Artificial intelligence, cyber-threats and Industry 4.0: Challenges and opportunities
This survey paper discusses opportunities and threats of using artificial intelligence (AI)
technology in the manufacturing sector with consideration for offensive and defensive uses …
technology in the manufacturing sector with consideration for offensive and defensive uses …
A review of local outlier factor algorithms for outlier detection in big data streams
Outlier detection is a statistical procedure that aims to find suspicious events or items that
are different from the normal form of a dataset. It has drawn considerable interest in the field …
are different from the normal form of a dataset. It has drawn considerable interest in the field …
An enhanced intrusion detection model based on improved kNN in WSNs
Aiming at the intrusion detection problem of the wireless sensor network (WSN), considering
the combined characteristics of the wireless sensor network, we consider setting up a …
the combined characteristics of the wireless sensor network, we consider setting up a …
A comparative evaluation of unsupervised anomaly detection algorithms for multivariate data
Anomaly detection is the process of identifying unexpected items or events in datasets,
which differ from the norm. In contrast to standard classification tasks, anomaly detection is …
which differ from the norm. In contrast to standard classification tasks, anomaly detection is …
A review of novelty detection
Novelty detection is the task of classifying test data that differ in some respect from the data
that are available during training. This may be seen as “one-class classification”, in which a …
that are available during training. This may be seen as “one-class classification”, in which a …
From intrusion detection to attacker attribution: A comprehensive survey of unsupervised methods
Over the last five years there has been an increase in the frequency and diversity of network
attacks. This holds true, as more and more organizations admit compromises on a daily …
attacks. This holds true, as more and more organizations admit compromises on a daily …
A survey on device behavior fingerprinting: Data sources, techniques, application scenarios, and datasets
In the current network-based computing world, where the number of interconnected devices
grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at …
grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at …
Anomaly-based network intrusion detection: Techniques, systems and challenges
The Internet and computer networks are exposed to an increasing number of security
threats. With new types of attacks appearing continually, develo** flexible and adaptive …
threats. With new types of attacks appearing continually, develo** flexible and adaptive …
An overview of anomaly detection techniques: Existing solutions and latest technological trends
As advances in networking technology help to connect the distant corners of the globe and
as the Internet continues to expand its influence as a medium for communications and …
as the Internet continues to expand its influence as a medium for communications and …
Novelty detection: a review—part 1: statistical approaches
Novelty detection is the identification of new or unknown data or signal that a machine
learning system is not aware of during training. Novelty detection is one of the fundamental …
learning system is not aware of during training. Novelty detection is one of the fundamental …