Survey Paper, 20 Sources
Evaluate the efficiency of AI, machine learning (ML), and deep learning
(DL) architectures in identifying and responding to network intrusions, based on 20 sources
50ish sources are provided, pick 20, preferably from top tier such as IEEE, ACM, Science Direct