Cybersecurity Deep: Approaches, Attacks Dataset, and Comparative Study | Publicación