[1]
M. Atti and M. Kumar Yogi, “From Signature-Based to AI-Driven Frameworks: A Review of the Evolution of Cybersecurity Evaluation Methods”, JoISSCCR, vol. 1, no. 3, pp. 40–54, Dec. 2024.