Artificial intelligence, cyber-threats and Industry 4.0: Challenges and opportunities

A Bécue, I Praça, J Gama - Artificial Intelligence Review, 2021 - Springer
This survey paper discusses opportunities and threats of using artificial intelligence (AI)
technology in the manufacturing sector with consideration for offensive and defensive uses …

A review of local outlier factor algorithms for outlier detection in big data streams

O Alghushairy, R Alsini, T Soule, X Ma - Big Data and Cognitive …, 2020 - mdpi.com
Outlier detection is a statistical procedure that aims to find suspicious events or items that
are different from the normal form of a dataset. It has drawn considerable interest in the field …

An enhanced intrusion detection model based on improved kNN in WSNs

G Liu, H Zhao, F Fan, G Liu, Q Xu, S Nazir - Sensors, 2022 - mdpi.com
Aiming at the intrusion detection problem of the wireless sensor network (WSN), considering
the combined characteristics of the wireless sensor network, we consider setting up a …

A comparative evaluation of unsupervised anomaly detection algorithms for multivariate data

M Goldstein, S Uchida - PloS one, 2016 - journals.plos.org
Anomaly detection is the process of identifying unexpected items or events in datasets,
which differ from the norm. In contrast to standard classification tasks, anomaly detection is …

A review of novelty detection

MAF Pimentel, DA Clifton, L Clifton, L Tarassenko - Signal processing, 2014 - Elsevier
Novelty detection is the task of classifying test data that differ in some respect from the data
that are available during training. This may be seen as “one-class classification”, in which a …

From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods

A Nisioti, A Mylonas, PD Yoo… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Over the last five years there has been an increase in the frequency and diversity of network
attacks. This holds true, as more and more organizations admit compromises on a daily …

A survey on device behavior fingerprinting: Data sources, techniques, application scenarios, and datasets

PMS Sánchez, JMJ Valero, AH Celdrán… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
In the current network-based computing world, where the number of interconnected devices
grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at …

Anomaly-based network intrusion detection: Techniques, systems and challenges

P Garcia-Teodoro, J Diaz-Verdejo… - computers & …, 2009 - Elsevier
The Internet and computer networks are exposed to an increasing number of security
threats. With new types of attacks appearing continually, develo** flexible and adaptive …

An overview of anomaly detection techniques: Existing solutions and latest technological trends

A Patcha, JM Park - Computer networks, 2007 - Elsevier
As advances in networking technology help to connect the distant corners of the globe and
as the Internet continues to expand its influence as a medium for communications and …

Novelty detection: a review—part 1: statistical approaches

M Markou, S Singh - Signal processing, 2003 - Elsevier
Novelty detection is the identification of new or unknown data or signal that a machine
learning system is not aware of during training. Novelty detection is one of the fundamental …