Research on Machine Learning-Based Threat Detection and Security Defense Systems for Telecom Operator Networks
Main Article Content
Abstract
Article Details
Issue
Section
How to Cite
References
1. A. Manoharan and M. Sarker, “Revolutionizing cybersecurity: Unleashing the power of artificial intelligence and machine learning for next-generation threat detection,” 2023. DOI: https://www. doi. org/10.56726/IRJMETS32644, 1.
2. M. N. Al-Mhiqani, R. Ahmad, Z. Zainal Abidin, W. Yassin, A. Hassan, K. H. Abdulkareem, et al., “A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations,” Applied Sciences, vol. 10, no. 15, 5208, 2020.
3. G. Ying, “Cloud computing and machine learning-driven security optimization and threat detection mechanisms for telecom operator networks,” Artificial Intelligence and Digital Technology, vol. 2, no. 1, pp. 98–114, 2025.
4. F. R. Alzaabi and A. Mehmood, “A review of recent advances, challenges, and opportunities in malicious insider threat detection using machine learning methods,” IEEE Access, vol. 12, pp. 30907-30927, 2024.
5. D. D. Rao, S. Madasu, S. R. Gunturu, C. D’britto, and J. Lopes, “Cybersecurity threat detection using machine learning in cloud-based environments: A comprehensive study,” Int. J. Recent and Innovation Trends in Computing and Communication, vol. 12, no. 1, pp. 285–290, 2024.
6. B. Zhang, Z. Lin, and Y. Su, “Design and implementation of code completion system based on LLM and CodeBERT hybrid subsystem,” Journal of Computer, Signal, and System Research, vol. 2, no. 6, pp. 49–56, 2025.
7. S. Li, K. Liu, and X. Chen, "A context-aware personalized recommendation framework integrating user clustering and BERT-based sentiment analysis," Journal of Computer, Signal, and System Research, vol. 2, no. 6, pp. 100–108, 2025.
8. R. Luo, X. Chen, and Z. Ding, "SeqUDA-Rec: Sequential user behavior enhanced recommendation via global unsupervised data augmentation for personalized content marketing," arXiv preprint arXiv:2509.17361, 2025.C.
9. L. Cheong, “Research on AI Security Strategies and Practical Approaches for Risk Management”, J. Comput. Signal Syst. Res., vol. 2, no. 7, pp. 98–115, Dec. 2025, doi: 10.71222/17gqja14.
10. H. M. Farooq and N. M. Otaibi, “Optimal machine learning algorithms for cyber threat detection,” in 2018 UKSim-AMSS 20th Int. Conf. Computer Modelling and Simulation (UKSim), 2018, pp. 32-37.
11. M. R. Labu and M. F. Ahammed, “Next-Generation cyber threat detection and mitigation strategies: a focus on artificial intelligence and machine learning,” J. Computer Science and Technology Studies, vol. 6, no. 1, pp. 179-188, 2024.
12. V. Ambalavanan, “Cyber threats detection and mitigation using machine learning,” in Handbook of research on machine and deep learning applications for cyber security, pp. 132-149, IGI Global, 2020.
13. N. Katiyar, M. S. Tripathi, M. P. Kumar, M. S. Verma, A. K. Sahu, and S. Saxena, “AI and Cyber-Security: Enhancing threat detection and response with machine learning,” Educational Administration: Theory and Practice, vol. 30, no. 4, pp. 6273-6282, 2024.
14. S. A. Vaddadi, R. Vallabhaneni, and P. Whig, “Utilizing AI and machine learning in cybersecurity for sustainable development through enhanced threat detection and mitigation,” Int. J. Sustainable Development Through AI, ML and IoT, vol. 2, no. 2, pp. 1-8, 2023.
15. M. Choraś and R. Kozik, “Machine learning techniques for threat modeling and detection,” in Security and Resilience in Intelligent Data-Centric Systems and Communication Networks, pp. 179-192, Academic Press, 2018.
16. W. Sun, “Integration of market-oriented development models and marketing strategies in real estate,” European Journal of Business, Economics & Management, vol. 1, no. 3, pp. 45–52, 2025.
17. X. Zhang, K. Li, Y. Dai, and S. Yi, “Modeling the land cover change in Chesapeake Bay area for precision conservation and green infrastructure planning,” Remote Sensing, vol. 16, no. 3, p. 545, 2024. https://doi.org/10.3390/rs16030545
18. F. Gao, “The role of data analytics in enhancing digital platform user engagement and retention,” Journal of Media, Journalism & Communication Studies, vol. 1, no. 1, pp. 10–17, 2025, doi: 10.71222/z27xzp64.
19. S. Yuan, “Data Flow Mechanisms and Model Applications in Intelligent Business Operation Platforms”, Financial Economics Insights, vol. 2, no. 1, pp. 144–151, 2025, doi: 10.70088/m66tbm53.