|
| Reference | Year | Detecting cyber threats | Predicting cyberattacks | Detecting key actors/community | Hacker behavior | Malicious attachment | Language variations | Machine learning optimization |
|
| (Almukaynizi et al. 2017) [25] | 2017 | | ✓ | | | | | |
| (Deliu et al. 2017) [44] | 2017 | ✓ | | | | | | ✓ |
| (Grisham et al. 2017) [34] | 2017 | | | ✓ | | ✓ | ✓ | |
| (Samtani et al. 2017) [33] | 2017 | | | ✓ | | ✓ | | |
| (Sapienza et al. 2017) [24] | 2017 | ✓ | | | | | | |
| (Almukaynizi et al. 2018) [26] | 2018 | ✓ | | | | | | |
| (Biswas et al. 2018) [36] | 2018 | | | ✓ | ✓ | | | |
| (Deb, lerman, and ferrara, 2018) [39] | 2018 | | ✓ | | ✓ | | | |
| (Deliu et al. 2018) [45] | 2018 | ✓ | | | | | | ✓ |
| (Dong et al. 2018) [54] | 2018 | ✓ | | | | | | |
| (Ebrahimi et al. 2018) [51] | 2018 | ✓ | | | | | ✓ | |
| (Marin et al. 2018) [55] | 2018 | | | ✓ | | | | |
| (Marin et al. 2018) [38] | 2018 | | | | ✓ | | | |
| (Marin et al. 2018) [37] | 2018 | | | ✓ | | | | |
| (Narayanan et al. 2018) [28] | 2018 | | ✓ | | ✓ | | | |
| (Nunes et al. 2018) [50] | 2018 | | ✓ | | | | ✓ | |
| (Pastrana et al. 2018) [35] | 2018 | | | ✓ | ✓ | | | |
| (Tavabi et al. 2018) [29] | 2018 | | ✓ | | | | | |
| (Williams et al. 2018) [27] | 2018 | ✓ | | | ✓ | | | |
| (Arnold et al. 2019) [30] | 2019 | ✓ | | ✓ | | | | |
| (Johnsen and franke, 2019) [48] | 2019 | | ✓ | | | | | ✓ |
| (Koloveas et al. 2019) [46] | 2019 | ✓ | | | | | | ✓ |
| (Marin et al. 2019) [41] | 2019 | ✓ | | | ✓ | | | |
| (Queiroz et al. 2019) [47] | 2019 | ✓ | | | | | | |
| (Sarkar et al. 2019) [42] | 2019 | | ✓ | | | | | |
| (Schäfer et al. 2019) [52] | 2019 | | ✓ | ✓ | | | ✓ | |
| (Zenebe et al. 2019) [40] | 2019 | | ✓ | ✓ | | | | |
| (Ampel et al. 2020) [31] | 2020 | ✓ | | | | ✓ | | |
| (Ebrahimi et al. 2020) [49] | 2020 | ✓ | | | | | | |
| (Ebrahimi et al. 2020) [53] | 2020 | ✓ | | | | | ✓ | |
| (Huang et al. 2021) [43] | 2021 | | | ✓ | ✓ | | | |
| (Koloveas et al. 2021) [32] | 2021 | ✓ | | | | | | |
|