“…Langin et al [84], Le et al [86] , Malondkar et al [85] Auto Encoder (AE) feature learning model, insider threat detection, malware detection, intrusion detection system Yousefi et al [92], Liu et al [93], Wang et al [94], Yan et al [95] Restricted Boltzmann Machine (RBM) network anomaly detection, DoS attack detection, intrusion detection Fiore et al [99], Imamverdiyev et al [100], Mayuranathan et al [125], Alom et al [126] Deep Belief Networks (DBN) intrusion detection system and optimization, phishing detection, malware detection Salama et al [104], Qu et al [105], Wei et al [103], Yi et al [127], Arshey et al [128], Saif et al [129], Hou et al [130] Generative Adversarial Network (GAN) zero-day malware detection, botnet detection, intrusion detection systems Kim et al [108], Li et al [110], Yin et al [109], Merino et al [111] Deep Transfer Learning (DTL or Deep TL) intrusion detection system, detecting unknown network attacks, malware detection, malicious software classification Wu et al [114], Zhao et al [117], Gao et al [118], Rezende et al [119] Deep Reinforcement Learning (DRL or deep RL) intrusion detection system, malware detection, Security and Privacy Lopez et al [131], Sethi et al [132], Fang et al [133], Shakeel et al [134] the quality of the security data and the performance of the learning algorithms.…”