Review on Multi-Level Ensemble and Transfer Learning Approaches for Cybersecurity Anomaly Detection
Main Article Content
Abstract
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
References
A. Y. D. Siale, Q. M. Z. Hassan, M. F. A. S. Kadekle, and B. S. Veena, “Enhancing Large-Scale Network Security with a VGG-Net-Based DCNN: A Deep Learning Approach to Anomaly Detection,” J. Robot. Control, vol. 6, no. 3, pp. 1316–1331, 2025, doi: 10.18196/jrc.v6i3.25169.
C. Zhang, X. Tu, X. Lin, Y. Zhang, and Z. Hua, “An Advanced Fusion Neural Network Paradigm for Intelligent Cyber Security Anomaly Detection,” Electron. Lett., vol. 61, no. 1, pp. 1–6, 2025, doi: 10.1049/ell2.70429.
R. Tavoli, E. Rezvani, and M. Hosseini Shirvani, “An Efficient Hybrid Approach Based on Deep Learning and Stacking Ensemble Using the Whale Optimization Algorithm for Detecting Attacks in IoT Devices,” Eng. Reports, vol. 7, no. 9, pp. 1–17, 2025, doi: 10.1002/eng2.70338.
K. O’Shea et al., “Explainable Graph Ensemble Learning for Multivariate Time Series Anomaly Detection in Cloud Microservice Architectures,” IEEE Trans. Cloud Comput., vol. PP, pp. 1–15, 2025, doi: 10.1109/TCC.2025.3634737.
A. Saraff et al., “Indian Traffic Surveillance Video Summarization Using YOLO and Multi-Level Masking,” IEEE Access, vol. 13, no. September, pp. 171371–171385, 2025, doi: 10.1109/ACCESS.2025.3616267.