A Comprehensive Survey: Evaluating the Efficiency of Artificial Intelligence and Machine Learning Techniques on Cyber Security Solutions

Given the continually rising frequency of cyberattacks, the adoption of artificial intelligence methods, particularly Machine Learning (ML), Deep Learning (DL), and Reinforcement Learning (RL), has become essential in the realm of cybersecurity. These techniques have proven to be effective in detect...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE access 2024, Vol.12, p.12229-12256
Hauptverfasser: Ozkan-Okay, Merve, Akin, Erdal, Aslan, Omer, Kosunalp, Selahattin, Iliev, Teodor, Stoyanov, Ivaylo, Beloev, Ivan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 12256
container_issue
container_start_page 12229
container_title IEEE access
container_volume 12
creator Ozkan-Okay, Merve
Akin, Erdal
Aslan, Omer
Kosunalp, Selahattin
Iliev, Teodor
Stoyanov, Ivaylo
Beloev, Ivan
description Given the continually rising frequency of cyberattacks, the adoption of artificial intelligence methods, particularly Machine Learning (ML), Deep Learning (DL), and Reinforcement Learning (RL), has become essential in the realm of cybersecurity. These techniques have proven to be effective in detecting and mitigating cyberattacks, which can cause significant harm to individuals, organizations, and even countries. Machine learning algorithms use statistical methods to identify patterns and anomalies in large datasets, enabling security analysts to detect previously unknown threats. Deep learning, a subfield of ML, has shown great potential in improving the accuracy and efficiency of cybersecurity systems, particularly in image and speech recognition. On the other hand, RL is again a subfield of machine learning that trains algorithms to learn through trial and error, making it particularly effective in dynamic environments. We also evaluated the usage of ChatGPT-like AI tools in cyber-related problem domains on both sides, positive and negative. This article provides an overview of how ML, DL, and RL are applied in cybersecurity, including their usage in malware detection, intrusion detection, vulnerability assessment, and other areas. The paper also specifies several research questions to provide a more comprehensive framework to investigate the efficiency of AI and ML models in the cybersecurity domain. The state-of-the-art studies using ML, DL, and RL models are evaluated in each Section based on the main idea, techniques, and important findings. It also discusses these techniques' challenges and limitations, including data quality, interpretability, and adversarial attacks. Overall, the use of ML, DL, and RL in cybersecurity holds great promise for improving the effectiveness of security systems and enhancing our ability to protect against cyberattacks. Therefore, it is essential to continue developing and refining these techniques to address the ever-evolving nature of cyber threats. Besides, some promising solutions that rely on machine learning, deep learning, and reinforcement learning are susceptible to adversarial attacks, underscoring the importance of factoring in this vulnerability when devising countermeasures against sophisticated cyber threats. We also concluded that ChatGPT can be a valuable tool for cybersecurity, but it should be noted that ChatGPT-like tools can also be manipulated to threaten the integrity, confidentiality, and availabi
doi_str_mv 10.1109/ACCESS.2024.3355547
format Article
fullrecord <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_proquest_journals_2918610553</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10403908</ieee_id><doaj_id>oai_doaj_org_article_8df1ed1bef5e41a5b155e1273bdad72e</doaj_id><sourcerecordid>2918610553</sourcerecordid><originalsourceid>FETCH-LOGICAL-c446t-b02073b8be4e5af0217fa0ccea7f5021c0a9ef5309f677fa1ba0f9384bd3f5603</originalsourceid><addsrcrecordid>eNpVkc1u1DAUhSNEJarSJ4CFJbbMYMdxfthFYYCRBnWRtlvrxrme8ShjD04yVd6Ax8ZpKlS8se_1OZ91faLoA6NrxmjxpayqTV2vYxona86FEEn2JrqOWVqsuODp21fnd9Ft3x9pWHloiew6-lOSyp3OHg9oe3NBUo_-gtNXsrlAN8Jg7J4MByQbrY0yaNVEnCalH8xcQ0e2dsCuM_twhQRsS36BOhiLZIfg7Wy_R3Ww5veIPXGWVFODntSoRm-GidSuGwfjbP8-utLQ9Xj7st9ED98399XP1e7ux7YqdyuVJOmwamhMM97kDSYoQNOYZRqoUgiZFqFSFArUgtNCp1m4Yg1QXfA8aVquRUr5TbRduK2Dozx7cwI_SQdGPjec30sI06kOZd5qhi1rAg8TBqJhQiCLw_MttFmMgfV5YfVPeB6b_2jfzGP5TDvBKNM0WIP80yI_ezd_xyCPbvQ2TCvjguUpo0EUVHxRKe_63qP-h2VUzoHLJXA5By5fAg-uj4vLIOIrR0J5QXP-F877qeY</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2918610553</pqid></control><display><type>article</type><title>A Comprehensive Survey: Evaluating the Efficiency of Artificial Intelligence and Machine Learning Techniques on Cyber Security Solutions</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>SWEPUB Freely available online</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Ozkan-Okay, Merve ; Akin, Erdal ; Aslan, Omer ; Kosunalp, Selahattin ; Iliev, Teodor ; Stoyanov, Ivaylo ; Beloev, Ivan</creator><creatorcontrib>Ozkan-Okay, Merve ; Akin, Erdal ; Aslan, Omer ; Kosunalp, Selahattin ; Iliev, Teodor ; Stoyanov, Ivaylo ; Beloev, Ivan</creatorcontrib><description>Given the continually rising frequency of cyberattacks, the adoption of artificial intelligence methods, particularly Machine Learning (ML), Deep Learning (DL), and Reinforcement Learning (RL), has become essential in the realm of cybersecurity. These techniques have proven to be effective in detecting and mitigating cyberattacks, which can cause significant harm to individuals, organizations, and even countries. Machine learning algorithms use statistical methods to identify patterns and anomalies in large datasets, enabling security analysts to detect previously unknown threats. Deep learning, a subfield of ML, has shown great potential in improving the accuracy and efficiency of cybersecurity systems, particularly in image and speech recognition. On the other hand, RL is again a subfield of machine learning that trains algorithms to learn through trial and error, making it particularly effective in dynamic environments. We also evaluated the usage of ChatGPT-like AI tools in cyber-related problem domains on both sides, positive and negative. This article provides an overview of how ML, DL, and RL are applied in cybersecurity, including their usage in malware detection, intrusion detection, vulnerability assessment, and other areas. The paper also specifies several research questions to provide a more comprehensive framework to investigate the efficiency of AI and ML models in the cybersecurity domain. The state-of-the-art studies using ML, DL, and RL models are evaluated in each Section based on the main idea, techniques, and important findings. It also discusses these techniques' challenges and limitations, including data quality, interpretability, and adversarial attacks. Overall, the use of ML, DL, and RL in cybersecurity holds great promise for improving the effectiveness of security systems and enhancing our ability to protect against cyberattacks. Therefore, it is essential to continue developing and refining these techniques to address the ever-evolving nature of cyber threats. Besides, some promising solutions that rely on machine learning, deep learning, and reinforcement learning are susceptible to adversarial attacks, underscoring the importance of factoring in this vulnerability when devising countermeasures against sophisticated cyber threats. We also concluded that ChatGPT can be a valuable tool for cybersecurity, but it should be noted that ChatGPT-like tools can also be manipulated to threaten the integrity, confidentiality, and availability of data.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2024.3355547</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>AI tools ; Algorithms ; Artificial intelligence ; Chatbots ; Computer security ; Cyberattacks and solutions ; Cybersecurity ; Deep learning ; Efficiency ; Fraud ; Identification methods ; Intrusion detection systems ; Machine learning ; Prediction algorithms ; Reinforcement learning ; Security ; Security systems ; Speech recognition ; State-of-the-art reviews ; Statistical methods ; System effectiveness ; Telecommunication traffic</subject><ispartof>IEEE access, 2024, Vol.12, p.12229-12256</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c446t-b02073b8be4e5af0217fa0ccea7f5021c0a9ef5309f677fa1ba0f9384bd3f5603</citedby><cites>FETCH-LOGICAL-c446t-b02073b8be4e5af0217fa0ccea7f5021c0a9ef5309f677fa1ba0f9384bd3f5603</cites><orcidid>0000-0003-2014-1970 ; 0000-0002-2223-3927 ; 0000-0001-9824-1504 ; 0000-0003-2214-8092 ; 0000-0002-1071-2541 ; 0000-0003-0737-1966 ; 0000-0003-2899-4679</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10403908$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>230,314,552,780,784,864,885,2102,4024,27633,27923,27924,27925,54933</link.rule.ids><backlink>$$Uhttps://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-66155$$DView record from Swedish Publication Index$$Hfree_for_read</backlink></links><search><creatorcontrib>Ozkan-Okay, Merve</creatorcontrib><creatorcontrib>Akin, Erdal</creatorcontrib><creatorcontrib>Aslan, Omer</creatorcontrib><creatorcontrib>Kosunalp, Selahattin</creatorcontrib><creatorcontrib>Iliev, Teodor</creatorcontrib><creatorcontrib>Stoyanov, Ivaylo</creatorcontrib><creatorcontrib>Beloev, Ivan</creatorcontrib><title>A Comprehensive Survey: Evaluating the Efficiency of Artificial Intelligence and Machine Learning Techniques on Cyber Security Solutions</title><title>IEEE access</title><addtitle>Access</addtitle><description>Given the continually rising frequency of cyberattacks, the adoption of artificial intelligence methods, particularly Machine Learning (ML), Deep Learning (DL), and Reinforcement Learning (RL), has become essential in the realm of cybersecurity. These techniques have proven to be effective in detecting and mitigating cyberattacks, which can cause significant harm to individuals, organizations, and even countries. Machine learning algorithms use statistical methods to identify patterns and anomalies in large datasets, enabling security analysts to detect previously unknown threats. Deep learning, a subfield of ML, has shown great potential in improving the accuracy and efficiency of cybersecurity systems, particularly in image and speech recognition. On the other hand, RL is again a subfield of machine learning that trains algorithms to learn through trial and error, making it particularly effective in dynamic environments. We also evaluated the usage of ChatGPT-like AI tools in cyber-related problem domains on both sides, positive and negative. This article provides an overview of how ML, DL, and RL are applied in cybersecurity, including their usage in malware detection, intrusion detection, vulnerability assessment, and other areas. The paper also specifies several research questions to provide a more comprehensive framework to investigate the efficiency of AI and ML models in the cybersecurity domain. The state-of-the-art studies using ML, DL, and RL models are evaluated in each Section based on the main idea, techniques, and important findings. It also discusses these techniques' challenges and limitations, including data quality, interpretability, and adversarial attacks. Overall, the use of ML, DL, and RL in cybersecurity holds great promise for improving the effectiveness of security systems and enhancing our ability to protect against cyberattacks. Therefore, it is essential to continue developing and refining these techniques to address the ever-evolving nature of cyber threats. Besides, some promising solutions that rely on machine learning, deep learning, and reinforcement learning are susceptible to adversarial attacks, underscoring the importance of factoring in this vulnerability when devising countermeasures against sophisticated cyber threats. We also concluded that ChatGPT can be a valuable tool for cybersecurity, but it should be noted that ChatGPT-like tools can also be manipulated to threaten the integrity, confidentiality, and availability of data.</description><subject>AI tools</subject><subject>Algorithms</subject><subject>Artificial intelligence</subject><subject>Chatbots</subject><subject>Computer security</subject><subject>Cyberattacks and solutions</subject><subject>Cybersecurity</subject><subject>Deep learning</subject><subject>Efficiency</subject><subject>Fraud</subject><subject>Identification methods</subject><subject>Intrusion detection systems</subject><subject>Machine learning</subject><subject>Prediction algorithms</subject><subject>Reinforcement learning</subject><subject>Security</subject><subject>Security systems</subject><subject>Speech recognition</subject><subject>State-of-the-art reviews</subject><subject>Statistical methods</subject><subject>System effectiveness</subject><subject>Telecommunication traffic</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>D8T</sourceid><sourceid>DOA</sourceid><recordid>eNpVkc1u1DAUhSNEJarSJ4CFJbbMYMdxfthFYYCRBnWRtlvrxrme8ShjD04yVd6Ax8ZpKlS8se_1OZ91faLoA6NrxmjxpayqTV2vYxona86FEEn2JrqOWVqsuODp21fnd9Ft3x9pWHloiew6-lOSyp3OHg9oe3NBUo_-gtNXsrlAN8Jg7J4MByQbrY0yaNVEnCalH8xcQ0e2dsCuM_twhQRsS36BOhiLZIfg7Wy_R3Ww5veIPXGWVFODntSoRm-GidSuGwfjbP8-utLQ9Xj7st9ED98399XP1e7ux7YqdyuVJOmwamhMM97kDSYoQNOYZRqoUgiZFqFSFArUgtNCp1m4Yg1QXfA8aVquRUr5TbRduK2Dozx7cwI_SQdGPjec30sI06kOZd5qhi1rAg8TBqJhQiCLw_MttFmMgfV5YfVPeB6b_2jfzGP5TDvBKNM0WIP80yI_ezd_xyCPbvQ2TCvjguUpo0EUVHxRKe_63qP-h2VUzoHLJXA5By5fAg-uj4vLIOIrR0J5QXP-F877qeY</recordid><startdate>2024</startdate><enddate>2024</enddate><creator>Ozkan-Okay, Merve</creator><creator>Akin, Erdal</creator><creator>Aslan, Omer</creator><creator>Kosunalp, Selahattin</creator><creator>Iliev, Teodor</creator><creator>Stoyanov, Ivaylo</creator><creator>Beloev, Ivan</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>ADTPV</scope><scope>AOWAS</scope><scope>D8T</scope><scope>ZZAVC</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0003-2014-1970</orcidid><orcidid>https://orcid.org/0000-0002-2223-3927</orcidid><orcidid>https://orcid.org/0000-0001-9824-1504</orcidid><orcidid>https://orcid.org/0000-0003-2214-8092</orcidid><orcidid>https://orcid.org/0000-0002-1071-2541</orcidid><orcidid>https://orcid.org/0000-0003-0737-1966</orcidid><orcidid>https://orcid.org/0000-0003-2899-4679</orcidid></search><sort><creationdate>2024</creationdate><title>A Comprehensive Survey: Evaluating the Efficiency of Artificial Intelligence and Machine Learning Techniques on Cyber Security Solutions</title><author>Ozkan-Okay, Merve ; Akin, Erdal ; Aslan, Omer ; Kosunalp, Selahattin ; Iliev, Teodor ; Stoyanov, Ivaylo ; Beloev, Ivan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c446t-b02073b8be4e5af0217fa0ccea7f5021c0a9ef5309f677fa1ba0f9384bd3f5603</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>AI tools</topic><topic>Algorithms</topic><topic>Artificial intelligence</topic><topic>Chatbots</topic><topic>Computer security</topic><topic>Cyberattacks and solutions</topic><topic>Cybersecurity</topic><topic>Deep learning</topic><topic>Efficiency</topic><topic>Fraud</topic><topic>Identification methods</topic><topic>Intrusion detection systems</topic><topic>Machine learning</topic><topic>Prediction algorithms</topic><topic>Reinforcement learning</topic><topic>Security</topic><topic>Security systems</topic><topic>Speech recognition</topic><topic>State-of-the-art reviews</topic><topic>Statistical methods</topic><topic>System effectiveness</topic><topic>Telecommunication traffic</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ozkan-Okay, Merve</creatorcontrib><creatorcontrib>Akin, Erdal</creatorcontrib><creatorcontrib>Aslan, Omer</creatorcontrib><creatorcontrib>Kosunalp, Selahattin</creatorcontrib><creatorcontrib>Iliev, Teodor</creatorcontrib><creatorcontrib>Stoyanov, Ivaylo</creatorcontrib><creatorcontrib>Beloev, Ivan</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>SwePub</collection><collection>SwePub Articles</collection><collection>SWEPUB Freely available online</collection><collection>SwePub Articles full text</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ozkan-Okay, Merve</au><au>Akin, Erdal</au><au>Aslan, Omer</au><au>Kosunalp, Selahattin</au><au>Iliev, Teodor</au><au>Stoyanov, Ivaylo</au><au>Beloev, Ivan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Comprehensive Survey: Evaluating the Efficiency of Artificial Intelligence and Machine Learning Techniques on Cyber Security Solutions</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2024</date><risdate>2024</risdate><volume>12</volume><spage>12229</spage><epage>12256</epage><pages>12229-12256</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Given the continually rising frequency of cyberattacks, the adoption of artificial intelligence methods, particularly Machine Learning (ML), Deep Learning (DL), and Reinforcement Learning (RL), has become essential in the realm of cybersecurity. These techniques have proven to be effective in detecting and mitigating cyberattacks, which can cause significant harm to individuals, organizations, and even countries. Machine learning algorithms use statistical methods to identify patterns and anomalies in large datasets, enabling security analysts to detect previously unknown threats. Deep learning, a subfield of ML, has shown great potential in improving the accuracy and efficiency of cybersecurity systems, particularly in image and speech recognition. On the other hand, RL is again a subfield of machine learning that trains algorithms to learn through trial and error, making it particularly effective in dynamic environments. We also evaluated the usage of ChatGPT-like AI tools in cyber-related problem domains on both sides, positive and negative. This article provides an overview of how ML, DL, and RL are applied in cybersecurity, including their usage in malware detection, intrusion detection, vulnerability assessment, and other areas. The paper also specifies several research questions to provide a more comprehensive framework to investigate the efficiency of AI and ML models in the cybersecurity domain. The state-of-the-art studies using ML, DL, and RL models are evaluated in each Section based on the main idea, techniques, and important findings. It also discusses these techniques' challenges and limitations, including data quality, interpretability, and adversarial attacks. Overall, the use of ML, DL, and RL in cybersecurity holds great promise for improving the effectiveness of security systems and enhancing our ability to protect against cyberattacks. Therefore, it is essential to continue developing and refining these techniques to address the ever-evolving nature of cyber threats. Besides, some promising solutions that rely on machine learning, deep learning, and reinforcement learning are susceptible to adversarial attacks, underscoring the importance of factoring in this vulnerability when devising countermeasures against sophisticated cyber threats. We also concluded that ChatGPT can be a valuable tool for cybersecurity, but it should be noted that ChatGPT-like tools can also be manipulated to threaten the integrity, confidentiality, and availability of data.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2024.3355547</doi><tpages>28</tpages><orcidid>https://orcid.org/0000-0003-2014-1970</orcidid><orcidid>https://orcid.org/0000-0002-2223-3927</orcidid><orcidid>https://orcid.org/0000-0001-9824-1504</orcidid><orcidid>https://orcid.org/0000-0003-2214-8092</orcidid><orcidid>https://orcid.org/0000-0002-1071-2541</orcidid><orcidid>https://orcid.org/0000-0003-0737-1966</orcidid><orcidid>https://orcid.org/0000-0003-2899-4679</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2169-3536
ispartof IEEE access, 2024, Vol.12, p.12229-12256
issn 2169-3536
2169-3536
language eng
recordid cdi_proquest_journals_2918610553
source IEEE Open Access Journals; DOAJ Directory of Open Access Journals; SWEPUB Freely available online; EZB-FREE-00999 freely available EZB journals
subjects AI tools
Algorithms
Artificial intelligence
Chatbots
Computer security
Cyberattacks and solutions
Cybersecurity
Deep learning
Efficiency
Fraud
Identification methods
Intrusion detection systems
Machine learning
Prediction algorithms
Reinforcement learning
Security
Security systems
Speech recognition
State-of-the-art reviews
Statistical methods
System effectiveness
Telecommunication traffic
title A Comprehensive Survey: Evaluating the Efficiency of Artificial Intelligence and Machine Learning Techniques on Cyber Security Solutions
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T19%3A29%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Comprehensive%20Survey:%20Evaluating%20the%20Efficiency%20of%20Artificial%20Intelligence%20and%20Machine%20Learning%20Techniques%20on%20Cyber%20Security%20Solutions&rft.jtitle=IEEE%20access&rft.au=Ozkan-Okay,%20Merve&rft.date=2024&rft.volume=12&rft.spage=12229&rft.epage=12256&rft.pages=12229-12256&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2024.3355547&rft_dat=%3Cproquest_ieee_%3E2918610553%3C/proquest_ieee_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2918610553&rft_id=info:pmid/&rft_ieee_id=10403908&rft_doaj_id=oai_doaj_org_article_8df1ed1bef5e41a5b155e1273bdad72e&rfr_iscdi=true