[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Sarker et al., 2024 - Google Patents

Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects

Sarker et al., 2024

View HTML
Document ID
14637324682512468693
Author
Sarker I
Janicke H
Mohsin A
Gill A
Maglaras L
Publication year
Publication venue
ICT Express

External Links

Snippet

Digital twins (DTs) are an emerging digitalization technology with a huge impact on today's innovations in both industry and research. DTs can significantly enhance our society and quality of life through the virtualization of a real-world physical system, providing greater …
Continue reading at www.sciencedirect.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30587Details of specialised database models
    • G06F17/30592Multi-dimensional databases and data warehouses, e.g. MOLAP, ROLAP
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30587Details of specialised database models
    • G06F17/30595Relational databases
    • G06F17/30598Clustering or classification
    • G06F17/30601Clustering or classification including cluster or class visualization or browsing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30587Details of specialised database models
    • G06F17/30595Relational databases
    • G06F17/30604Entity relationship models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/04Inference methods or devices
    • G06N5/043Distributed expert systems, blackboards

Similar Documents

Publication Publication Date Title
De Azambuja et al. Artificial intelligence-based cyber security in the context of industry 4.0—a survey
Alwahedi et al. Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models
Capuano et al. Explainable artificial intelligence in cybersecurity: A survey
Al-Mhiqani et al. A new intelligent multilayer framework for insider threat detection
Janeja Data analytics for cybersecurity
Sarker et al. Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects
Sarker Multi‐aspects AI‐based modeling and adversarial learning for cybersecurity intelligence and robustness: A comprehensive overview
Kotenko et al. Systematic literature review of security event correlation methods
Kheddar et al. Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review
US8793790B2 (en) System and method for insider threat detection
Inuwa et al. A comparative analysis of various machine learning methods for anomaly detection in cyber attacks on IoT networks
Levshun et al. A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities
Sarker et al. Multi-aspect rule-based AI: Methods, taxonomy, challenges and directions toward automation, intelligence and transparent cybersecurity modeling for critical infrastructures
Alsowail et al. Empirical detection techniques of insider threat incidents
Zhao et al. Cyber threat prediction using dynamic heterogeneous graph learning
Kothamali et al. Challenges in Applying ML to Cybersecurity
Paredes et al. On the importance of domain-specific explanations in AI-based cybersecurity systems (technical report)
Mahboubi et al. Evolving techniques in cyber threat hunting: A systematic review
Pritee et al. Machine learning and deep learning for user authentication and authorization in cybersecurity: A state-of-the-art review
Harahsheh et al. A survey of using machine learning in IoT security and the challenges faced by researchers
Al-Hawawreh et al. Explainable deep learning for attack intelligence and combating cyber–physical attacks
Arjunan Fraud Detection in NoSQL Database Systems Using Advanced Machine Learning
Masud et al. Explainable Artificial Intelligence for Resilient Security Applications in the Internet of Things
Asmar et al. Integrating machine learning for sustaining cybersecurity in digital banks
Rajasekar et al. Security analytics