“…None of the 14 papers publicly presented their datasets. These research papers were segmented into seven that relied on runtime traces [13], [14], [15], [16], [17], [24], [25], four that relied on network traces, [18], [19], [20], [26] and three that relied on static analysis of the application under test (AUT) (i.e., vulnerable program) [21], [22], [23]. Of the 14 papers, 13 did not discuss feature importance and only one paper discussed feature importance by providing a single table with the Fisher score of each feature [16].…”