“…Over the years, several survey papers (e.g., Kwon et al, 3 Tong et al, 4 Gardiner and Nagaraja, 5 Shanbhogue and Beena, 8 Liu et al, 9 Bou-Harb et al, 10 Luh et al, 11 Shabut et al, 12 Humayed et al, 13 Wang et al, 14 Deng et al, 15 Bou-Harb, 16 Beasley et al, 17 Ucci et al, 18 Ye et al, 19 Bazrafshan et al, 20 Souri and Hosseini, 21 Barriga and Yoo, 22 Bontupalli and Taha, 23 Buczak and Guven, 24 Resende and Drummond, 25 KishorWagh et al, 26 Liu et al, 27 Sultana et al, 28 Gupta et al, 29 and Wang et al 33 ) and case studies (e.g., Al-Enezi et al 31 and Alotaibi et al 32 ) on the use of computational intelligence in cybersecurity have been published, but with limited scope. For instance, Humayed et al, 13 Wang et al, 14 Deng et al, 15 Bou-Harb, 16 and Beasley et al 17 discussed only cybersecurity related to cyber-physical systems (e.g., smart grid 33 ) or specific applications (e.g., block-chain 34 ), while Ucci et al, 18 Ye et al, 19 Bazrafshan et al, 20 Souri and Hosseini, 21 and Barriga and Yoo 23 gave details about DM and ML techniques used for malware detection.…”