Skip to main content
. 2022 Jan 27:1–37. Online ahead of print. doi: 10.1007/s00500-021-06608-1

Table 2.

A detailed comparison with other review articles: (: Yes, : No)

Review article Ferrag et al. (2020) Aleesa et al. (2020) Ahmad et al. (2021) Gamage and Samarabandu (2020) Ahmad and Alsmadi (2021) This article
Focused security domain Cyber security intrusion detection IDS IDS NID IoT security DDoS
ML/DL DL DL ML/DL DL ML/DL DL
Systematic study
Taxonomy
Preprocessing strategy
Types of attack used in existing literature from the datasets
Strengths
Weaknesses
Research gaps