Skip to main content
. 2022 Dec 14;22(24):9837. doi: 10.3390/s22249837
Algorithm 2: Pseudocode for Generating Potential Review Papers
  • Search DatabasesSpringer_Link,MDPI,Science_Direct,Wiley_Online, IEEE_Xplore

  • {Initialization:}

  • Area_Keyword [BotNet,Software_defined_Network,Malware,Attack,IoT]

  • Attack_keywords [DOS,networkprobing,DDOS,backdoor,Phishing, credentialstealing]

  •    

  • Method_keywords [Deep_Learning_Methods,Classical_Machine_Learning_Methods]

  •    

  • Target_keywords [Detection,Classification]

  • Search_String Algorithm1

  • for    attackAttack_keywords    do

  •     for    keywordArea_keywords    do

  •         for    targetTarget_keywords    do

  •             for    methodMethod_keywords    do

  •                 Search_String    =Algorithm1

  •                 for databaseDatabases    do

  •                     Paper_List1databases.search(Search_String)

  •                 end for

  •             end for

  •         end for

  •     end for

  • end for

  • Inclusion_Criteria = [IC1,IC2,IC3,IC4,IC5,IC6]

  • Exclusion_Criteria = [EC1,EC2,EC3,EC4]

  • Paper_List2 Apply.Inclusion_Critera(Paper_List1)

  • Paper_Final_Lists Apply.Inclusion_Critera(Paper_List2)