[1]
Howard, C.C. et al. 2026. Analyzing Temporal Dependency Structures in Cyber security: A Case Study of Network Traffic Anomalies. American Journal of Data Science and Artificial Intelligence. 2, 1 (Feb. 2026), 22–32. DOI:https://doi.org/10.54536/ajdsai.v2i1.5081.