[1]
Eleanor T. Brookstone, “From Anomaly Detection to AI-Optimized SOC Playbooks: A Unified Analytical Approach to Ransomware and Insider Threats”, gmj, vol. 4, no. 12, pp. 100–107, Dec. 2025, Accessed: Apr. 12, 2026. [Online]. Available: https://www.grpublishing.org/journals/index.php/gmj/article/view/294