J. Jang-jaccard, S : A survey of emerging threats in cybersecurity, SAIFE, New-Paradigm-for-Securing-Todays-Porous-Perimeter, New-Paradigm-for-Securing-Todays-Porous-Perimeter, vol.80, 2014.

A. Chawla, B. Lee, S. Fallon, and J. , P : Host Based Intrusion Detection System with Combined CNN/RNN Model, ECML PKDD 2018 Workshops, 2018.

Q. Yuan and S. Wei, Aligning Network Traffic for Serial Consistency and Anomalies with A Customized LSTM Model, 2018 IEEE International Conference on Progress in Informatics and Computing (PIC), 2018.

Y. Mirsky, T. Doitshman, Y. Elovici, and A. Shabtai, A : Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection, Network and Distributed Systems Security Symposium (NDSS), 2018.

C. R. Sweet, Synthesizing cyber intrusion alerts using generative adversarial networks, 2019.

N. Adams and N. Heard, Dynamic Networks and Cyber-Security, 2016.

. Pingle, A : RelExt : Relation Extraction using deep learning approaches for cybersecurity knowledge graph improvement, p.2019

T. Mikolov, Distributed representations of words and phrases and their compositionality, NIPS 2016, 2016.

L. Zhu, Scalable temporal latent space inference for link prediction in dynamic networks, In IEEE Transactions on Knowledge and Data Engineering, 2016.

K. Nesreen, R. Ahmed, J. Rossi, T. L. Lee, R. Willke et al., Learning Role-based Graph Embeddings, p.2018