[1]
“AI-Driven Security Operations and Anomaly-Centric Threat Investigation: Integrating SOC Playbooks, Insider Threat Analytics, and Zero Trust Paradigms ”, elriijmrd, vol. 12, no. 11, pp. 759–767, Nov. 2025, Accessed: Feb. 21, 2026. [Online]. Available: https://researchcitations.org/index.php/elriijmrd/article/view/83