Artificial intelligence, cyber-threats and Industry 4.0: Challenges and opportunities
This survey paper discusses opportunities and threats of using artificial intelligence (AI)
technology in the manufacturing sector with consideration for offensive and defensive uses …
technology in the manufacturing sector with consideration for offensive and defensive uses …
A detailed investigation and analysis of using machine learning techniques for intrusion detection
Intrusion detection is one of the important security problems in todays cyber world. A
significant number of techniques have been developed which are based on machine …
significant number of techniques have been developed which are based on machine …
Machine learning ddos detection for consumer internet of things devices
An increasing number of Internet of Things (IoT) devices are connecting to the Internet, yet
many of these devices are fundamentally insecure, exposing the Internet to a variety of …
many of these devices are fundamentally insecure, exposing the Internet to a variety of …
An empirical comparison of botnet detection methods
The results of botnet detection methods are usually presented without any comparison.
Although it is generally accepted that more comparisons with third-party methods may help …
Although it is generally accepted that more comparisons with third-party methods may help …
A survey on explainable anomaly detection
In the past two decades, most research on anomaly detection has focused on improving the
accuracy of the detection, while largely ignoring the explainability of the corresponding …
accuracy of the detection, while largely ignoring the explainability of the corresponding …
Anomaly detection: A survey
Anomaly detection is an important problem that has been researched within diverse
research areas and application domains. Many anomaly detection techniques have been …
research areas and application domains. Many anomaly detection techniques have been …
An overview of anomaly detection techniques: Existing solutions and latest technological trends
As advances in networking technology help to connect the distant corners of the globe and
as the Internet continues to expand its influence as a medium for communications and …
as the Internet continues to expand its influence as a medium for communications and …
Network attacks: Taxonomy, tools and systems
To prevent and defend networks from the occurrence of attacks, it is highly essential that we
have a broad knowledge of existing tools and systems available in the public domain. Based …
have a broad knowledge of existing tools and systems available in the public domain. Based …
Data preprocessing for anomaly based network intrusion detection: A review
JJ Davis, AJ Clark - computers & security, 2011 - Elsevier
Data preprocessing is widely recognized as an important stage in anomaly detection. This
paper reviews the data preprocessing techniques used by anomaly-based network intrusion …
paper reviews the data preprocessing techniques used by anomaly-based network intrusion …
[PDF][PDF] Outlier detection: A survey
Outlier detection has been a very important concept in the realm of data analysis. Recently,
several application domains have realized the direct map** between outliers in data and …
several application domains have realized the direct map** between outliers in data and …