Artificial intelligence, cyber-threats and Industry 4.0: Challenges and opportunities

A Bécue, I Praça, J Gama - Artificial Intelligence Review, 2021‏ - Springer
This survey paper discusses opportunities and threats of using artificial intelligence (AI)
technology in the manufacturing sector with consideration for offensive and defensive uses …

[HTML][HTML] Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions towards automation, intelligence and transparent cybersecurity modeling for critical …

IH Sarker, H Janicke, MA Ferrag, A Abuadbba - Internet of Things, 2024‏ - Elsevier
Critical infrastructure (CI) typically refers to the essential physical and virtual systems, assets,
and services that are vital for the functioning and well-being of a society, economy, or nation …

A survey of random forest based methods for intrusion detection systems

PAA Resende, AC Drummond - ACM Computing Surveys (CSUR), 2018‏ - dl.acm.org
Over the past decades, researchers have been proposing different Intrusion Detection
approaches to deal with the increasing number and complexity of threats for computer …

Review on security of internet of things authentication mechanism

T Nandy, MYIB Idris, RM Noor, LM Kiah, LS Lun… - IEEE …, 2019‏ - ieeexplore.ieee.org
Internet of things (IoT) is considered as a collection of heterogeneous devices, such as
sensors, Radio-frequency identification (RFID) and actuators, which form a huge network …

[HTML][HTML] Safety, security and privacy in machine learning based internet of things

G Abbas, A Mehmood, M Carsten… - Journal of Sensor and …, 2022‏ - mdpi.com
Recent developments in communication and information technologies, especially in the
internet of things (IoT), have greatly changed and improved the human lifestyle. Due to the …

{HorusEye}: A realtime {IoT} malicious traffic detection framework using programmable switches

Y Dong, Q Li, K Wu, R Li, D Zhao, G Tyson… - 32nd USENIX Security …, 2023‏ - usenix.org
The ever-growing volume of IoT traffic brings challenges to IoT anomaly detection systems.
Existing anomaly detection systems perform all traffic detection on the control plane, which …

Hybridizing genetic algorithm and grey wolf optimizer to advance an intelligent and lightweight intrusion detection system for IoT wireless networks

A Davahli, M Shamsi, G Abaei - Journal of Ambient Intelligence and …, 2020‏ - Springer
Open wireless sensor networks (WSNs) in Internet of things (IoT) has led to many zero-day
security attacks. Since intrusion detection is a key security solution, this paper presents a …

[HTML][HTML] An unsupervised TinyML approach applied to the detection of urban noise anomalies under the smart cities environment

SS Hammad, D Iskandaryan, S Trilles - Internet of Things, 2023‏ - Elsevier
Abstract Artificial Intelligence of Things (AIoT) is an emerging area of interest, and this can
be used to obtain knowledge and take better decisions in the same Internet of Things (IoT) …

[HTML][HTML] Cyberprotection in IoT environments: A dynamic rule-based solution to defend smart devices

P Nespoli, D Díaz-López, FG Mármol - Journal of Information Security and …, 2021‏ - Elsevier
Undoubtedly, modern human digital lives are every day more and more connected, and the
revolution of “everything connected” is already becoming a reality. Indeed, humans live in …

Rule generation for signature based detection systems of cyber attacks in iot environments

YN Soe, Y Feng, PI Santosa, R Hartanto… - Bulletin of Networking …, 2019‏ - ww.bncss.org
Many modern attacks are targeting the IoT devices in recent year. Most of IoT attacks are
botnet attacks. Even though there are many detections and preventing systems for cyber …