[1]
“Using AI for Real-Time Threat Detection and Anomaly Identification”, JDACM, vol. 1, no. 02, pp. 26–33, Apr. 2025, Accessed: Oct. 13, 2025. [Online]. Available: https://jdacm.com/index.php/jdacm/article/view/14