@incollection{, DB0EB41DFC650B3E3490DDC5DCD9B5FB , author={{MurtalaMohammad} and {IbrahimGoni}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}2211522 } @book{b0, , title={{Deep Reinforcement learning for cyber security}} , author={{ TNThanh } and { JRVijay }} arxiv: 1906.05799 , year={2019} } @incollection{b1, , title={{Diverging deep learning cognitive computing techniques into cyber forensics.Forensics science international library}} , author={{ MKNickson } and { RKVictor } and { HSVenter }} , journal={{Science Direct}} 1 , year={2019} } @incollection{b2, , title={{Applying data mining techniques in cybercrimes}} , author={{ MAKhan } and { SKPradham } and { H } and { FatimaM }} , booktitle={{anti-cybercrime (ICACC) 2017 2 nd International conference on IEEE}} , year={2017} } @book{b3, , title={{Recognition of abnormal traffic using deep learning neural network and fuzzy logic IEEE}} , author={{ OSAmosov } and { YSIvanov } and { GAmosova }} , year={2019. 2019} }