Adadi, A., & Berrada, M. (2018). Peeking Inside the Black-Box: A Survey on Explainable Artificial Intelligence (XAI). IEEE Access, 6, 52138-52160.
Akter, S., & Wamba, S. F. (2019). Big data and disaster management: a systematic review and agenda for future research. Annals of Operations Research, 283(1-2), 939-959.
Bhuyan, M. H., Bhattacharyya, D. K., & Kalita, J. K. (2020). Network anomaly detection: methods, systems, and tools. IEEE Communications Surveys & Tutorials, 21(1), 640-665.
Biamonte, J., Wittek, P., Pancotti, N., Rebentrost, P., Wiebe, N., & Lloyd, S. (2017). Quantum machine learning. Nature, 549(7671), 195-202.
Biggio, B., & Roli, F. (2018). Wild patterns: Ten years after the rise of adversarial machine learning. Pattern Recognition, 84, 317-331.
Borgaonkar, R., Park, J., Shaik, A., & Seifert, J. P. (2018). White-Stingray: Evaluating IMSI Catchers Detection Applications. In Black Hat USA.
Brundage, M., Avin, S., Clark, J., Toner, H., Eckersley, P., Garfinkel, B., ... & Anderson, H. (2018). The malicious use of artificial intelligence: Forecasting, prevention, and mitigation. arXiv preprint arXiv:1802.07228.
Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-1176.
Carlini, N., Liu, C., Erlingsson, Ú., Kos, J., & Song, D. (2019). The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks. In 28th USENIX Security Symposium (USENIX Security 19).
Chen, H., Chiang, R. H., & Storey, V. C. (2018). Business Intelligence and Analytics: From Big Data to Big Impact. MIS Quarterly, 36(4).
Chen, M., Mao, S., & Liu, Y. (2014). Big data: A survey. Mobile Networks and Applications, 19(2), 171-209.
Dwork, C., & Roth, A. (2014). The Algorithmic Foundations of Differential Privacy. Foundations and Trends in Theoretical Computer Science, 9(3-4), 211-407.
Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep learning. MIT Press.
Kim, J., Kim, J., Thu, H. L. T., & Kim, H. (2016). Long short term memory recurrent neural network classifier for intrusion detection. In 2016 International Conference on Platform Technology and Service (PlatCon) (pp. 1-5). IEEE.
Kolias, C., Kambourakis, G., Stavrou, A., & Voas, J. (2017). DDoS in the IoT: Mirai and other botnets. Computer, 50(7), 80-84.
Kolosnjaji, B., Zarras, A., Webster, G., & Eckert, C. (2018). Deep learning for classification of malware system call sequences. In Australasian Joint Conference on Artificial Intelligence (pp. 137-149). Springer, Cham.
Ribeiro, M. T., Singh, S., & Guestrin, C. (2016). \"Why should I trust you?\" Explaining the predictions of any classifier. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 1135-1144).
Russell, S., & Norvig, P. (2016). Artificial intelligence: a modern approach. Malaysia; Pearson Education Limited.
Sahoo, D., Liu, C., & Hoi, S. C. H. (2017). Malicious URL detection using machine learning: A survey. arXiv preprint arXiv:1701.07179.
Sahoo, D., Liu, C., & Wang, C. (2017). Unsupervised learning for robust detection of anomalous behavior in large-scale network traffic. In 2017 IEEE Conference on Dependable and Secure Computing (pp. 279-286). IEEE.
Sharma, B. K., & Chen, K. (2019). Emerging Cyber Threats and Security Measures in the Era of New Technologies: Big Data, Cloud Computing, Internet of Things, and Social Media. In Advanced Methodologies and Technologies in Network Architecture, Mobile Computing, and Data Analytics (pp. 1979-1997). IGI Global.
Silva, C., Croda, P., Abe, V., & Jino, M. (2020). A systematic literature review of automated incident response in the context of cyber threat intelligence. Computers & Security, 91, 101690.
Tang, B., He, H., Baggenstoss, P. M., & Kay, S. (2016). A Bayesian classification approach using class-specific features for text categorisation. IEEE Transactions on Knowledge and Data Engineering, 28(6), 1602-1606.
Xu, W., Evans, D., & Qi, Y. (2019). Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks. In Proceedings of the 2018 Network and Distributed Systems Symposium.
Zhou, M., Zhang, R., Xie, W., Qian, W., & Zhou, A. (2018). Security and privacy in cloud computing: A survey. In Semantics in Mobile, Pervasive, and Ubiquitous Computing (pp. 105-127). Springer, Berlin, Heidelberg.