Artificial intelligence, cyber-threats and Industry 4.0: challenges and opportunities
Published 2021 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Artificial intelligence, cyber-threats and Industry 4.0: challenges and opportunities
Authors
Keywords
-
Journal
ARTIFICIAL INTELLIGENCE REVIEW
Volume -, Issue -, Pages -
Publisher
Springer Science and Business Media LLC
Online
2021-02-04
DOI
10.1007/s10462-020-09942-2
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- The AI-Based Cyber Threat Landscape
- (2020) Nektaria Kaloudi et al. ACM COMPUTING SURVEYS
- Visual-Based Defect Detection and Classification Approaches for Industrial Applications—A SURVEY
- (2020) Tamás Czimmermann et al. SENSORS
- Artificial Intelligence in the Cyber Domain: Offense and Defense
- (2020) Thanh Cong Truong et al. Symmetry-Basel
- Cyber security meets artificial intelligence: a survey
- (2019) Jian-hua Li Frontiers of Information Technology & Electronic Engineering
- Review of Artificial Intelligence Adversarial Attack and Defense Technologies
- (2019) Shilin Qiu et al. Applied Sciences-Basel
- From Intelligence Science to Intelligent Manufacturing
- (2019) Lihui Wang Engineering
- Opportunities and Challenges of Artificial Intelligence for Green Manufacturing in the Process Industry
- (2019) Shuai Mao et al. Engineering
- Role of swarm and evolutionary algorithms for intrusion detection system: A survey
- (2019) Ankit Thakkar et al. Swarm and Evolutionary Computation
- A Survey of Random Forest Based Methods for Intrusion Detection Systems
- (2018) Paulo Angelo Alves Resende et al. ACM COMPUTING SURVEYS
- Artificial Intelligence and the Attack/Defense Balance
- (2018) Bruce Schneier IEEE SECURITY & PRIVACY
- Intelligent Autonomous Vehicles in digital supply chains: A framework for integrating innovations towards sustainable value networks
- (2018) Dimitrios Bechtsis et al. JOURNAL OF CLEANER PRODUCTION
- Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning
- (2018) Battista Biggio et al. PATTERN RECOGNITION
- Study of long short-term memory in flow-based network intrusion detection system
- (2018) Lee Nicholas et al. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS
- Peeking inside the black-box: A survey on Explainable Artificial Intelligence (XAI)
- (2018) Amina Adadi et al. IEEE Access
- Supply chain risk management and artificial intelligence: state of the art and future research directions
- (2018) George Baryannis et al. INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH
- Cloud-based manufacturing equipment and big data analytics to enable on-demand manufacturing services
- (2018) Yuqian Lu et al. ROBOTICS AND COMPUTER-INTEGRATED MANUFACTURING
- Big data analytics based fault prediction for shop floor scheduling
- (2017) Wei Ji et al. JOURNAL OF MANUFACTURING SYSTEMS
- Applications of artificial intelligence in intelligent manufacturing: a review
- (2017) Bo-hu Li et al. Frontiers of Information Technology & Electronic Engineering
- Cyber-Physical Systems Security—A Survey
- (2017) Abdulmalik Humayed et al. IEEE Internet of Things Journal
- Apache Spark
- (2016) Matei Zaharia et al. COMMUNICATIONS OF THE ACM
- A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
- (2016) Anna L. Buczak et al. IEEE Communications Surveys and Tutorials
- Definitions of predictability for Cyber Physical Systems
- (2016) Beilei Sun et al. JOURNAL OF SYSTEMS ARCHITECTURE
- Virtual reality applications in manufacturing industries: Past research, present findings, and future directions
- (2015) SangSu Choi et al. CONCURRENT ENGINEERING-RESEARCH AND APPLICATIONS
- A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks
- (2015) Amin Karami et al. NEUROCOMPUTING
- Support vector machines under adversarial label contamination
- (2015) Huang Xiao et al. NEUROCOMPUTING
- A survey of cyber security management in industrial control systems
- (2015) William Knowles et al. International Journal of Critical Infrastructure Protection
- Revealing Cascading Failure Vulnerability in Power Grids Using Risk-Graph
- (2014) Yihai Zhu et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns
- (2013) Gideon Creech et al. IEEE TRANSACTIONS ON COMPUTERS
- A research survey: review of AI solution strategies of job shop scheduling problem
- (2013) Banu Çaliş et al. JOURNAL OF INTELLIGENT MANUFACTURING
- Search for the smallest random forest
- (2013) Minghui Wang et al. Statistics and Its Interface
- Swarm intelligence in intrusion detection: A survey
- (2011) C. Kolias et al. COMPUTERS & SECURITY
- Decision tree based light weight intrusion detection using a wrapper approach
- (2011) Siva S. Sivatha Sindhu et al. EXPERT SYSTEMS WITH APPLICATIONS
- From cloud computing to cloud manufacturing
- (2011) Xun Xu ROBOTICS AND COMPUTER-INTEGRATED MANUFACTURING
- Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods
- (2010) Mahbod Tavallaee et al. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND RE
- Security in Building Automation Systems
- (2009) Wolfgang Granzer et al. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started