AI-based modeling: techniques, applications and research issues towards automation, intelligent and smart systems
IH Sarker - SN Computer Science, 2022 - Springer
Artificial intelligence (AI) is a leading technology of the current age of the Fourth Industrial
Revolution (Industry 4.0 or 4IR), with the capability of incorporating human behavior and …
Revolution (Industry 4.0 or 4IR), with the capability of incorporating human behavior and …
A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions
With the increase in the usage of the Internet, a large amount of information is exchanged
between different communicating devices. The data should be communicated securely …
between different communicating devices. The data should be communicated securely …
The role of artificial intelligence in supply chain management: map** the territory
The study aims to identify the current trends, gaps, and research opportunities in research
pertaining to the disruptive field of artificial intelligence (AI) applications in supply chain …
pertaining to the disruptive field of artificial intelligence (AI) applications in supply chain …
Real-time big data processing for anomaly detection: A survey
The advent of connected devices and omnipresence of Internet have paved way for
intruders to attack networks, which leads to cyber-attack, financial loss, information theft in …
intruders to attack networks, which leads to cyber-attack, financial loss, information theft in …
A comprehensive survey on network anomaly detection
Nowadays, there is a huge and growing concern about security in information and
communication technology among the scientific community because any attack or anomaly …
communication technology among the scientific community because any attack or anomaly …
Multi-head CNN–RNN for multi-time series anomaly detection: An industrial case study
Detecting anomalies in time series data is becoming mainstream in a wide variety of
industrial applications in which sensors monitor expensive machinery. The complexity of this …
industrial applications in which sensors monitor expensive machinery. The complexity of this …
A systematic literature review of IoT time series anomaly detection solutions
The rapid spread of the Internet of Things (IoT) devices has prompted many people and
companies to adopt the IoT paradigm, as this paradigm allows the automation of several …
companies to adopt the IoT paradigm, as this paradigm allows the automation of several …
A hybrid intrusion detection system based on ABC-AFS algorithm for misuse and anomaly detection
Due to the widespread use of the internet, computer systems are prone to information theft
that has led to the emergence of Intrusion Detection Systems (IDSs). Various approaches …
that has led to the emergence of Intrusion Detection Systems (IDSs). Various approaches …
Machine learning in network anomaly detection: A survey
Anomalies could be the threats to the network that have ever/never happened. To protect
networks against malicious access is always challenging even though it has been studied …
networks against malicious access is always challenging even though it has been studied …
A survey and taxonomy of the fuzzy signature-based intrusion detection systems
M Masdari, H Khezri - Applied Soft Computing, 2020 - Elsevier
Organizations that benefit from information technologies are vulnerable to various attacks
and malicious behaviors. Intrusion Detection Systems (IDS) are one of the main lines of …
and malicious behaviors. Intrusion Detection Systems (IDS) are one of the main lines of …