Artificial intelligence, cyber-threats and Industry 4.0: Challenges and opportunities

A Bécue, I Praça, J Gama - Artificial Intelligence Review, 2021 - Springer
This survey paper discusses opportunities and threats of using artificial intelligence (AI)
technology in the manufacturing sector with consideration for offensive and defensive uses …

A detailed investigation and analysis of using machine learning techniques for intrusion detection

P Mishra, V Varadharajan… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
Intrusion detection is one of the important security problems in todays cyber world. A
significant number of techniques have been developed which are based on machine …

Machine learning ddos detection for consumer internet of things devices

R Doshi, N Apthorpe, N Feamster - 2018 IEEE Security and …, 2018 - ieeexplore.ieee.org
An increasing number of Internet of Things (IoT) devices are connecting to the Internet, yet
many of these devices are fundamentally insecure, exposing the Internet to a variety of …

An empirical comparison of botnet detection methods

S Garcia, M Grill, J Stiborek, A Zunino - computers & security, 2014 - Elsevier
The results of botnet detection methods are usually presented without any comparison.
Although it is generally accepted that more comparisons with third-party methods may help …

A survey on explainable anomaly detection

Z Li, Y Zhu, M Van Leeuwen - ACM Transactions on Knowledge …, 2023 - dl.acm.org
In the past two decades, most research on anomaly detection has focused on improving the
accuracy of the detection, while largely ignoring the explainability of the corresponding …

Anomaly detection: A survey

V Chandola, A Banerjee, V Kumar - ACM computing surveys (CSUR), 2009 - dl.acm.org
Anomaly detection is an important problem that has been researched within diverse
research areas and application domains. Many anomaly detection techniques have been …

An overview of anomaly detection techniques: Existing solutions and latest technological trends

A Patcha, JM Park - Computer networks, 2007 - Elsevier
As advances in networking technology help to connect the distant corners of the globe and
as the Internet continues to expand its influence as a medium for communications and …

Network attacks: Taxonomy, tools and systems

N Hoque, MH Bhuyan, RC Baishya… - Journal of Network and …, 2014 - Elsevier
To prevent and defend networks from the occurrence of attacks, it is highly essential that we
have a broad knowledge of existing tools and systems available in the public domain. Based …

Data preprocessing for anomaly based network intrusion detection: A review

JJ Davis, AJ Clark - computers & security, 2011 - Elsevier
Data preprocessing is widely recognized as an important stage in anomaly detection. This
paper reviews the data preprocessing techniques used by anomaly-based network intrusion …

[PDF][PDF] Outlier detection: A survey

V Chandola, A Banerjee, V Kumar - ACM Computing Surveys, 2007 - researchgate.net
Outlier detection has been a very important concept in the realm of data analysis. Recently,
several application domains have realized the direct mapping between outliers in data and …