|
Reference | Year | Detecting cyber threats | Predicting cyberattacks | Detecting key actors/community | Hacker behavior | Malicious attachment | Language variations | Machine learning optimization |
|
(Almukaynizi et al. 2017) [25] | 2017 | | ✓ | | | | | |
(Deliu et al. 2017) [44] | 2017 | ✓ | | | | | | ✓ |
(Grisham et al. 2017) [34] | 2017 | | | ✓ | | ✓ | ✓ | |
(Samtani et al. 2017) [33] | 2017 | | | ✓ | | ✓ | | |
(Sapienza et al. 2017) [24] | 2017 | ✓ | | | | | | |
(Almukaynizi et al. 2018) [26] | 2018 | ✓ | | | | | | |
(Biswas et al. 2018) [36] | 2018 | | | ✓ | ✓ | | | |
(Deb, lerman, and ferrara, 2018) [39] | 2018 | | ✓ | | ✓ | | | |
(Deliu et al. 2018) [45] | 2018 | ✓ | | | | | | ✓ |
(Dong et al. 2018) [54] | 2018 | ✓ | | | | | | |
(Ebrahimi et al. 2018) [51] | 2018 | ✓ | | | | | ✓ | |
(Marin et al. 2018) [55] | 2018 | | | ✓ | | | | |
(Marin et al. 2018) [38] | 2018 | | | | ✓ | | | |
(Marin et al. 2018) [37] | 2018 | | | ✓ | | | | |
(Narayanan et al. 2018) [28] | 2018 | | ✓ | | ✓ | | | |
(Nunes et al. 2018) [50] | 2018 | | ✓ | | | | ✓ | |
(Pastrana et al. 2018) [35] | 2018 | | | ✓ | ✓ | | | |
(Tavabi et al. 2018) [29] | 2018 | | ✓ | | | | | |
(Williams et al. 2018) [27] | 2018 | ✓ | | | ✓ | | | |
(Arnold et al. 2019) [30] | 2019 | ✓ | | ✓ | | | | |
(Johnsen and franke, 2019) [48] | 2019 | | ✓ | | | | | ✓ |
(Koloveas et al. 2019) [46] | 2019 | ✓ | | | | | | ✓ |
(Marin et al. 2019) [41] | 2019 | ✓ | | | ✓ | | | |
(Queiroz et al. 2019) [47] | 2019 | ✓ | | | | | | |
(Sarkar et al. 2019) [42] | 2019 | | ✓ | | | | | |
(Schäfer et al. 2019) [52] | 2019 | | ✓ | ✓ | | | ✓ | |
(Zenebe et al. 2019) [40] | 2019 | | ✓ | ✓ | | | | |
(Ampel et al. 2020) [31] | 2020 | ✓ | | | | ✓ | | |
(Ebrahimi et al. 2020) [49] | 2020 | ✓ | | | | | | |
(Ebrahimi et al. 2020) [53] | 2020 | ✓ | | | | | ✓ | |
(Huang et al. 2021) [43] | 2021 | | | ✓ | ✓ | | | |
(Koloveas et al. 2021) [32] | 2021 | ✓ | | | | | | |
|