, methods and tools of AI could
not be distributed to solve more complex problems. Mainly due to the problem of the so-called
“combinatorial explosion”, that manifests itself in an abrupt increase in the number of possible solutions
that could not be resolved by the trivial brute force method. As a result, the cautious optimism was
replaced by the first skepticism wave (or the first “AI winter”) - funding for scientific research in the
field of AI was sharply reduced, because of the certain mistrust in the results and the possibility of
creating strong AI.
        </p>
      </sec>
      <sec id="sec-1-2">
        <title>Fifth generation computer</title>
        <p>
          In the early 1980s, Japanese professionals started developing a so-called fifth-generation computer
with advanced AI functions. By that time, Japan had achieved a significant success in the automotive
and aviation industries, and intended to reach a new level of technological development. In the fact they
were supposed to develop a new architecture of parallel computing systems (Figure 2) with a
recordsetting performance of 100 million -1 billion LIPS. At that time, the computer performance was about
100 thousand LIPS, where LIPS is a logical inference per second [
          <xref ref-type="bibr" rid="ref22 ref23 ref24 ref25 ref26 ref27 ref28 ref29 ref30 ref31 ref37 ref38 ref39 ref40 ref41 ref42 ref43 ref44">22-31, 37-44</xref>
          ].
        </p>
        <p>The features of the Fifth generation computer are listed below:
• New computing system architecture (not von Neumann);
• New microcircuit production technology, which marks the transition from the silicon to gallium
arsenide, increasing the speed of the main logic elements;
• New methods of information input-output - recognition and synthesis of speech and images;
• Rejection of traditional algorithmic programming languages (Fortran, Algol, etc.) in favor of
functional Lisp and logical Prolog programming languages;
• Focus on the tasks of AI with automatic search for solutions based on logical inference.</p>
        <p>
          The corresponding State program was launched in order to achieve the goals in Japan (1982-1992)
[
          <xref ref-type="bibr" rid="ref22 ref23 ref24 ref25 ref26 ref27 ref28 ref29 ref30 ref31 ref32 ref45 ref46 ref47 ref48 ref49 ref50">22-32, 45-50</xref>
          ] with contributions from all of large private companies and costing ¥ 57 billion (about $
500 million). The example of Japan was followed by a number of technologically developed countries
of the world, including the USA with a similar Corporation for Microelectronics and Computer
        </p>
      </sec>
      <sec id="sec-1-3">
        <title>Technology (MCC) program, the UK Alvey program, the European ESPRIT program and the USSR</title>
        <p>program for creating MARS and Kronos processor supercomputers (1985-1988).</p>
      </sec>
      <sec id="sec-1-4">
        <title>Expert Systems</title>
        <p>
          In the mid-1980s, the expert systems became widespread (see the excellent book by Eduard
Viktorovich Popov), which were intended to replace the specialists in various subject areas. The
classical expert system was a program based on the “if - that” (the rules of the Post), and allowed to
recognize the situations and draw the simple logical conclusions. Hundreds of such expert systems were
developed, including Expert, Expert-PRO, GURU, etc [
          <xref ref-type="bibr" rid="ref22 ref23 ref24">22-24</xref>
          ]. However, it turned out that the small
expert systems were not beneficial enough, however the more powerful systems were too cumbersome
and expensive to develop, operate and maintain. Also, the limitations of the computer the third and next
generations, on the basis of the classical architecture of "von Neumann" for solving the tasks, were
revealed. As a result, by the end of the 1980s, the second “winter of AI” had begin.
        </p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Artificial Neural Networks</title>
      <p>In the 1990s, the relatively new models and methods of neural networks and genetic programming
replaced the logical programming.</p>
      <p>As a rule, an Artificial Neural Network (ANN) (Figure 3) is understood as a mathematical model, as
well as its software and hardware implementation, based on the principles of organization and
functioning of the biological neural networks - nerve cells of a living organism [Ошибка! Закладка
не определена.6-32,37-44]. For example, the modifications of the first neural networks of W.
McCulloc and W. Pitts, who have found an application in the pattern recognition problems, in control,
prediction, imparting properties of adaptability and self-organization, and etc.</p>
      <p>From an engineering point of view, an ANN is a system of the relatively simple processors (artificial
neurons) that receive and send signals to each other. At the same time, the neural networks are not
programmed in the usual sense of the word, but are learnt. Here the opportunity to be learnt is one of
the main advantages of neural networks over traditional algorithmic systems. Technically, learning is
to find the coefficients of connections between neurons. In the process of learning, the neural network
is able to detect the complex dependencies between the input and the output data, as well as perform a
generalization. This means that in case of successful learning, the network will be able to return the
correct result, based on data that was missing in the learning sample, as well as in the partially distorted
data (incomplete and/or “noisy”) (Figure 4).</p>
      <p>
        Let us note that the basic models of the neural networks have been known since the late 1950s, but
they became widespread after the development of the backpropagation, which allowed training the
multi-layer neural networks. Such multilayer networks in which there was at least one intermediate
(“hidden”) layer of neurons between the input and output layers can be trained how to perform a much
larger number of functions, compared to their simpler predecessors. In combination with the computer
technology achievements and the supercomputers’ construction, this allowed the construction of the
first neural networks, which quite successfully solved, among other things, the cybersecurity problems.
(Figure 5 and Figure 6) [
        <xref ref-type="bibr" rid="ref22 ref23 ref24 ref25 ref26 ref27 ref28 ref29 ref30 ref31 ref32 ref33 ref34 ref35 ref36 ref37 ref38 ref39 ref40 ref41 ref42 ref43 ref44 ref49 ref50">22-44, 49-50</xref>
        ].
      </p>
      <sec id="sec-2-1">
        <title>Genetic programming</title>
        <p>Genetic programming is a type of evolutionary computing method. Here, some initial populations
(data structures and/or data processing programs) are considered as initial data. As a result of the
random mutation and reproduction (“crossing”), the new populations appear. At the same time, a certain
selection criterion (fitness function) allows selecting the best solutions. As Nick Bostrom had correctly
noted, “In practice, however, getting evolutionary methods to work well requires skill and ingenuity,
particularly in devising a good representational format. Without an efficient way to encode the
candidate solutions (a genetic language that matches latent structure in the target domain), evolutionary
search tends to meander endlessly in a vast search space or get stuck at a local optimum.” At the same
time, the evolutionary computations require the significant computational resources.</p>
      </sec>
      <sec id="sec-2-2">
        <title>Software tools.</title>
        <p>In practice, in order to apply the models and AI methods in cybersecurity (Figure 7), the special
software tools may be needed. These include the open source libraries, ready-made applications, such
as the Gigster platform, as well as Microsoft Azure Machine Learning cloud services, Amazon Machine</p>
      </sec>
      <sec id="sec-2-3">
        <title>Learning, and others. A number of companies such as Google, Apple, Facebook, Amazon, and</title>
        <p>Microsoft have opened the third-party developers an access to their AI-bots to integrate the voice
commands into applications. Also, there are a number of functional platforms, such as Datanomiq, a
data science startup based on SAP solutions and services, as well as a number of open source AI
application libraries, including the Microsoft Cognitive Toolkit. (Figure 8).</p>
        <p>Also, in order to build a multilayer deep neural network, you can apply the capabilities of the
DGX1 supercomputer from NVIDIA, which allows more than 12 times increase the performance of learning
tasks, compared to the classical architecture of the "von Neumann" computer. At the same time, the
library of the DGX-1 programs3 will significantly simplify the process of developing the Deep Learning
applications. Let us note that the library includes the NVIDIA Deep Learning GPU Training System
(DIGITS)4, a full-featured interactive system for creating the Deep neural networks (DNN), and a
GPU3 https://developer.nvidia.com/deep-learning#source=pr
4 https://developer.nvidia.com/digits#source=pr
accelerated library of primitives for creating DNN - the NVIDIA CUDA Deep Neural Network (cuDNN).
In addition, the system contains a number of optimized frameworks for deep learning - Caffe, Theano
and Torch. DGX-1, etc.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. NBIC-Technology</title>
      <p>In the 2000s, in the developed countries (USA, EU countries, China, Russia and others) a new
technological structure of society was formed on the basis of so-called convergent NBIC technologies.
For example, in the United States, a program of the National Science Foundation and the Department
of Commerce under the NBIC - Nanotechnology, Biotechnology, Information technology and Cognitive
science is being implemented. In the European Union, the following programs are being implemented:</p>
      <sec id="sec-3-1">
        <title>GRAIN (Genetics, Robotics, Artificial Intelligence and Nanotechnology) and BANG (Bits, Atoms,</title>
        <p>Neurons, Genes). China has launched a similar China Brain program. The national technology initiative
Neuronet had started development in Russia (CoBrain or Web 4.0 program). Under this program, a
number of leading national research and production companies, research institutes and universities,
including OJSC Radar system Technology Information (RTI), Research and Development Center of
Kurchatov Institute, Research Institute of Neurocybernetics named after A. Kogan, Military Space
Academy named after AF Mozhaisky, Moscow Institute of Physics and Technology, St. Petersburg
Electrotechnical University “LETI”, National Research University of Information Technologies,
Mechanics and Optics, started the pilot production of hybrid and artificial biosimilar materials, technical
systems of bionic type and technological platforms based on them. In the future, it is planned to create
the complex anthropomorphic technical systems and “nature-like” technologies, combining the
components of animate and inanimate nature.</p>
        <p>The term cognitive comes from the Latin word cognitio (cognition). The improvement of
mathematical models of thinking processes contributed to the development of a cognitive approach in
the technical field. The first “artificial cognitive systems” appeared, representing “intelligent” software
and hardware systems based on the traditional architecture of the Hungarian-American mathematician
and physicist John von Neumann.</p>
        <p>
          The prerequisites of the modern cognitive approach were the fundamental results [
          <xref ref-type="bibr" rid="ref22 ref23 ref24">22-24</xref>
          ]:
• Mathematical logic (from Aristotle to A. N. Kolmogorov);
• Mathematical computability theory (from Alan Turing to A. I. Maltsev);
• Computer science of John von Neumann's architecture;
• Theories of generative grammars of A. N. Chomsky;
• Theory of computational neurophysics of David Marr.
        </p>
        <p>The core of the modern cognitive approach is the methods of cognition, perception and information
accumulation, as well as methods of thinking or using this information for the “judicious” solution of
the problems. It is believed that artificial cognitive systems are able to "repeat" the complex behavioral
functions of the nervous system and even the work of the human mind.</p>
        <p>Modern studies of the cognitive systems are conducted on the basis of the neurophysiological
principles of the nervous system construction and the cognitive methods of human cognitive and mental
activity. For example, in the work of L. A. Stankevich “Artificial cognitive systems” the use of artificial
cognitive systems with hybrid architectures in robotics is justified. At the same time, a cognitive system
is defined as a system that is capable of learning about its environment and adapting/changing it, due
to the accumulated knowledge and acquired skills in the operation process. Two main types of artificial
cognitive systems are clearly distinguished: the cognitive and emergent ones.</p>
        <p>The actual cognitive systems include:
• Traditional character systems (Allen Newell and Herbert Simon);
• Systems, based on the theory of cognition, which applies training and the acquisition of
symbolic knowledge (J. Anderson);</p>
        <p>• Systems, based on the theory of practical reason and high-level psychological concepts of
persuasion, plans and intention (Michael Bratman).</p>
        <p>Here the former are capable of generating some character structures or expressions. In this case, a
symbol is a physical pattern that represents a certain component of an expression (or a character
structure). The second ones are based on a system of products and a generalized model of human
thinking and knowledge, containing memory, knowledge, decision making, and learning. In this case,
the learning contains declarative and procedural steps, depending on the student knowledge. Others
implement a decision-making process similar to the traditional practical conclusion.</p>
        <p>The emergent systems consist of:
• Connectionist systems;
• Dynamic systems;
• Inactive systems.</p>
        <p>The former implements the parallel processing of the distributed activation patterns, applying the
statistical properties, rather than logical rules. The latter study the various self-organizing motor systems
and human perception systems, examining the relevant metastable behavioral patterns. For others, the
definition of a cognitive entity, that is, a purposeful behavior of the system, occurs when they interact
with the environment.</p>
        <p>Thus, the general methodology for the development of hybrid cognitive technical systems was
proposed and substantiated:</p>
        <p>• Formalized cognitive concepts and methods for creating the effective self-learning and
selfmodifying systems;
• Methods for the synthesis of the original cognitive components (modules and networks of
modules) capable of accumulating knowledge through training and self-learning. At the same time, the
components are built on the basis of a combination of neurological, immunological and triangulation
adaptive elements that are most effective for multidimensional functional approximation, as well as
corresponding behavioral networks;</p>
        <p>• Methods for implementing the cognitive components and systems, based on specially
developed software. The software implementation of cognitive components is based on the original
models of information processing and training, and cognitive systems are based on multi-agent
technology. This cognitive multi-agent allows creating the distributed cognitive systems with a high
level of behavior complexity.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusion</title>
      <p>It is significant that the cognitive systems (Figure 9), unlike other well-known solutions
(CERT/SCIRT, MSSP/MDR, SOC 2.0, IDS/IPS, etc.), have the ability to independently learn and behave
in the real conditions of destructive hardware and software of intruders, affecting the protected critical
information infrastructure. This will effectively solve the following tasks:</p>
      <p>• Recognize patterns (patterns and clusters) that determine the preparation and the beginning of
computer aggression;</p>
      <p>• Training and development of the typical scenarios of warning, detection and counteraction in
cyberspace;</p>
      <p>• Generation, accumulation and processing of the new knowledge about the quantitative laws of
opposition in cyberspace;
• Representations of the “deep” semantics of confrontation in cyberspace;
• Preparation and implementation of the adequate decisions, in response to cyber - attack.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Acknowledgements</title>
      <p>The publication was carried out with the financial support of Russian Foundation for Basic Research
(RFBR) in the framework of the scientific project No. 20-04-60080.</p>
    </sec>
    <sec id="sec-6">
      <title>6. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Barabanov</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Markov</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsirlov</surname>
            <given-names>V</given-names>
          </string-name>
          .
          <article-title>Procedure for Substantiated Development of Measures to Design Secure Software for Automated Process Control Systems</article-title>
          .
          <source>In Proceedings of the 12th International Siberian Conference on Control and Communications</source>
          (Moscow, Russia, May
          <volume>12</volume>
          -14,
          <year>2016</year>
          ).
          <article-title>SIBCON 2016</article-title>
          . IEEE,
          <volume>7491660</volume>
          ,
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . DOI:
          <volume>10</volume>
          .1109/SIBCON.
          <year>2016</year>
          .
          <volume>7491660</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Barabanov</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Markov</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsirlov</surname>
            <given-names>V</given-names>
          </string-name>
          .
          <article-title>On Systematics of the Information Security of Software Supply Chains</article-title>
          .
          <source>Advances in Intelligent Systems and Computing</source>
          .
          <year>2020</year>
          . V. 1294. P.
          <volume>115</volume>
          -
          <fpage>129</fpage>
          . DOI:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -63322-
          <issue>6</issue>
          _
          <fpage>9</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
            <surname>Ben Neria</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.-S.</given-names>
            <surname>Yacovzada</surname>
          </string-name>
          ,
          <string-name>
            <surname>and I.</surname>
          </string-name>
          <article-title>Ben-Gal, ''A Risk-Scoring Feedback Model for Webpages and Web Users Based on Browsing Behavior,'' ACM Trans</article-title>
          . Intell. Syst. Technol., vol.
          <volume>8</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>21</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kleinmann</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Wool</surname>
          </string-name>
          , '
          <article-title>'Automatic Construction of Statechart-Based Anomaly Detection Models for MultiThreaded Industrial Control Systems</article-title>
          ,'' vol.
          <volume>8</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>21</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>G.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tang</surname>
          </string-name>
          , C. Wilson,
          <string-name>
            <given-names>H.</given-names>
            <surname>Zheng</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B. Y.</given-names>
            <surname>Zhao</surname>
          </string-name>
          , ''Clickstream User Behavior Models,''
          <source>ACM Trans. Web</source>
          , vol.
          <volume>11</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>37</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>D.</given-names>
            <surname>Codetta-Raiteri</surname>
          </string-name>
          and
          <string-name>
            <given-names>L.</given-names>
            <surname>Portinale</surname>
          </string-name>
          , '
          <article-title>'Decision Networks for Security Risk Assessment of Critical Infrastructures,'' ACM Trans</article-title>
          . Internet Technol., vol.
          <volume>18</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>22</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>F.</given-names>
            <surname>Angiulli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Argento</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Furfaro</surname>
          </string-name>
          , ''Exploiting Content Spatial Distribution to Improve Detection of Intrusions,'' ACM Trans. Internet Technol., vol.
          <volume>18</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>21</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>C. X.</given-names>
            <surname>Lu</surname>
          </string-name>
          et al.,
          <source>''Snoopy: Sniffing Your Smartwatch Passwords via Deep Sequence Learning,'' Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. Artic.</source>
          , vol.
          <volume>1</volume>
          , no.
          <issue>152</issue>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Squicciarini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Caragea</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Balakavi</surname>
          </string-name>
          , ''
          <source>Toward Automated Online Photo Privacy,'' ACM Trans. Web</source>
          , vol.
          <volume>11</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>29</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>N.</given-names>
            <surname>Sabar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Yi</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Shong</surname>
          </string-name>
          , '
          <article-title>'A Bi-objective Hyper-Heuristic Support Vector Machines for Big Data Cyber-</article-title>
          <string-name>
            <surname>Security</surname>
            <given-names>NASSER</given-names>
          </string-name>
          ,'' IEEE Access, vol.
          <volume>56</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>280</fpage>
          -
          <lpage>287</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>C.</given-names>
            <surname>Yin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Fei</surname>
          </string-name>
          , and
          <string-name>
            <given-names>X.</given-names>
            <surname>He</surname>
          </string-name>
          , '
          <article-title>'A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks</article-title>
          ,'' vol.
          <volume>5</volume>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>N.</given-names>
            <surname>Shone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. N.</given-names>
            <surname>Ngoc</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. D.</given-names>
            <surname>Phai</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Q.</given-names>
            <surname>Shi</surname>
          </string-name>
          , '
          <article-title>'A Deep Learning Approach to Network Intrusion Detection</article-title>
          ,''
          <source>IEEE Trans. Emerg. Top. Comput. Intell.</source>
          , vol.
          <volume>2</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>41</fpage>
          -
          <lpage>50</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>H.</given-names>
            <surname>Peng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tan</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Z.</given-names>
            <surname>Sun</surname>
          </string-name>
          , '
          <article-title>'A Detection Method for Anomaly Flow in Software Defined Network,'' IEEE Access</article-title>
          , vol.
          <volume>6</volume>
          , pp.
          <fpage>27809</fpage>
          -
          <lpage>27817</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>C.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Zhao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Gong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Zhu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Liu</surname>
          </string-name>
          , and X. Cheng, '
          <article-title>'A Distributed Anomaly Detection System for In-Vehicle Network Using HTM,'' IEEE Access</article-title>
          , vol.
          <volume>6</volume>
          , pp.
          <fpage>9091</fpage>
          -
          <lpage>9098</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Han</surname>
          </string-name>
          ,
          <string-name>
            <surname>T</surname>
          </string-name>
          . Alpcan,
          <string-name>
            <given-names>J.</given-names>
            <surname>Chan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Leckie</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B. I. P.</given-names>
            <surname>Rubinstein</surname>
          </string-name>
          , ''
          <string-name>
            <given-names>A Game</given-names>
            <surname>Theoretical Approach to Defend Against</surname>
          </string-name>
          Co-Resident
          <source>Attacks in Cloud Computing?: 146606 VOLUME 8</source>
          ,
          <year>2020</year>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>I. Wiafe</surname>
          </string-name>
          et al.:
          <article-title>Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature Preventing Co-Residence Using Semi-Supervised Learning</article-title>
          ,''
          <source>IEEE Trans. Inf</source>
          . Forensics Secur., vol.
          <volume>11</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>556</fpage>
          -
          <lpage>570</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>L.</given-names>
            <surname>Dritsoula</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Loiseau</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Musacchio</surname>
          </string-name>
          , ''
          <string-name>
            <given-names>A</given-names>
            <surname>Game-Theoretic Analysis</surname>
          </string-name>
          of Adversarial Classification,'' vol.
          <volume>12</volume>
          , no.
          <issue>12</issue>
          , pp.
          <fpage>3094</fpage>
          -
          <lpage>3109</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>N. S.</given-names>
            <surname>Safa</surname>
          </string-name>
          , '
          <article-title>'A Logit Boost-Based Algorithm for Detecting Known</article-title>
          and Unknown Web Attacks,'' IEEE Access, vol.
          <volume>5</volume>
          , pp.
          <fpage>26190</fpage>
          -
          <lpage>26200</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>V. T.</given-names>
            <surname>Alaparthy</surname>
          </string-name>
          and
          <string-name>
            <given-names>S. D.</given-names>
            <surname>Morgera</surname>
          </string-name>
          , '
          <article-title>'A Multi-Level Intrusion Detection System for Wireless Sensor Networks Based on Immune Theory,'' IEEE Access</article-title>
          , vol.
          <volume>6</volume>
          , pp.
          <fpage>47364</fpage>
          -
          <lpage>47373</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>M. H.</given-names>
            <surname>Ali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Abbas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Al</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ismail</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M. F.</given-names>
            <surname>Zolkipli</surname>
          </string-name>
          , '
          <article-title>'A New Intrusion Detection System Based on Fast Learning Network and Particle Swarm Optimization</article-title>
          ,'' IEEE Access, vol.
          <volume>6</volume>
          , pp.
          <fpage>20255</fpage>
          -
          <lpage>20261</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>P.</given-names>
            <surname>Feng</surname>
          </string-name>
          , J. Ma, C. Sun, and Y. Ma, ''
          <string-name>
            <given-names>A Novel</given-names>
            <surname>Dynamic Android Malware Detection System With Ensemble Learning</surname>
          </string-name>
          ,'' IEEE Access, vol.
          <volume>6</volume>
          , pp.
          <fpage>30996</fpage>
          -
          <lpage>31011</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Sergei</surname>
            <given-names>Petrenko</given-names>
          </string-name>
          ,
          <article-title>Developing a Cybersecurity Immune System for Industry 4</article-title>
          .0, 2020 River Publishers, River Publishers Series in Security and Digital Forensics. ISBN:
          <volume>9788770221887</volume>
          , eISBN:
          <volume>9788770221870</volume>
          , 386 p.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>Sergei</given-names>
            <surname>Petrenko</surname>
          </string-name>
          . Cyber Resilience, ISBN:
          <fpage>978</fpage>
          -
          <lpage>87</lpage>
          -7022-11-60 (Hardback) and
          <fpage>877</fpage>
          -022-11-62 (Ebook).
          <source>2019 River Publishers, River Publishers Series in Security and Digital Forensics</source>
          , 1st ed.
          <year>2019</year>
          ,
          <volume>492</volume>
          p.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>Petrenko</surname>
            <given-names>S.</given-names>
          </string-name>
          <article-title>Cyber resilient platform for internet of things (IIoT/IoT)ed systems: survey of architecture patterns</article-title>
          .
          <source>Voprosy kiberbezopasnosti [Cybersecurity issues]</source>
          .
          <source>2021. N</source>
          <volume>2</volume>
          (
          <issue>42</issue>
          ). P.
          <volume>81</volume>
          -
          <fpage>91</fpage>
          . DOI:
          <volume>10</volume>
          .21681/
          <fpage>2311</fpage>
          -3456-2021-2-
          <fpage>81</fpage>
          -91.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Korneev</surname>
            <given-names>N.V.</given-names>
          </string-name>
          <article-title>Intelligent complex security management system FEC for the Industry 5.0</article-title>
          . IOP Conference Series: Materials Science and Engineering. Ser. Advanced Problems of Electrotechnology,
          <year>2020</year>
          . P. 012016. DOI:
          <volume>10</volume>
          .1088/
          <fpage>1757</fpage>
          -899X/950/1/012016.
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <surname>Markov</surname>
            <given-names>A.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Timofeev</surname>
            <given-names>Y.A.</given-names>
          </string-name>
          <article-title>Industry 4.0 Cybersecurity Standards by the Example of Germany and Russia</article-title>
          .
          <source>In CEUR Workshop Proceedings</source>
          ,
          <source>2021 (Information Systems and Technologies in Modeling and Control</source>
          , ISTMC'
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <surname>Zegzhda</surname>
            <given-names>D.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vasilev</surname>
            <given-names>Y.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Poltavtseva</surname>
            <given-names>M.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kefeli</surname>
            <given-names>I.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Borovkov</surname>
            <given-names>A.I.</given-names>
          </string-name>
          <article-title>Advanced production technologies security in the era of digital transformation</article-title>
          .
          <source>Voprosy kiberbezopasnosti [Cybersecurity issues]</source>
          ,
          <year>2018</year>
          , N
          <volume>2</volume>
          (
          <issue>26</issue>
          ). P. 2-
          <fpage>15</fpage>
          . DOI:
          <volume>10</volume>
          .21681/
          <fpage>2311</fpage>
          -3456-2018-2-2-
          <lpage>15</lpage>
          . (In Russ.)
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>D.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Jiang</surname>
          </string-name>
          , and S. Zheng, '
          <article-title>'A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks</article-title>
          ,'' IEEE Access, vol.
          <volume>6</volume>
          , pp.
          <fpage>38303</fpage>
          -
          <lpage>38314</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Gao</surname>
          </string-name>
          , Y. U. Liu,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Jin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Chen</surname>
          </string-name>
          , and H. Wu, '
          <article-title>'A Novel Semi-Supervised Learning Approach for Network Intrusion Detection on Cloud-Based Robotic System</article-title>
          ,'' IEEE Access, vol.
          <volume>6</volume>
          , pp.
          <fpage>50927</fpage>
          -
          <lpage>50938</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Ma</surname>
          </string-name>
          , L.
          <string-name>
            <surname>Wu</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          <string-name>
            <surname>Gu</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>He</surname>
            , and
            <given-names>Z.</given-names>
          </string-name>
          <string-name>
            <surname>Yang</surname>
          </string-name>
          , '
          <article-title>'A Secure Face-Verification Scheme Based on Homomorphic Encryption and Deep Neural Networks</article-title>
          ,'' vol.
          <volume>5</volume>
          , no.
          <issue>1</issue>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>L.</given-names>
            <surname>Fernandez Maimo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. L. Perales</given-names>
            <surname>Gomez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. J. Garcia</given-names>
            <surname>Clemente</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. Gil</given-names>
            <surname>Perez</surname>
          </string-name>
          , and G. Martinez
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <surname>Perez</surname>
          </string-name>
          , '
          <article-title>'A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks,'' IEEE Access</article-title>
          , vol.
          <volume>6</volume>
          , pp.
          <fpage>7700</fpage>
          -
          <lpage>7712</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Tang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Ding</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Yang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K.</given-names>
            <surname>Li</surname>
          </string-name>
          , '
          <article-title>'A self-adaptive bell-lapadula model based on model training with historical access logs</article-title>
          ,
          <source>'' IEEE Trans. Inf</source>
          . Forensics Secur., vol.
          <volume>13</volume>
          , no.
          <issue>8</issue>
          , pp.
          <fpage>2047</fpage>
          -
          <lpage>2061</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Javed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. Ben</given-names>
            <surname>Hamida</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Al-fuqaha, and
          <string-name>
            <given-names>B.</given-names>
            <surname>Bhargava</surname>
          </string-name>
          , '
          <article-title>'Adaptive Security for Intelligent Transport System Applications</article-title>
          ,'' IEEE Intell.
          <source>Transp. Syst. Mag.</source>
          , vol.
          <volume>10</volume>
          , no.
          <source>April</source>
          , pp.
          <fpage>110</fpage>
          -
          <lpage>120</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>K.</given-names>
            <surname>Khanna</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. K.</given-names>
            <surname>Panigrahi</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Joshi</surname>
          </string-name>
          , '
          <article-title>'AI-based approach to identify compromised meters in data integrity attacks on smart grid</article-title>
          ,''
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>N.</given-names>
            <surname>Nissim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Cohen</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Elovici</surname>
          </string-name>
          , ''ALDOCX:
          <article-title>Detection of Unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New Structural Feature Extraction Methodology</article-title>
          ,''
          <source>IEEE Trans. Inf</source>
          . Forensics Secur., vol.
          <volume>12</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>631</fpage>
          -
          <lpage>646</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>H.</given-names>
            <surname>Sedjelmaci</surname>
          </string-name>
          and
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Senouci</surname>
          </string-name>
          , '
          <article-title>'An Accurate Security Game for Low-Resource IoT Devices</article-title>
          ,'' vol.
          <volume>66</volume>
          , no.
          <issue>10</issue>
          , pp.
          <fpage>9381</fpage>
          -
          <lpage>9393</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Du</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Q.</given-names>
            <surname>Li</surname>
          </string-name>
          , '
          <article-title>'An android malware detection approach using community structures of weighted function call graphs</article-title>
          ,'' IEEE Access, vol.
          <volume>5</volume>
          , pp.
          <fpage>17478</fpage>
          -
          <lpage>17486</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>L.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Bai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Hou</surname>
          </string-name>
          , and
          <string-name>
            <given-names>X.</given-names>
            <surname>Chen</surname>
          </string-name>
          , '
          <article-title>'An Effective Two-Step Intrusion Detection Approach Based on Binary Classification and k -NN</article-title>
          ,'' IEEE Access, vol.
          <volume>6</volume>
          , pp.
          <fpage>12060</fpage>
          -
          <lpage>12073</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [40]
          <string-name>
            <given-names>A.</given-names>
            <surname>Sahi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Lai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. A. N.</given-names>
            <surname>Li</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Diykh</surname>
          </string-name>
          , '
          <article-title>'An Efficient DDoS TCP Flood Attack Detection and Prevention System in a Cloud Environment</article-title>
          ,'' IEEE Access, vol.
          <volume>5</volume>
          , pp.
          <fpage>6036</fpage>
          -
          <lpage>6048</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [41]
          <string-name>
            <given-names>A. L. I. S.</given-names>
            <surname>Sadiq</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Alkazemi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Mirjalili</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Ahmed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <surname>and I. Ali</surname>
          </string-name>
          , '
          <article-title>'An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs,'</article-title>
          ' IEEE Access, vol.
          <volume>6</volume>
          , pp.
          <fpage>29041</fpage>
          -
          <lpage>29053</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [42]
          <string-name>
            <given-names>K.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Xiong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Member</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Qin</surname>
          </string-name>
          , '
          <article-title>'An Efficient Intrusion Detection Approach for Visual Sensor Networks Based on Traffic Pattern Learning</article-title>
          ,'' vol.
          <volume>47</volume>
          , no.
          <issue>10</issue>
          , pp.
          <fpage>2704</fpage>
          -
          <lpage>2713</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          [43]
          <string-name>
            <given-names>S.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Bi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Miao</surname>
          </string-name>
          , J. Liu, and
          <string-name>
            <given-names>C.</given-names>
            <surname>Tang</surname>
          </string-name>
          , '
          <article-title>'An improved information security risk assessments method for cyber-physical-social computing and networking</article-title>
          ,'' IEEE Access, vol.
          <volume>6</volume>
          , pp.
          <fpage>10311</fpage>
          -
          <lpage>10319</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          [44]
          <string-name>
            <given-names>P.</given-names>
            <surname>Tao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z. H. E.</given-names>
            <surname>Sun</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Z.</given-names>
            <surname>Sun</surname>
          </string-name>
          , '
          <article-title>'An Improved Intrusion Detection Algorithm Based on GA</article-title>
          and SVM,'' IEEE Access, vol.
          <volume>6</volume>
          , pp.
          <fpage>13624</fpage>
          -
          <lpage>13631</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          [45]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Qin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Guan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Jiang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Wang</surname>
          </string-name>
          , '
          <article-title>'An integrated method for anomaly detection from massive system logs</article-title>
          ,
          <source>'' IEEE Access</source>
          , vol.
          <volume>6</volume>
          , pp.
          <fpage>30602</fpage>
          -
          <lpage>30611</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          [46]
          <string-name>
            <given-names>H.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Chen</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H. V.</given-names>
            <surname>Poor</surname>
          </string-name>
          , ''
          <string-name>
            <given-names>Authenticating</given-names>
            <surname>Users Through FineGrained Channel Information</surname>
          </string-name>
          ,''
          <source>IEEE Trans. Mob. Comput.</source>
          , vol.
          <volume>17</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>251</fpage>
          -
          <lpage>264</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          [47]
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Parwez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. B.</given-names>
            <surname>Rawat</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Garuba</surname>
          </string-name>
          , '
          <article-title>'Big data analytics for user-activity analysis and useranomaly detection in mobile wireless network,''</article-title>
          <source>IEEE Trans. Ind. Informatics</source>
          , vol.
          <volume>13</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>2058</fpage>
          -
          <lpage>2065</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          [48]
          <string-name>
            <given-names>G.</given-names>
            <surname>Loukas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Vuong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Heartfield</surname>
          </string-name>
          , G. Sakellari,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yoon</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.</given-names>
            <surname>Gan</surname>
          </string-name>
          , '
          <article-title>'Cloud-Based CyberPhysical Intrusion Detection for Vehicles Using Deep Learning</article-title>
          ,'' IEEE Access, vol.
          <volume>6</volume>
          , pp.
          <fpage>3491</fpage>
          -
          <lpage>3508</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          [49]
          <string-name>
            <given-names>L.</given-names>
            <surname>Xiao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Member</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Du</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Member</surname>
          </string-name>
          , '
          <article-title>'Cloud-Based Malware Detection Game for Mobile Devices with Offloading,'</article-title>
          ' vol.
          <volume>16</volume>
          , no.
          <issue>10</issue>
          , pp.
          <fpage>2742</fpage>
          -
          <lpage>2750</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          [50]
          <string-name>
            <given-names>M. N.</given-names>
            <surname>Napiah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. Y. I. Bin</given-names>
            <surname>Idris</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Ramli</surname>
          </string-name>
          ,
          <string-name>
            <surname>and I. Ahmedy</surname>
          </string-name>
          , '
          <article-title>'Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol</article-title>
          ,'' IEEE Access, vol.
          <volume>6</volume>
          , pp.
          <fpage>16623</fpage>
          -
          <lpage>16638</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>