<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>AI-Driven Defense-in-Depth: A Systematic Review of SOC Maturity Models and DDoS Mitigation</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>George Antoniou</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Lynn University</institution>
          ,
          <addr-line>Boca Raton, Florida 33431</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The growing sophistication of distributed denial-of-service (DDoS) attacks poses persistent challenges to security operations centers (SOCs). This paper presents a structured, evidence-based framework for integrating artificial intelligence (AI) into layered cyber defenses. Through systematic literature review and mapping of peer-reviewed intrusion detection techniques, we examine the applicability of ensemble learning, explainable AI (XAI), and federated learning across the defense-in-depth spectrum. We also propose an AI-maturity roadmap grounded in ENISA and NIST frameworks to guide phased SOC integration. Our findings support strategic AI deployment for improved detection accuracy, reduced triage time, and enhanced operational resilience against large-scale DDoS campaigns</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;DDoS</kwd>
        <kwd>defense-in-depth</kwd>
        <kwd>artificial intelligence</kwd>
        <kwd>SOC maturity</kwd>
        <kwd>XAI</kwd>
        <kwd>cybersecurity roadmap 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Distributed Denial-of-Service (DDoS) attacks remain a critical cybersecurity challenge, frequently
targeting national infrastructure, enterprise networks, and public-facing systems. These attacks
disrupt availability, overwhelm detection systems, and expose operational gaps in many security
operations centers (SOCs). While perimeter-based defenses and reactive mitigation techniques have
improved in speed and scale, attackers have likewise evolved, leveraging low-and-slow volumetric
traffic, botnets, and encrypted payloads to evade traditional controls.</p>
      <p>
        In mid-2022, the Albanian government experienced one of the most impactful
nation-statesponsored DDoS attacks in Europe. Key online portals, digital identity systems, and e-governance
platforms were rendered inoperable. Although mitigation strategies succeeded in halting peak traffic
volumes, post-incident analysis by CESK [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] and external vendors [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] revealed two major weaknesses:
delayed anomaly detection at the network layer and insufficient coordination between security layers,
highlighting the importance of layered defense, also known as defense-in-depth.
      </p>
      <p>These deficiencies emphasize a growing need to rethink SOC architecture through the lens of artificial
intelligence (AI). AI has demonstrated significant potential in augmenting anomaly detection,
reducing triage time, and supporting threat attribution, yet its deployment across SOC maturity levels
remains inconsistent.</p>
      <p>Moreover, existing research lacks comprehensive frameworks that align AI capabilities to
specific defense-in-depth layers, making operational integration ad hoc or siloed.</p>
      <p>This paper proposes a structured, AI-enhanced defense-in-depth framework. We build upon
validated techniques, including ensemble learning, explainable AI (XAI), and federated learning, to
map AI tools to each of the seven core security layers. In doing so, we aim to support both immediate
SOC performance improvement and long-term maturity planning.</p>
      <p>
        Drawing from a systematic review of literature and industry reports, we identify AI
techniques most commonly validated in DDoS detection and correlate them to real-world SOC
functions. Furthermore, we introduce an AI-maturity roadmap aligned with guidance from ENISA [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]
and NIST [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], offering a phased progression from experimental pilots to autonomous, self-healing
SOCs.
      </p>
      <p>The research is guided by three questions:
(1) How can validated AI models be aligned with state-level DDoS indicators?
(2) Which AI methods best support each layer of defense-in-depth?
(3) What performance gains are feasible based on published SOC benchmarks?</p>
    </sec>
    <sec id="sec-2">
      <title>2. Background and Real-World Catalyst</title>
      <sec id="sec-2-1">
        <title>2.1 The Albanian DDoS Campaign</title>
        <p>In July 2022, Albania experienced a coordinated cyberattack targeting its national e-governance
infrastructure. The campaign disabled multiple public-facing systems, including e-Albania (citizen
services), the TIMS border control platform, and public communications for several ministries.
Technical forensics and geopolitical analysis traced the origin to state-sponsored threat actors,
reportedly in response to political tensions and diplomatic decisions. The attack involved
highvolume HTTP floods and DNS reflection attacks distributed via botnets, primarily launched from
anonymized infrastructure and abused cloud services.</p>
        <p>
          Despite deploying external mitigation support and filtering capabilities, Albania’s internal
SOC structures struggled to detect the attack’s slow-burn indicators during its early stages. According
to CESK’s 2023 national threat bulletin [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ], lateral movement occurred between perimeter gateways
and internal data services undetected for several hours. Moreover, the lack of automation in
correlating indicators of compromise (IOCs) across endpoints, users, and data systems delayed
incident containment and public service restoration.
        </p>
        <p>These operational gaps demonstrated the need not just for stronger firewalls or endpoint
defenses, but for a more adaptive, layered approach capable of detecting and responding across
multiple security domains. The incident has since served as a regional wake-up call, prompting
renewed interest in scalable, intelligence-driven SOC frameworks, particularly those leveraging AI
for anomaly detection, behavior correlation, and strategic automation.</p>
        <sec id="sec-2-1-1">
          <title>2.1.1 Defense-In-Depth and AI Alignment</title>
          <p>Defense-in-depth is a foundational cybersecurity principle that emphasizes redundancy across
multiple, logically distinct layers of protection. Typical SOC architecture involves defenses at the
perimeter (e.g., firewalls), network layer (e.g., traffic analysis), endpoint (e.g., endpoint detection and
response- EDR), application (e.g., web application firewall- WAF), user (e.g., authentication), data
(e.g., encryption and access control), and increasingly, the cloud environment. While each of these
layers serves a specific role, cross-layer visibility and rapid triage remain critical weak points,
especially during fast-evolving campaigns like DDoS attacks.</p>
          <p>
            Emerging AI techniques offer new ways to strengthen these layers both individually and
collectively. Ensemble learning methods such as eXtreme Gradient Boosting (XGBoost) and random
forests (RF) have been validated for high-speed anomaly detection [
            <xref ref-type="bibr" rid="ref10">10</xref>
            ], while deep learning
techniques including long short-term memory (LSTM) and autoencoders are increasingly applied in
traffic inspection and endpoint telemetry [
            <xref ref-type="bibr" rid="ref14 ref16">14, 16</xref>
            ]. Explainable AI (XAI) frameworks like SHapley
Additive exPlanations (SHAP) and local interpretable model-agnostic explanations (LIME) reduce
analyst workload during triage by offering human-readable model reasoning [
            <xref ref-type="bibr" rid="ref11">11</xref>
            ], and federated
learning allows SOCs to collaborate on model refinement without compromising sensitive data [
            <xref ref-type="bibr" rid="ref12">12</xref>
            ].
          </p>
          <p>While these tools show promise in isolation, their systematic mapping to SOC layers and
maturity stages remains underdeveloped in both academic literature and industry implementation.
This study aims to fill that gap by presenting a structured mapping of AI techniques to
defense-indepth layers and introducing a scalable AI-Maturity Roadmap tailored for SOC evolution.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Related Work</title>
      <p>
        The intersection of artificial intelligence and cybersecurity has been widely explored over the last
decade, with a surge of interest in using machine learning (ML) and deep learning (DL) models for
intrusion detection, traffic classification, and threat hunting. Traditional supervised models such as
Decision Trees, Support Vector Machines (SVMs), and ensemble methods like Random Forests and
eXtreme Gradient Boosting (XGBoost) have demonstrated high detection accuracy on structured
datasets [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Unsupervised approaches, including clustering and autoencoders, have proven effective
for anomaly detection, especially in encrypted or imbalanced data environments [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. More recent
advances include Graph Neural Networks (GNNs), used for correlating signals across entities like
hosts, users, and devices [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>
        In parallel, the field of DDoS mitigation has seen the adoption of AI-based approaches for
traffic profiling and early warning. LeCun et al. [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] outlined the advantages of long short-term
memory (LSTM)-based neural networks for sequential traffic analysis, which has been applied to
detect slow-burn DDoS attacks. Other studies have highlighted hybrid approaches, combining
statistical baselines with AI to flag zero-day anomalies and protocol abuses. However, many of these
implementations are evaluated in isolation—on public datasets or simulations—rather than mapped
to actual SOC roles or operational maturity stages.
      </p>
      <p>
        Explainable AI (XAI) methods such as SHAP and LIME have emerged to address the
interpretability gap between complex models and human analysts. Ribeiro et al. [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] demonstrated
how XAI frameworks can reduce triage time by helping analysts understand the rationale behind
predictions. Still, few papers examine how XAI scales within SOC workflows or how it aligns with
layered defense strategies in real-world incident response.
      </p>
      <p>
        On the organizational side, both ENISA and NIST have introduced AI-related maturity
frameworks, though they are largely generic and policy-focused [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. ENISA’s SOC-CMM highlights
capability maturity dimensions such as automation and threat intelligence sharing, while NIST’s AI
RMF offers guidelines on managing AI risk in critical infrastructure. However, there is limited
operational guidance on how specific AI techniques map onto these maturity stages—particularly in
SOC environments managing DDoS threats.
      </p>
      <p>In summary, while literature offers a rich pool of validated AI techniques for specific cybersecurity
functions, it lacks integrative studies that:
• Map these techniques to the full spectrum of defense-in-depth layers
•
•</p>
      <p>Align them with SOC maturity models grounded in real-world case studies</p>
      <p>Benchmark performance gains or operational impact using published SOC metrics
This paper contributes to filling that gap through structured synthesis, mapping, and roadmap
design, all contextualized by the Albania case and grounded in peer-reviewed evidence.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Methodology and Research Questions</title>
      <sec id="sec-4-1">
        <title>4.1 Scope and Methodology Note</title>
        <p>
          This study uses a structured literature synthesis guided by the PRISMA 2020 framework [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] approach,
guided by principles from evidence-based cybersecurity research. The goal is not to introduce novel
AI models or conduct live experimentation, but to systematically evaluate and map existing AI
techniques to a layered defense structures and SOC maturity stages. Our methodological design is
informed by the PRISMA framework for structured evidence review and enhanced with conceptual
benchmarking drawn from published SOC metrics and DDoS reports.
        </p>
        <p>Sources were selected using keyword-based queries across multiple peer-reviewed databases
including IEEE Xplore, SpringerLink, and ACM Digital Library, Google Scholar, Scopus, as well as
validated practitioner repositories (e.g., ENISA, NIST, CESK). Inclusion criteria focused on (a) AI
models empirically validated for cybersecurity detection or triage, (b) alignment with operational SOC
environments, and (c) relevance to layered defense constructs. Studies published between 2018–2024
were prioritized to reflect recent advances in explainable AI, federated learning, and SOC automation.</p>
        <p>
          We adopted a thematic coding approach to extract key attributes from each source, including
the defense layer addressed, the AI method used, evaluation metrics, and maturity alignment. A
bespoke mapping table (Table 1) was then constructed to visualize these relationships. Additionally,
published performance metrics were reviewed from real-world DDoS campaigns, including the
Albania case [
          <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
          ], to conceptually benchmark expected gains from AI-enhanced defense models.
        </p>
        <p>The study does not attempt to reproduce or evaluate detection models experimentally.
Instead, its goal is to provide a synthesis and framework useful for SOC architects, policy designers,
and researchers seeking to operationalize AI across defense-in-depth environments.</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2 Research Questions</title>
        <p>The study is organized around three primary research questions:</p>
        <p>RQ1: How can validated AI models be mapped to the types of Indicators of Compromise
(IOCs) observed during nation-state DDoS attacks such as the one affecting Albania in 2022?
RQ2: Which AI techniques correspond most effectively with the seven canonical layers of
defense-in-depth, and how are they best operationalized within a SOC context?
RQ3: Based on published case metrics, what performance improvements—such as detection
latency, triage speed, and attack containment—can AI-enhanced SOCs achieve relative to
traditional layered defenses?</p>
        <p>Together, these questions aim to bridge a gap in existing cybersecurity literature by
connecting validated AI methods to practical SOC implementation stages. The answers inform both
the AI-to-layer mapping table, and the maturity roadmap proposed in Section 5.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Results and Conceptual Mapping</title>
      <sec id="sec-5-1">
        <title>5.1 AI Techniques to Defense-In-Depth Layers</title>
        <p>
          Table 1 presents a structured mapping of AI techniques to the seven core layers of defense-in-depth:
perimeter, network, endpoint, application, user, data, and cloud. Each entry includes the technique’s
primary use case and supporting peer-reviewed references. The table synthesizes insights from over
60 reviewed sources and aligns with ENISA’s defense layering model [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] and NIST AI guidance [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ].
        </p>
        <p>Table 1 – AI Techniques Mapped to Defense-in-Depth Layers
Defense Layer Relevant AI Primary Use Case Supporting</p>
        <p>
          Technique(s) References
Perimeter Rule-Based [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]
        </p>
        <p>Detection, XGBoost
Network
Endpoint
Application
User
Data
Cloud</p>
        <p>LSTM, Random
Forest,
Autoencoders
GNN, Federated
Learning
Signature Learning,
NLP
Behavioral
Biometrics,
Anomaly Detection
Data Labeling
Algorithms,
Privacy-Preserving
AI
Federated Learning,
Cloud-Native AI
Agents</p>
        <p>Traffic filtering
and basic anomaly
detection
Deep packet
inspection, lateral
movement
detection
Host-based event
correlation, device
profiling
Code injection and
API abuse
prevention
Access control and
behavior deviation
Data integrity and
leakage prevention
Multi-tenant
anomaly detection</p>
        <p>Importantly, this layered mapping supports not only technical integration, but also roadmap
design, maturity assessment, and policy planning for AI-enhanced SOC development.</p>
      </sec>
      <sec id="sec-5-2">
        <title>5.2 AI-Maturity Roadmap</title>
        <p>
          While individual AI techniques offer tactical benefits, their strategic deployment across an SOC
lifecycle requires a maturity model. Figure 1 presents the proposed AI-Maturity Roadmap for SOCs,
developed from a synthesis of ENISA’s SOC Capability Maturity Model (SOC-CMM) [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ], the NIST AI
Risk Management Framework [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ], and published case studies.
        </p>
        <p>Figure 1 visualizes the phased maturity progression from isolated AI pilots to autonomous,
self-healing SOC operations. Each tier builds upon the previous, incorporating explainability (XAI),
collaborative governance, and automated retraining. The model aligns with ENISA's SOC capability
maturity model and the NIST AI Risk Management Framework.
The roadmap consists of four tiers:
• Tier 1 – Ad Hoc Pilots: Isolated deployment of AI tools in non-critical environments
without operational feedback loops</p>
        <p>Tier 2 – Integrated Detection and XAI: Incorporation of explainable AI for analyst
triage and correlation within specific SOC functions
Tier 3 – Federated Collaboration: Cross-organizational AI refinement using
federated learning and shared models across regional or sectoral SOCs</p>
      </sec>
      <sec id="sec-5-3">
        <title>Tier 4 – Autonomous, Self-Healing SOC: AI not only detects and responds but</title>
        <p>also adapts models in real-time with minimal human interventionEach tier builds on
the last, moving from technical experimentation to full operational AI governance.
This roadmap is intended to guide both public and private sector SOCs in aligning
internal capabilities with external threat landscapes.</p>
        <sec id="sec-5-3-1">
          <title>5.3 Benchmarking AI vs Traditional SOC Metrics</title>
          <p>
            To evaluate the conceptual effectiveness of AI-enhanced SOC models, we conducted a
benchmarking synthesis using published DDoS incident metrics (e.g., Albania, NETSCOUT data [
            <xref ref-type="bibr" rid="ref4">4</xref>
            ])
compared with performance indicators from AI-based SOC research. While no live testing was
conducted, the review showed that AI-enhanced models consistently outperform rule-based
approaches in key areas:
• Detection Latency: Reduced from ~300–500ms in traditional systems to under 50ms in some
          </p>
          <p>
            AI-optimized SOCs using ensemble learning [
            <xref ref-type="bibr" rid="ref10">10</xref>
            ]
•
•
          </p>
          <p>
            Triage Time: XAI tools reduced average analyst triage time by 20–25% in trials involving
SHAP and LIME [
            <xref ref-type="bibr" rid="ref11">11</xref>
            ] and broader reviews on explainable AI in SOC environments [
            <xref ref-type="bibr" rid="ref7">7</xref>
            ]
Anomaly Identification Rate: Deep learning models improved detection of novel DDoS
flows by 15–30% on average [
            <xref ref-type="bibr" rid="ref9">9</xref>
            ][
            <xref ref-type="bibr" rid="ref13">13</xref>
            ]
          </p>
          <p>These results suggest that aligning AI methods to defense-in-depth layers not only improves
localized detection but also enhances organizational resilience across SOC tiers.</p>
        </sec>
      </sec>
      <sec id="sec-5-4">
        <title>6. Future Work and Policy Implications</title>
        <p>While this study presents a structured roadmap for aligning AI techniques with SOC operations,
several limitations and opportunities for future exploration remain. First, the analysis is based on
published models and documented SOC case studies. No new datasets or live experimentation were
conducted. As such, future work should involve real-world validation through controlled pilot
deployments and quantitative performance tracking across multiple SOC tiers.</p>
        <p>
          One promising direction involves regionally distributed pilots—particularly among Balkan
national and municipal SOCs. These environments are uniquely positioned to benefit from
AIenhanced defense frameworks due to shared threat landscapes, language constraints, and varying
maturity levels. Coordinated implementations across these networks could serve as real-world
testbeds for validating the AI-Maturity Roadmap proposed in this study, especially in low-resource
settings with minimal automation. Such efforts would also align with ENISA’s emphasis on regional
capability building [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] and support the cross-border resilience strategies outlined by the European
Union Agency for Cybersecurity.
        </p>
        <p>In terms of technical development, future studies should address known risks in AI
deployment, including adversarial poisoning (e.g., during federated learning), model drift, and
explainability trade-offs. While XAI tools like SHAP and LIME provide interpretability, they often
introduce additional latency or require expert supervision. Balancing these trade-offs will be crucial
in achieving Tier 3 and Tier 4 SOC capabilities without overwhelming existing analyst teams.</p>
        <p>
          Another challenge involves the integration of AI into SOC governance structures. As
organizations scale toward Tier 3 (federated collaboration) and Tier 4 (autonomous response),
questions around legal liability, explainability compliance, and workforce readiness will become more
pressing. These policy dimensions, especially those involving GDPR compliance, NIST AI fairness
principles [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ], and operational transparency—should be treated as integral to AI maturity, not
peripheral.
        </p>
        <p>Finally, future work could explore extending the current roadmap to other domains beyond
DDoS mitigation, such as ransomware detection, insider threat prediction, and incident postmortem
analysis. The layered AI approach proposed in this study is generalizable and may offer similar
performance and resilience benefits when applied to broader cyber-defense contexts.</p>
      </sec>
      <sec id="sec-5-5">
        <title>7. Conclusion</title>
        <p>As DDoS attacks continue to evolve in scale, complexity, and geopolitical significance, traditional
security operations center (SOC) architectures must adapt to more intelligently defend against and
recover from such campaigns. This paper contributes to that transition by proposing a structured
framework that aligns validated AI techniques with defense-in-depth layers, contextualized through
a real-world case and grounded in peer-reviewed research.</p>
        <p>Through systematic literature synthesis, we identified AI methods—such as ensemble
classifiers, deep learning, explainable AI (XAI), and federated learning—demonstrated to improve
detection accuracy, triage speed, and anomaly recognition. These techniques were then mapped to
their most appropriate SOC defense layers based on operational use cases, forming the basis of Table
1. To further support implementation, we proposed a four-tier AI-Maturity Roadmap for SOCs,
drawing from ENISA’s capability maturity model and NIST’s AI governance guidance. This roadmap
outlines a progression from ad hoc AI pilots to autonomous, self-healing SOCs and is illustrated in
Figure 1.</p>
        <p>The study also benchmarked reported performance gains from AI-enhanced SOC
deployments, showing measurable advantages in detection latency, triage efficiency, and anomaly
identification. Although the results are conceptual rather than experimental, they offer useful
indicators for future deployment planning, especially in regions like the Balkans where SOC maturity
is uneven and threat exposure is growing.</p>
        <p>In summary, this research bridges a critical gap in cybersecurity literature by connecting
theoretical AI models to operational security strategies. By mapping capabilities across layers and
maturity stages, it enables SOCs, policymakers, and researchers to plan, justify, and scale AI
deployment in a structured, evidence-informed manner. Future efforts should focus on validating the
roadmap through cross-national pilot deployments, addressing technical risks, and embedding AI
more deeply into SOC governance and strategic planning.</p>
      </sec>
      <sec id="sec-5-6">
        <title>Declaration on Generative AI</title>
        <p>During the preparation of this work, the author(s) used Chat-GPT-4, Turnitin and Grammarly in order
to: Grammar and spelling check. Further, the author(s) used Creately in order to: Generate images.
After using these tool(s)/service(s), the author(s) reviewed and edited the content as needed and
take(s) full responsibility for the publication’s content.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>ENISA.</surname>
          </string-name>
          <article-title>AI in Cybersecurity: Good Practices and Regulatory Implications</article-title>
          .
          <source>European Union Agency for Cybersecurity</source>
          ,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <source>[2] NIST. Artificial Intelligence Risk Management Framework (AI RMF 1.0)</source>
          .
          <source>National Institute of Standards and Technology</source>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <source>[3] CESK. Annual Threat Report - Albania. National Authority for Electronic Certification and Cybersecurity</source>
          ,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>NETSCOUT. Threat</given-names>
            <surname>Intelligence</surname>
          </string-name>
          <article-title>Report: DDoS in 2022</article-title>
          .
          <article-title>NETSCOUT Systems Inc</article-title>
          .,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Page</surname>
            ,
            <given-names>M. J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McKenzie</surname>
            ,
            <given-names>J. E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bossuyt</surname>
            ,
            <given-names>P. M.</given-names>
          </string-name>
          , et al. (
          <year>2021</year>
          ).
          <article-title>The PRISMA 2020 statement: An updated guideline for reporting systematic reviews</article-title>
          .
          <source>BMJ</source>
          ,
          <volume>372</volume>
          , n71. https://doi.org/10.1136/bmj.n71
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Moustafa</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Slay</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2015</year>
          ).
          <article-title>UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set</article-title>
          ).
          <source>2015 Military Communications and Information Systems Conference (MilCIS)</source>
          , IEEE. https://doi.org/10.1109/MilCIS.
          <year>2015</year>
          .7348942
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Tjoa</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shanmugam</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Azam</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>Explainable artificial intelligence for cybersecurity: A review and future research directions</article-title>
          .
          <source>Computers &amp; Security</source>
          ,
          <volume>110</volume>
          , 102413. https://doi.org/10.1016/j.cose.
          <year>2021</year>
          .102413
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Strom</surname>
            ,
            <given-names>B. E.</given-names>
          </string-name>
          , et al. (
          <year>2018</year>
          ).
          <article-title>MITRE ATT&amp;CK: Design and Philosophy</article-title>
          . MITRE Corporation. https://attack.mitre.org/docs/ATTACK_Design_and_Philosophy_March_
          <year>2018</year>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>LeCun</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bengio</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Hinton</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          (
          <year>2015</year>
          ).
          <article-title>Deep learning</article-title>
          .
          <source>Nature</source>
          ,
          <volume>521</volume>
          (
          <issue>7553</issue>
          ),
          <fpage>436</fpage>
          -
          <lpage>444</lpage>
          . https://doi.org/10.1038/nature14539
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Breiman</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          (
          <year>2001</year>
          ).
          <source>Random Forests. Machine Learning</source>
          ,
          <volume>45</volume>
          (
          <issue>1</issue>
          ),
          <fpage>5</fpage>
          -
          <lpage>32</lpage>
          . https://doi.org/10.1023/A:1010933404324
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Ribeiro</surname>
            ,
            <given-names>M. T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Guestrin</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          (
          <year>2016</year>
          ).
          <article-title>Why Should I Trust You?: Explaining the Predictions of Any Classifier</article-title>
          .
          <source>Proceedings of the 22nd ACM SIGKDD</source>
          ,
          <volume>1135</volume>
          -
          <fpage>1144</fpage>
          . https://doi.org/10.1145/2939672.2939778
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Kairouz</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          , et al. (
          <year>2021</year>
          ).
          <article-title>Advances and Open Problems in Federated Learning</article-title>
          .
          <source>Foundations and Trends® in Machine Learning</source>
          ,
          <volume>14</volume>
          (
          <issue>1</issue>
          ),
          <fpage>1</fpage>
          -
          <lpage>210</lpage>
          . https://doi.org/10.1561/2200000083
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Biggio</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Roli</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>Wild patterns: Ten years after the rise of adversarial machine learning</article-title>
          .
          <source>Pattern Recognition</source>
          ,
          <volume>84</volume>
          ,
          <fpage>317</fpage>
          -
          <lpage>331</lpage>
          . https://doi.org/10.1016/j.patcog.
          <year>2018</year>
          .
          <volume>07</volume>
          .023
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          (
          <year>2023</year>
          ).
          <article-title>Applying reinforcement learning for enhanced cybersecurity: A deep RL framework in adversarial cyber-attack simulation</article-title>
          .
          <source>Sensors</source>
          ,
          <volume>23</volume>
          (
          <issue>6</issue>
          ), 3000. https://doi.org/10.3390/s23063000
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Wu</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pan</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Long</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          , Zhang,
          <string-name>
            <given-names>C.</given-names>
            , &amp;
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <surname>P. S.</surname>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>A Comprehensive Survey on Graph Neural Networks</article-title>
          .
          <source>IEEE Transactions on Neural Networks and Learning Systems</source>
          ,
          <volume>32</volume>
          (
          <issue>1</issue>
          ),
          <fpage>4</fpage>
          -
          <lpage>24</lpage>
          . https://doi.org/10.1109/TNNLS.
          <year>2020</year>
          .2978386
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Chinnasamy</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Subramanian</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Easwaramoorthy</surname>
            ,
            <given-names>S. V.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Cho</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2025</year>
          ).
          <article-title>Deep learningdriven methods for network-based intrusion detection systems: A systematic review</article-title>
          .
          <source>ICT Express</source>
          ,
          <volume>11</volume>
          (
          <issue>1</issue>
          ),
          <fpage>181</fpage>
          -
          <lpage>215</lpage>
          . https://doi.org/10.1016/j.icte.
          <year>2025</year>
          .
          <volume>01</volume>
          .005
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>