Next Article in Journal
Performance Evaluation of Standard and Modified OLSR Protocols for Uncoordinated UAV Ad-Hoc Networks in Search and Rescue Environments
Previous Article in Journal
Declarative Secure Placement of FaaS Orchestrations in the Cloud-Edge Continuum
 
 
Review
Peer-Review Record

A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions

Electronics 2023, 12(6), 1333; https://doi.org/10.3390/electronics12061333
by Ömer Aslan 1, Semih Serkant Aktuğ 2, Merve Ozkan-Okay 3,*, Abdullah Asim Yilmaz 4 and Erdal Akin 5
Reviewer 1:
Reviewer 2: Anonymous
Reviewer 3:
Reviewer 4:
Electronics 2023, 12(6), 1333; https://doi.org/10.3390/electronics12061333
Submission received: 11 February 2023 / Revised: 4 March 2023 / Accepted: 7 March 2023 / Published: 11 March 2023

Round 1

Reviewer 1 Report

This paper discusses the latest technical and non-technical solutions advances in identifying attacks in using trending technologies such as machine learning, deep learning, cloud platforms, big data and blockchain combined may be a promising solution for current and future cyber attacks, very detailed study, but there are some issues in the paper.

 

The abstract of this paper is too redundant in the introduction of the technology, and the author is requested to make a reduction to make the abstract concise and clear.

 

The introduction is not complete.To give gaps between the real situation and goals.What is the main question addressed by the research?

The first aspect of cyber security mentioned in the article is to protect information from attackers, why do you say this and is there any basis for it?

 

Paper needs English language corrections. Most of the sentences are very long and complex; break them into smaller and meaningful sentences.

The readability of this article can be further improved. We strongly suggest the author to check the syntax errors, grammar misuses and confusing sentences in this paper; in addition, the consistence of the format of citation should also be carefully checked.

In the references section, authors should check references so that all references have a uniform style and that some are old enough to meet the requirements of the journal.

Author Response

Thank you for your valuable comments. Necessary improvements have been made in line with your comments.

Regards.

Author Response File: Author Response.pdf

Reviewer 2 Report

In this paper, summariyation of cyber security problems is given, and the corresponding solutions based on technological advances are presented.

Although the scientific contribution is minor (new results are not presented, and there are no new quantitative analysis), the paper is well written. The references are adequate, and the paper can be usefull to the scietists that start research in this field.

Taking into account that this is a reveiw paper (not an article), I cam recommend its publication after the following minor changes:

- In Figure 3 text is not clearly visible, and I recommend authors to slightly incerase the figure itself and also increase the font size of the text in the figure;

- In line 536, the title of the subsection 2.3.5 has to start at the begining of the lew line;

- in line 569, unit should be written after the number;

- maybe an additional figures can be added, to make reading of the text more interesting. 

Author Response

Thank you for your valuable comments. Necessary improvements have been made in line with your comments.

Regards.

Author Response File: Author Response.pdf

Reviewer 3 Report

1.       Please revise abstract by including more details in a concise way.

2.       Literature review can be improved by including latest studies relevant to cyber security and AI, ML challenges and bottlenecks such as, Incorporation of Blockchain Technology for Different Smart Grid Applications: Architecture, Prospects, and Challenges; A Survey on IoT-Enabled Smart Grids Emerging, Applications, Challenges, and Outlook; Artificial Intelligence Enabled Demand Response: Prospects and Challenges in Smart Grid Environment; and many others in 2022 and 2023.

3.       Figs 4 and 5 are blurry. Have a look at all the figures.

4.       Why Results. There should be conclusion and future directions challenges,

 

5.       What are the benefits of this study for researchers.

 

Author Response

Thank you for your valuable comments. Necessary improvements have been made in line with your comments.

Regards.

Author Response File: Author Response.pdf

Reviewer 4 Report

The manuscript suffers from a lack of logical flow and structure. It hard for reader to trace their provided information.
The author has divided the content into numerous small subsections spanning sections 1 to 4, but many of these subsections contain only one or two sentences and fail to provide substantial information for the readers. For example, subsection 3.3. is particularly lacking in informative content.

Additionally, Table 3 should be cited for relevant cyber attack information, and several figures are of poor quality and need to be improved.

Finally, there are numerous typos present in the manuscript that the author should have corrected through proofreading prior to submission.

Author Response

Thank you for your valuable comments. Necessary improvements have been made in line with your comments.

Regards.

Author Response File: Author Response.pdf

Round 2

Reviewer 1 Report

The author has well addressed my previous concerns, but some of the latest references are missing, for example, Ensemble unsupervised autoencoders and Gaussian mixture model for cyberattack detection. Information Processing & Management, 2022,59(2), 102844.

Reviewer 3 Report

Authors have adressed my comments. Read carefully paper before final publication. For instance, reference 12 have 2 references merged. 

Reviewer 4 Report

Accept for publication

 

Back to TopTop