AI-driven Threat Intelligence For Real-Time Cybers
AI-driven Threat Intelligence For Real-Time Cybers
future directions
Kelvin Ovabor 1, Ismail Oluwatobiloba Sule-Odu 2, *, Travis Atkison 1, Adetutu Temitope Fabusoro 3 and Joseph
Oluwaseun Benedict 4
1 Computer Science, The University of Alabama, Tuscaloosa, Alabama, USA.
2 Computer Science, Maharishi International University (MIU), Fairfield, IA, USA.
3 Education Policy Organization and Leadership, University of Illinois, Urbana Champaign, IL, USA.
4 Information Security and Digital Forensics, University of East London, UK.
Open Access Research Journal of Science and Technology, 2024, 12(02), 040–048
Publication history: Received on 28 September 2024; revised on 06 November 2024; accepted on 09 November 2024
Abstract
AI-driven threat intelligence is transforming cybersecurity by enhancing real-time threat detection, analysis, and
response capabilities. This paper reviews state-of-the-art AI frameworks, machine learning models, and tools that
support threat intelligence, providing a survey of current research in the field and identifying challenges and future
directions for real-time cybersecurity. Techniques such as supervised and unsupervised learning, reinforcement
learning, and natural language processing (NLP) contribute to the robustness of threat detection, while evolving
frameworks and ethics guide AI implementation in security operations. By addressing the increasing sophistication of
cyber threats, AI-driven approaches aim to create a proactive, dynamic cybersecurity posture that can keep up with
evolving cyber adversaries.
1. Introduction
In today’s digital landscape, organizations face an unprecedented array of cyber threats. Traditional cybersecurity
defenses, largely reactive and manual, are insufficient in countering sophisticated attacks that continuously adapt to
bypass defenses [1, 2]. As a result, AI-driven threat intelligence has emerged as a vital strategy in cybersecurity [3],
leveraging machine learning, deep learning, and big data analysis to enable rapid, proactive responses to cyber threats
[4, 5]. This technology not only strengthens threat detection and prevention but also enables organizations to
understand and anticipate potential vulnerabilities.
AI-driven threat intelligence shifts the paradigm from detecting past-known threats to predicting new ones, enabling
organizations to preemptively address vulnerabilities and mitigate the impact of attacks. With these advancements [6],
AI is poised to become indispensable in cybersecurity, leading to faster, more accurate, and automated threat detection.
Addressing the Rise of Advanced Persistent Threats (APTs): APTs are a class of stealthy and continuous
hacking processes that target specific entities to gain intelligence over an extended period [7, 8]. Traditional
detection mechanisms are often too rigid to detect the subtle, long-term behavioral anomalies of APTs. AI-
driven models, however, can continuously learn and adapt, identifying deviations from established behavior
patterns indicative of APT activity [9].
Managing Volume and Diversity of Threat Data: Modern networks generate vast quantities of data from
devices, applications, and endpoints [10]. This complexity requires systems that can analyze diverse data types
(structured and unstructured) in real-time, a task AI is well-suited for with its ability to scale across multiple
data sources [11].
Overcoming the Limitations of Manual and Rule-based Approaches: Legacy systems typically rely on
manually created rules and static configurations that can be easily circumvented by new or evolving threats
[12, 13]. AI-driven systems use dynamic learning and pattern recognition, allowing cybersecurity measures to
adapt autonomously and proactively [13].
Examine AI frameworks and tools that support real-time threat intelligence in cybersecurity, evaluating their
effectiveness and applicability [14, 15].
Survey recent research trends on machine learning, deep learning, and NLP applications in threat detection,
prevention, and response [16].
Identify challenges and propose future directions that can guide improvements in AI-driven threat
intelligence systems, with attention to resilience, transparency, and ethical considerations [17].
Model Training on Labeled Threat Data: Supervised learning models learn from historical data by
associating specific inputs with known outcomes. This is particularly effective in identifying types of malware
or phishing attacks, where existing attack signatures are available [18, 19].
Applications in Malware and Phishing Detection: Techniques like decision trees, support vector machines
(SVMs), and neural networks are commonly used. For instance, neural networks can analyze a phishing email’s
content and sender information, learning to flag emails with suspicious characteristics based on prior examples
[20].
Clustering and Anomaly Detection: With unsupervised models, threat detection becomes more flexible, as
these models are not restricted to labeled datasets. For example, clustering algorithms identify outliers within
network traffic, helping detect patterns indicative of cyber-attacks [18, 21].
Semi-supervised Learning with Limited Labeled Data: Often, cybersecurity data lacks comprehensive
labeling. Semi-supervised learning allows models to learn from a small set of labeled data combined with a
larger volume of unlabeled data, thereby improving detection capabilities for unknown threats [22, 23].
Adaptive Security Policies: RL algorithms can autonomously refine policies based on success metrics
(rewards), optimizing response strategies to contain threats effectively [6, 24].
SIEM System Integration: In Security Information and Event Management (SIEM) systems, RL-based
automation can prioritize alerts, automate threat responses, and refine defense mechanisms over time,
enabling continuous improvement in threat response [25, 26].
41
Open Access Research Journal of Science and Technology, 2024, 12(02), 040–048
Text Mining for Threat Intelligence: NLP-based text mining extracts threat information from textual data,
identifying keywords and entities related to potential attacks [27, 28].
Contextual Threat Analysis: NLP enhances the contextual analysis of threats by interpreting intent and
relevance, which is crucial in threat intelligence operations to discern between benign and malicious activities
[29, 30].
Applications in Fraud Prevention and Predictive Analytics: Convolutional Neural Networks (CNNs) and
Recurrent Neural Networks (RNNs) help in recognizing complex fraud patterns, while Generative Adversarial
Networks (GANs) simulate potential threats, improving the resilience of defense mechanisms [31, 32].
Pattern Recognition for Unknown Threats: Deep learning models’ ability to identify anomalies and
previously unseen threats has become essential in detecting zero-day vulnerabilities and other novel attack
forms[33].
NLP for Threat Contextualization: QRadar Advisor processes security reports, social media, and threat
intelligence feeds to provide contextual analysis, enabling security teams to prioritize significant threats [34,
35].
Enhanced Anomaly Detection: Using machine learning, QRadar analyzes large volumes of security logs to
detect unusual behavior indicative of security breaches [36].
Scalable Data Analysis: Azure Sentinel can process diverse datasets across cloud environments, applying
machine learning to detect potential threats in real time [37, 38].
Integration with Microsoft’s Security Ecosystem: Azure Sentinel’s integration with Microsoft’s security
resources enables it to provide comprehensive threat intelligence by leveraging global datasets, facilitating
more accurate and timely responses [39].
3.3. Darktrace
Darktrace’s self-learning AI autonomously identifies and mitigates cyber threats by continuously adapting to network
behavior:
Unsupervised Learning for Novel Threats: Darktrace employs unsupervised models to autonomously detect
deviations from typical behavior, making it effective for discovering previously unknown threats [40, 41].
Real-time Threat Detection and Response: Darktrace’s ability to respond to threats as they emerge helps
organizations address zero-day vulnerabilities more effectively [42, 43].
42
Open Access Research Journal of Science and Technology, 2024, 12(02), 040–048
Malware and Intrusion Detection: FireEye’s platform applies machine learning to enhance malware
detection accuracy, aiding in the identification of sophisticated attack techniques [44].
Collaborative Data Sharing: Through shared threat intelligence, FireEye’s platform allows organizations to
leverage collective insights, strengthening defenses across the cybersecurity landscape [45].
Techniques for Threat Scoring: Researchers are developing algorithms that assign risk scores to potential
threats, allowing security teams to prioritize mitigation efforts based on threat severity [46-48].
Machine Learning in Threat Vector Prediction: Studies focus on how machine learning can predict likely
attack vectors by analyzing historical data, enhancing organizational preparedness [49-51].
Text Mining Innovations: Recent studies focus on text mining to extract insights from open-source
intelligence, such as threat data from forums, social media, and reports [27, 52, 53].
Multilingual NLP for Global Threat Monitoring: Research is being conducted to adapt NLP for multilingual
threat detection, essential for international organizations dealing with global cyber threats [54-57].
Clustering Techniques: Clustering methods, such as k-means and DBSCAN, identify patterns in network
traffic, enabling real-time threat detection [58, 59].
Deep Learning for Real-time Anomaly Detection: Deep learning models are increasingly applied to detect
high-dimensional anomalies within large network environments [60].
Evasion Tactics and Defense Mechanisms: Research explores adversarial AI that creates inputs to deceive AI
models, while also developing defense mechanisms to counter these tactics [61, 62].
Enhancing Model Robustness: Defensive techniques, such as adversarial training, are being explored to make
models more resistant to deception by adversarial samples.
Decision-making Automation: RL models optimize security responses by learning from past decisions,
effectively automating the prioritization and response process [61].
Case Studies in SIEM Systems: Research highlights RL’s success in enhancing SIEM automation by adapting to
evolving threats and optimizing response strategies [63, 64].
43
Open Access Research Journal of Science and Technology, 2024, 12(02), 040–048
Challenges in Data Labeling and Collection: Collecting labeled data for cybersecurity is difficult and costly,
resulting in models that may lack robustness [23].
Imbalanced Data Challenges: In cybersecurity, benign data often far exceeds malicious samples, leading to
models that may struggle with accurate threat detection [65].
Impact of Adversarial Samples: Attackers can use adversarial inputs to bypass AI-driven security measures,
leading to false negatives in threat detection [66].
Mitigating Adversarial Vulnerabilities: Techniques such as adversarial training help models withstand
evasion attempts by adversaries [66].
Challenges in Model Explainability: As deep learning models grow more complex, explaining decisions to
non-technical stakeholders becomes difficult, impacting trust [67].
Efforts to Improve Explainability: Techniques like SHAP (SHapley Additive exPlanations) and LIME (Local
Interpretable Model-Agnostic Explanations) aim to make AI decisions more understandable [68].
Balancing Privacy and Threat Monitoring: Ensuring privacy while monitoring for threats requires careful
management of data collection practices.
Ethical Implications of Automated Intelligence: Unregulated AI-driven intelligence gathering raises
concerns over potential abuses, emphasizing the need for ethical frameworks.
6. Future Directions
Federated Learning: Federated learning enables models to train on decentralized data sources, enhancing
privacy in real-time analytics.
Edge Computing for Scalable Analysis: Lightweight models for edge devices reduce latency, allowing for
faster localized threat detection.
Quantum-enhanced Encryption: Quantum algorithms can secure data more effectively, but also pose threats
to existing encryption methods.
Research into Quantum-resistant Algorithms: Quantum-resistant encryption is essential to safeguard data
as quantum computing advances.
Holistic Data Analysis: Multimodal approaches offer a fuller picture by integrating data from multiple sources,
strengthening threat assessment accuracy.
44
Open Access Research Journal of Science and Technology, 2024, 12(02), 040–048
Transparency and Fairness Standards: Ethical frameworks guide the responsible implementation of AI,
fostering trust and accountability in cybersecurity applications.
7. Conclusion
AI-driven threat intelligence is revolutionizing cybersecurity by providing advanced capabilities for real-time detection
and response to ever-evolving cyber threats. By analyzing vast amounts of data and identifying patterns that indicate
malicious activities, AI enhances the speed and precision of threat detection, enabling organizations to mitigate risks
proactively. Moreover, AI can automate incident response, reducing the burden on security teams and ensuring timely
intervention to prevent potential breaches.
Despite these advantages, significant challenges remain. Issues such as data quality can impact the effectiveness of AI
models, as inaccurate or biased datasets may lead to false positives or missed threats. Additionally, the interpretability
of AI decisions poses a challenge, as the “black box” nature of many AI algorithms can make it difficult for cybersecurity
professionals to understand or justify AI-driven actions. Ethical considerations, including privacy concerns and the risk
of algorithmic bias, further complicate the deployment of AI in security operations.
Looking ahead, emerging technologies such as federated learning and quantum computing hold great promise for
enhancing the resilience and efficiency of AI in cybersecurity. Federated learning allows for decentralized training of AI
models across multiple devices, improving data privacy while enabling the development of robust models that learn
from diverse, distributed datasets. Quantum computing, on the other hand, has the potential to revolutionize
cryptography and data processing, offering unprecedented computational power to tackle complex security challenges.
As these advancements mature, they will play a critical role in creating adaptive and robust cybersecurity frameworks,
making AI an indispensable tool in the defense against increasingly sophisticated cyber threats.
References
[1] AL-Hawamleh, A., Cyber resilience framework: Strengthening defenses and enhancing continuity in business
security. International Journal of Computing and Digital Systems, 2024. 15(1): p. 1315-1331.
[2] Burton, S.L., The Rise and Advancement: Intelligent Cybersecurity Markets, in Pioneering Paradigms in
Organizational Research and Consulting Interventions: A Multidisciplinary Approach. 2024, IGI Global. p. 259-302.
[3] Alesinloye, T., et al., THE ROLE OF ARTIFICIAL INTELLIGENCE IN ENHANCING CYBERSECURITY FOR FINTECH
APPLICATIONS: A COMPREHENSIVE REVIEW. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND
TECHNOLOGY (IJCET), 2024. 15(5): p. 38-44.
[4] Nassar, A. and M. Kamal, Machine Learning and Big Data analytics for Cybersecurity Threat Detection: A Holistic
review of techniques and case studies. Journal of Artificial Intelligence and Machine Learning in Management,
2021. 5(1): p. 51-63.
[5] Chen, X.-W. and X. Lin, Big data deep learning: challenges and perspectives. IEEE access, 2014. 2: p. 514-525.
[6] Arulkumaran, K., et al., Deep reinforcement learning: A brief survey. IEEE Signal Processing Magazine, 2017. 34(6):
p. 26-38.
[7] Mahboubi, A., et al., Evolving techniques in cyber threat hunting: A systematic review. Journal of Network and
Computer Applications, 2024: p. 104004.
[8] Che Mat, N.I., et al., A systematic literature review on advanced persistent threat behaviors and its detection strategy.
Journal of Cybersecurity, 2024. 10(1): p. tyad023.
45
Open Access Research Journal of Science and Technology, 2024, 12(02), 040–048
[9] Rayhan, A., Cybersecurity in the Digital Age: Assessing Threats and Strengthening Defenses.
[10] Gharaibeh, A., et al., Smart cities: A survey on data management, security, and enabling technologies. IEEE
Communications Surveys & Tutorials, 2017. 19(4): p. 2456-2501.
[11] Chen, C.P. and C.-Y. Zhang, Data-intensive applications, challenges, techniques and technologies: A survey on Big
Data. Information sciences, 2014. 275: p. 314-347.
[12] Anvaari, M., A Rule-based Framework for Enhancing Architectural Decision Guidance. 2016.
[13] Fickas, S., Design issues in a rule-based system. ACM SIGPLAN Notices, 1985. 20(7): p. 208-215.
[14] Adeoye, I., Leveraging Artificial Intelligence and Machine Learning for Real-Time Threat Intelligence: Enhancing
Incident Response Capabilities. 2023.
[15] Rehman, F. and S. Hashmi, Enhancing Cloud Security: A Comprehensive Framework for Real-Time Detection
Analysis and Cyber Threat Intelligence Sharing. Advances in Science, Technology and Engineering Systems
Journal, 2023. 8(6): p. 107-119.
[16] Mihalcea, R., H. Liu, and H. Lieberman. NLP (natural language processing) for NLP (natural language
programming). in Computational Linguistics and Intelligent Text Processing: 7th International Conference, CICLing
2006, Mexico City, Mexico, February 19-25, 2006. Proceedings 7. 2006. Springer.
[17] Hassan, M., L.A.-R. Aziz, and Y. Andriansyah, The role artificial intelligence in modern banking: an exploration of
AI-driven approaches for enhanced fraud prevention, risk management, and regulatory compliance. Reviews of
Contemporary Business Analytics, 2023. 6(1): p. 110-132.
[18] Laskov, P., et al. Learning intrusion detection: supervised or unsupervised? in Image Analysis and Processing–ICIAP
2005: 13th International Conference, Cagliari, Italy, September 6-8, 2005. Proceedings 13. 2005. Springer.
[19] Mebawondu, J.O., et al., Network intrusion detection system using supervised learning paradigm. Scientific African,
2020. 9: p. e00497.
[20] Kayode-Ajala, O., Applying Machine Learning Algorithms for Detecting Phishing Websites: Applications of SVM,
KNN, Decision Trees, and Random Forests. International Journal of Information and Cybersecurity, 2022. 6(1): p.
43-61.
[21] Eskin, E., et al., A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data.
Applications of data mining in computer security, 2002: p. 77-101.
[22] Mvula, P.K., et al., A Survey on the Applications of Semi-supervised Learning to Cyber-security. ACM Computing
Surveys, 2024. 56(10): p. 1-41.
[23] Anagnostopoulos, C., Weakly supervised learning: how to engineer labels for machine learning in cyber-security, in
Data Science for Cyber-Security. 2019, World Scientific. p. 195-226.
[24] Gopireddy, R.R., Reinforcement Learning for Cyber Defense: Adaptive and Autonomous Security Systems. European
Journal of Advances in Engineering and Technology, 2023. 10(10): p. 102-105.
[25] Rani, R., G. Epiphaniou, and C. Maple. Reinforcement learning-based alert prioritisation in security operation
centre: A framework for enhancing cybersecurity in the digital economy. in International Conference on AI and the
Digital Economy (CADE 2023). 2023. IET.
[26] Banik, S. and S.S.M. Dandyala, Reinforcement Learning for Adaptive Cybersecurity. International Journal of
Machine Learning Research in Cybersecurity and Artificial Intelligence, 2022. 13(1): p. 366-382.
[27] Rahman, M.R., R. Mahdavi-Hezaveh, and L. Williams. A literature review on mining cyberthreat intelligence from
unstructured texts. in 2020 International Conference on Data Mining Workshops (ICDMW). 2020. IEEE.
[28] Arazzi, M., et al., NLP-Based Techniques for Cyber Threat Intelligence. arXiv preprint arXiv:2311.08807, 2023.
[29] Gutiérrez, L.F. and A. Namin, Contextminer: Mining contextual features for conceptualizing knowledge in security
texts. IEEE Access, 2022. 10: p. 85891-85904.
[30] Mulugu, N., AUTOMATED EMERGING CYBER THREAT IDENTIFICATION AND PROFILING BASED ON NATURAL
LANGUAGE PROCESSING.
[31] Sheth, H.S.K., A. Ilavarasi, and A.K. Tyagi. Deep Learning, blockchain based multi-layered Authentication and
Security Architectures. in 2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC).
2022. IEEE.
46
Open Access Research Journal of Science and Technology, 2024, 12(02), 040–048
[32] Sharma, R., K. Mehta, and P. Sharma, Role of Artificial Intelligence and Machine Learning in Fraud Detection and
Prevention, in Risks and Challenges of AI-Driven Finance: Bias, Ethics, and Security. 2024, IGI Global. p. 90-120.
[33] Goodfellow, I., Deep Learning. 2016: MIT Press.
[34] Vähäkainu, P. and M. Lehto, Use of artificial intelligence in a cybersecurity environment, in Artificial intelligence
and cybersecurity: Theory and applications. 2022, Springer. p. 3-27.
[35] Tan, E., A conceptual model of the use of AI and blockchain for open government data governance in the public
sector. 2021, DIGI4FED Consortium. Retrieved from: https://soc. kuleuven. be/io/digi4fed ….
[36] Page, A., et al., SIEM+: Harnessing Machine Learning for Advanced Anomaly Detection in Cybersecurity Software.
[37] Diogenes, Y., N. DiCola, and T. Turpijn, Microsoft Azure Sentinel: Planning and implementing Microsoft's cloud-
native SIEM solution. 2022: Microsoft Press.
[38] Peiris, C., B. Pillai, and A. Kudrati, Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms
Against Cyberattacks. 2021: John Wiley & Sons.
[39] Borra, P., Microsoft Azure Networking: Empowering Cloud Connectivity and Security. International Journal of
Advanced Research in Science, Communication and Technology (IJARSCT) Volume, 2024. 4.
[40] Crawford, J., The impact of artificial intelligence on autonomous cyber defense. 2017, Utica College.
[41] BABS, M.-P.B., Artificial Intelligence in Cyber security and Network security.
[42] Tayyab, M., et al., AI-Powered Threat Detection in Business Environments: Strategies and Best Practices, in
Generative AI for Web Engineering Models. 2025, IGI Global. p. 379-436.
[43] Ok, E., Artificial Intelligence and Cybersecurity: Strengthening Defenses in the Digital Age.
[44] Nasser, Y. and M. Nassar, Toward Hardware-Assisted Malware Detection Utilizing Explainable Machine Learning:
A Survey. IEEE Access, 2023. 11: p. 131273-131288.
[45] Brown, S., J. Gommers, and O. Serrano. From cyber security information sharing to threat management. in
Proceedings of the 2nd ACM workshop on information sharing and collaborative security. 2015.
[46] Stergiopoulos, G., P. Dedousis, and D. Gritzalis, Automatic analysis of attack graphs for risk mitigation and
prioritization on large-scale and complex networks in Industry 4.0. International Journal of Information Security,
2022. 21(1): p. 37-59.
[47] Sancho, J.C., et al., New approach for threat classification and security risk estimations based on security event
management. Future Generation Computer Systems, 2020. 113: p. 488-505.
[48] Ganin, A.A., et al., Multicriteria decision framework for cybersecurity risk assessment and management. Risk
Analysis, 2020. 40(1): p. 183-199.
[49] Shah, V., Machine learning algorithms for cybersecurity: Detecting and preventing threats. Revista Espanola de
Documentacion Cientifica, 2021. 15(4): p. 42-66.
[50] Yeboah-Ofori, A., et al., Cyber threat predictive analytics for improving cyber supply chain security. IEEE Access,
2021. 9: p. 94318-94337.
[51] Ajala, O.A., et al., Review of AI and machine learning applications to predict and Thwart cyber-attacks in real-time.
Magna Scientia Advanced Research and Reviews, 2024. 10(1): p. 312-320.
[52] Hoppa, M.A., et al., Twitterosint: Automated open source intelligence collection, analysis & visualization tool. Annual
Review of Cybertherapy And Telemedicine 2019, 2019. 121.
[53] Adewopo, V., B. Gonen, and F. Adewopo. Exploring open source information for cyber threat intelligence. in 2020
IEEE International Conference on Big Data (Big Data). 2020. IEEE.
[54] Silvestri, S., et al., Cyber threat assessment and management for securing healthcare ecosystems using natural
language processing. International Journal of Information Security, 2024. 23(1): p. 31-50.
[55] Florea, M., et al., Complex project to develop real tools for identifying and countering terrorism: real-time early
detection and alert system for online terrorist content based on natural language processing, social network
analysis, artificial intelligence and complex event processing, in Challenges in cybersecurity and privacy-the
European research landscape. 2022, River Publishers. p. 181-206.
47
Open Access Research Journal of Science and Technology, 2024, 12(02), 040–048
[56] Rozlomii, I., et al. Data Protection in the Utilization of Natural Language Processors for Trend Analysis and Public
Opinion: ryptographic Aspect. in Proceedings of the 2nd International Workshop on Social Communication and
Information Activity in Digital Humanities (SCIA-2023). 2023.
[57] Mnassri, K., et al., A survey on multi-lingual offensive language detection. PeerJ Computer Science, 2024. 10: p.
e1934.
[58] Rashid, U., et al., Anomaly Detection using Clustering (K-Means with DBSCAN) and SMO. Journal of Computing &
Biomedical Informatics, 2024. 7(02).
[59] Nalavade, K. and B. Meshram, Evaluation of k-means clustering for effective intrusion detection and prevention
in massive network traffic data. International Journal of Computer Applications, 2014. 96(7).
[60] Thudumu, S., et al., A comprehensive survey of anomaly detection techniques for high dimensional big data.
Journal of Big Data, 2020. 7: p. 1-30.
[61] Nguyen, T.T. and V.J. Reddi, Deep reinforcement learning for cyber security. IEEE Transactions on Neural
Networks and Learning Systems, 2021. 34(8): p. 3779-3795.
[62] Hossain, M.T., R. Afrin, and M.A.-A. Biswas, A Review on Attacks against Artificial Intelligence (AI) and Their
Defence Image Recognition and Generation Machine Learning, Artificial Intelligence. Control Systems and
Optimization Letters, 2024. 2(1): p. 52-59.
[63] Wei, W. and L. Liu, Robust deep learning ensemble against deception. IEEE Transactions on Dependable and
Secure Computing, 2020. 18(4): p. 1513-1527.
[64] Banik, S. and S.S.M. Dandyala, Adversarial Attacks Against ML Models. International Journal of Machine Learning
Research in Cybersecurity and Artificial Intelligence, 2020. 11(1): p. 205-229.
[65] Al-Shehari, T. and R.A. Alsowail, Random resampling algorithms for addressing the imbalanced dataset classes in
insider threat detection. International Journal of Information Security, 2023. 22(3): p. 611-629.
[66] Hoang, V.-T., et al., Security risks and countermeasures of adversarial attacks on AI-driven applications in 6G
networks: A survey. Journal of Network and Computer Applications, 2024: p. 104031.
[67] Elahi, M.M., A user-centric exploration of transparency, explanations, and trust in multi-model and single-model
decision support systems. 2023, Brunel University London.
[68] Vimbi, V., N. Shaffi, and M. Mahmud, Interpreting artificial intelligence models: a systematic review on the
application of LIME and SHAP in Alzheimer’s disease detection. Brain Informatics, 2024. 11(1): p. 10.
48