[1] N. I. Che Mat, N. Jamil, Y. Yusoff and M. L. Mat Kiah, "A Systematic Literature Review on Advanced Persistent Threat Behaviors and Its Detection Strategy," Journal of Cybersecurity, vol. 10, no. 1, DOI: 10.1093/cybsec/tyad023, 2024.
[2] G. Gebrehans et al., "Generative Adversarial Networks for Dynamic Malware Behavior: A Comprehensive Review, Categorization and Analysis," IEEE Transactions on Artificial Intelligence, vol. 6, no. 8, pp. 1955-1976, DOI: 10.1109/tai.2025.3537966, 2025.
[3] W. Guo, W. Du, X. Yang, J. Xue, Y. Wang, W. Han and J. Hu, "MalHAPGNN: An Enhanced Call Graph-based Malware Detection Framework Using Hierarchical Attention Pooling Graph Neural Network," Sensors, vol. 25, no. 2, DOI: 10.3390/s25020374, 2025.
[4] Y. Guo, "A Review of Machine Learning-based Zero-day Attack Detection: Challenges and Future Directions," NIST Technical Series Publication, [Online], Available: https://tsapps.nist.gov/publication/get_pdf. cfm?pub_id=934769, 2023.
[5] D. Javaheri et al., "DeepRadar: A Cyber-defence Interceptor for Early Warning and Defusing," Knowledge-based Systems, vol. 331, p. 114830, 2025.
[6] L. Li, J. Cui, R. Zhang, H. Xia and X. Cheng, "Dynamics of Complex Networks: Malware Propagation Modeling and Analysis in Industrial Internet of Things," IEEE Access, vol. 8, pp. 64184-64192, 2020.
[7] A. A. Mir, M. F. Zuhairi, S. Musa and A. Namoun, "Adaptive Anomaly Detection in Dynamic Graph Networks," Proc. of the 2024 Int. Visualization, Informatics and Technology Conf. (IVIT), pp. 156-161, DOI: 10.1109/IVIT62678.2024.10709088, 2024.
[8] K. Pappu, P. D. Joshi, R. A. Dandekar, R. Dandekar and S. Panat, "Understanding Malware Propagation Dynamics through Scientific Machine Learning," arXiv preprint, arXiv: 2507.07143, 2025.
[9] A. Redhu, P. Choudhary, K. Srinivasan and T. K. Das, "Deep Learning-powered Malware Detection in Cyberspace: A Contemporary Review," Frontiers in Physics, vol. 12, p. 1349463, 2024.
[10] A. Martin-del Rey, "A Novel Model for Malware Propagation on Wireless Sensor Networks," Mathematical Biosciences and Engineering, vol. 21, no. 3, pp. 3967-3998, 2024.
[11] A. Shah and L. Nawaf, "Malware Detection Using Deep Learning Approaches," Preprints.org, DOI: 10.20944/preprints202407.1214.v1, 2024.
[12] I. Sharafaldin, A. H. Lashkari and A. A. Ghorbani, "Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization," Proc. of the 4th Int. Conf. on Information Systems Security and Privacy (ICISSP), pp. 108-116, DOI: 10.5220/0006639801080116, 2018.
[13] S. Uddin, L. Hossain, S. T. Murshed and J. W. Crawford, cStatic versus Dynamic Topology of Complex Communications Network during Organizational Crisis," Complexity, vol. 16, no. 5, pp. 27-36, 2011.
[14] S. Wang et al., "Heterogeneous Graph Matching Networks for Unknown Malware Detection," Proc. of the 28th Int. Joint Conf. on Artifi. Intelli. (IJCAI), pp. 3762-3770, DOI: 10.24963/ijcai.2019/522, 2019.
[15] P. Xiao, "Network Malware Detection Using Deep Learning Network Analysis," Journal of Cyber Security and Mobility, vol. 13, no. 1, pp. 27-52, 2023.
[16] Z. Zhang, Y. Li, W. Wang, H. Song and H., Dong, "Malware Detection with Dynamic Evolving Graph Convolutional Networks," Int. Journal of Intelligent Systems, vol. 37, no. 10, pp. 7261-7280, 2022.