“…Application Areas Published Papers Total Intrusion detection [2], [36], [1], [37], [29], [38], [4], [39], [40], [30], [41], [42], [43], [44], [45], [27], [46], [47], [48], [49], [50], [32], [51], [52], [53], [54], [26], [33], [55], [56], [57], [58], [59], [60], [28], [61], [62], [34], [63], [64], [65] 41…”