Review Article

Deep Learning Methods for Malware and Intrusion Detection: A Systematic Literature Review

Table 10

Journal-wise distribution of the papers on malware detection using deep learning.

S. no.JournalNo. of papersReferences

1ArXiv preprints11[33, 40, 50, 52, 59, 66, 69, 94, 105, 107, 117]
2Academia1[65]
3ACM SIGCOMM computer communication review1[71]
4Ad hoc networks, 2020—Elsevier2[95, 106]
5Alexandria Engineering Journal1[76]
6Cluster Computing1[79]
7Computer Communications1[63]
8Computers and Security13[26, 29, 39, 41, 42, 54, 60, 61, 87, 88, 122, 125, 127]
9Cybersecurity1[28]
10Digital Investigation1[43]
11Engineering Applications of Artificial Intelligence1[80]
12Expert Systems with Applications1[30]
13Future Generation Computer Systems4[31, 86, 103, 116]
14IEEE Access8[36, 99, 102, 108, 109, 114, 118, 128]
15IEEE Transactions on Industrial Informatics1[48]
16IEEE Transactions on Emerging Topics in Computational Intelligence1[119]
17IEEE Transactions on Network Science and Engineering1[98]
18IEEE Transactions on Sustainable Computing1[100]
19IEEE Transactions on Information Forensics and Security2[68, 97]
20IEICE Transactions on Information and Systems1[62]
21IET Information Security1[38]
22Information Sciences1[44]
23International Journal of Advance Soft Computing1[82]
24International Journal of Digital Crimes and Forensics1[45]
25International Journal of Emerging Technology and Computer Science1[67]
26International Journal of Performability Engineering1[73]
27Journal of Ambient Intelligence and Humanized Computing1[74]
28Journal of computer Virology and Hacking Techniques2[47, 91]
29Journal of Computers1[81]
30Journal of Grid Computing1[58]
31Journal of Information Security and Applications2[37, 104]
32Journal of Internet Services and Applications1[113]
33Journal of King Saud University—Computer and Information Sciences1[111]
34Journal of Parallel and Distributed Computing3[46, 49, 84]
35Journal of Signal Processing Systems, 2021—Springer1[64]
36Knowledge and Information Systems1[34]
37KSII Transactions on Internet and Information Systems2[75, 85]
38Mathematical Problems in Engineering1[101]
39Microelectronics Reliability1[72]
40Neural Computing and Applications3[32, 92, 112]
41Neurocomputing1[78]
42PeerJ Computer Science, 20201[56]
43Pertanika Journal of Science and Technology1[83]
44PloS One, 20201[57]
45Procedia Computer Science2[35, 51]
46Security and Communication Networks3[27, 89, 115]
47Sensors2[96, 130]
48Soft Computing2[77, 93]
49TechRxiv1[90]
50Tsinghua Science and Technology1[70]
51Vehicular Communications1[110]
52Entropy1[120]
53Human-Centric Computing and Information Sciences1[121]
54Applied Soft Computing1[123]
55Journal of Internet Services and Information Security1[124]
56Signal Processing Systems1[64]
57International Journal of Information Security1[126]
58Cybernetics and Systems1[129]
59International Journal of Computer Network & Information Security1[131]