Artificial intelligence, cyber-threats and Industry 4.0: Challenges and opportunities

A Bécue, I Praça, J Gama - Artificial Intelligence Review, 2021 - Springer
This survey paper discusses opportunities and threats of using artificial intelligence (AI)
technology in the manufacturing sector with consideration for offensive and defensive uses …

A guided tour to approximate string matching

G Navarro - ACM computing surveys (CSUR), 2001 - dl.acm.org
We survey the current techniques to cope with the problem of string matching that allows
errors. This is becoming a more and more relevant issue for many fast growing areas such …

Statistical fraud detection: A review

RJ Bolton, DJ Hand - Statistical science, 2002 - projecteuclid.org
Fraud is increasing dramatically with the expansion of modern technology and the global
superhighways of communication, resulting in the loss of billions of dollars worldwide each …

Intrusion detection using sequences of system calls

SA Hofmeyr, S Forrest… - Journal of computer …, 1998 - content.iospress.com
A method is introduced for detecting intrusions at the level of privileged processes. Evidence
is given that short sequences of system calls executed by running processes are a good …

DAG-based attack and defense modeling: Don't miss the forest for the attack trees

B Kordy, L Piètre-Cambacédès, P Schweitzer - Computer science review, 2014 - Elsevier
This paper presents the current state of the art on attack and defense modeling approaches
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …

Effective detection of sophisticated online banking fraud on extremely imbalanced data

W Wei, J Li, L Cao, Y Ou, J Chen - World Wide Web, 2013 - Springer
Sophisticated online banking fraud reflects the integrative abuse of resources in social,
cyber and physical worlds. Its detection is a typical use case of the broad-based Wisdom …

Towards a taxonomy of intrusion-detection systems

H Debar, M Dacier, A Wespi - Computer networks, 1999 - Elsevier
Intrusion-detection systems aim at detecting attacks against computer systems and
networks, or against information systems in general, as it is difficult to provide provably …

A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier

L Koc, TA Mazzuchi, S Sarkani - Expert Systems with Applications, 2012 - Elsevier
With increasing Internet connectivity and traffic volume, recent intrusion incidents have
reemphasized the importance of network intrusion detection systems for combating …

[PDF][PDF] Intrusion detection systems: A survey and taxonomy

S Axelsson - 2000 - Citeseer
This paper presents a taxonomy of intrusion detection systems that is then used to survey
and classify a number of research prototypes. The taxonomy consists of a classification first …

[HTML][HTML] Artificial neural networks for misuse detection

J Cannady - Proceedings of the 1998 National Information …, 1998 - books.google.com
Misuse detection is the process of attempting to identify instances of network attacks by
comparing current activity against the expected actions of an intruder. Most current …