Artificial intelligence, cyber-threats and Industry 4.0: Challenges and opportunities

A Bécue, I Praça, J Gama - Artificial Intelligence Review, 2021‏ - Springer
This survey paper discusses opportunities and threats of using artificial intelligence (AI)
technology in the manufacturing sector with consideration for offensive and defensive uses …

A comprehensive survey of databases and deep learning methods for cybersecurity and intrusion detection systems

D Gümüşbaş, T Yıldırım, A Genovese… - IEEE Systems …, 2020‏ - ieeexplore.ieee.org
This survey presents a comprehensive overview of machine learning methods for
cybersecurity intrusion detection systems, with a specific focus on recent approaches based …

Identification of malicious activities in industrial internet of things based on deep learning models

ALH Muna, N Moustafa, E Sitnikova - Journal of information security and …, 2018‏ - Elsevier
Abstract Internet Industrial Control Systems (IICSs) that connect technological appliances
and services with physical systems have become a new direction of research as they face …

Novel geometric area analysis technique for anomaly detection using trapezoidal area estimation on large-scale networks

N Moustafa, J Slay, G Creech - IEEE transactions on big data, 2017‏ - ieeexplore.ieee.org
The prevalence of interconnected appliances and ubiquitous computing face serious threats
from the hostile activities of network attackers. Conventional Intrusion Detection Systems …

Introducing deep learning self-adaptive misuse network intrusion detection systems

D Papamartzivanos, FG Mármol, G Kambourakis - IEEE access, 2019‏ - ieeexplore.ieee.org
The intrusion detection systems (IDSs) are essential elements when it comes to the
protection of an ICT infrastructure. A misuse IDS is a stable method that can achieve high …

The use of computational intelligence in intrusion detection systems: A review

SX Wu, W Banzhaf - Applied soft computing, 2010‏ - Elsevier
Intrusion detection based upon computational intelligence is currently attracting
considerable interest from the research community. Characteristics of computational …

A systematic survey on multi-step attack detection

J Navarro, A Deruyver, P Parrend - Computers & Security, 2018‏ - Elsevier
Since the beginning of the Internet, cyberattacks have threatened users and organisations.
They have become more complex concurrently with computer networks. Nowadays …

Recent advances in artificial immune systems: models and applications

D Dasgupta, S Yu, F Nino - Applied Soft Computing, 2011‏ - Elsevier
The immune system is a remarkable information processing and self learning system that
offers inspiration to build artificial immune system (AIS). The field of AIS has obtained a …

A survey on intrusion detection and prevention in wireless ad-hoc networks

K Khan, A Mehmood, S Khan, MA Khan, Z Iqbal… - Journal of Systems …, 2020‏ - Elsevier
Ad hoc networks have been serving us in one way or the other, for two decades, through
their vast variety of applications in majority fields. Due to their features such as hostile …

[کتاب][B] Immunological computation: theory and applications

D Dasgupta, F Nino - 2008‏ - taylorfrancis.com
Clearly, nature has been very effective in creating organisms that are capable of protecting
themselves against a wide variety of pathogens such as bacteria, fungi, and parasites. The …