Review Article

Deep Learning Methods for Malware and Intrusion Detection: A Systematic Literature Review

Table 7

Summary of the literature extracted from the five scholarly libraries and the process of filtration.

LibraryLibrary URLReturned papersSLR/book/gray literatureIrrelevant papersTotal

Google Scholarhttps://www.scholar.google.com/3337470180
Science Directhttps://www.sciencedirect.com/30611414646
IEEE Explorehttps://ieeeexplore.ieee.org/144128547
ACMhttps://dl.acm.org/9216
Springerhttps://link.springer.com/143458711

ā€‰Total935247398290