Skip to main content
Top
Published in: Artificial Intelligence Review 5/2021

04-02-2021

Artificial intelligence, cyber-threats and Industry 4.0: challenges and opportunities

Authors: Adrien Bécue, Isabel Praça, João Gama

Published in: Artificial Intelligence Review | Issue 5/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This survey paper discusses opportunities and threats of using artificial intelligence (AI) technology in the manufacturing sector with consideration for offensive and defensive uses of such technology. It starts with an introduction of Industry 4.0 concept and an understanding of AI use in this context. Then provides elements of security principles and detection techniques applied to operational technology (OT) which forms the main attack surface of manufacturing systems. As some intrusion detection systems (IDS) already involve some AI-based techniques, we focus on existing machine-learning and data-mining based techniques in use for intrusion detection. This article presents the major strengths and weaknesses of the main techniques in use. We also discuss an assessment of their relevance for application to OT, from the manufacturer point of view. Another part of the paper introduces the essential drivers and principles of Industry 4.0, providing insights on the advent of AI in manufacturing systems as well as an understanding of the new set of challenges it implies. AI-based techniques for production monitoring, optimisation and control are proposed with insights on several application cases. The related technical, operational and security challenges are discussed and an understanding of the impact of such transition on current security practices is then provided in more details. The final part of the report further develops a vision of security challenges for Industry 4.0. It addresses aspects of orchestration of distributed detection techniques, introduces an approach to adversarial/robust AI development and concludes with human–machine behaviour monitoring requirements.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
go back to reference Adadi A, Berrada M (2018) Peeking inside the black-box: a survey on explainable artificial intelligence (XAI). IEEE Access 6:52138–52160 Adadi A, Berrada M (2018) Peeking inside the black-box: a survey on explainable artificial intelligence (XAI). IEEE Access 6:52138–52160
go back to reference Aickelin U, Greensmith J, Kim J, Bentley PJ, Twycross J Tedesco (2007) Immune system approaches to intrusion detection—a review. Nat Comput 413–466 Aickelin U, Greensmith J, Kim J, Bentley PJ, Twycross J Tedesco (2007) Immune system approaches to intrusion detection—a review. Nat Comput 413–466
go back to reference Althubiti SA, Jones EM, Roy K (2018) LSTM for anomaly-based network intrusion detection. In: 2018 28th International telecommunication networks and applications conference (ITNAC), pp 1–3 Althubiti SA, Jones EM, Roy K (2018) LSTM for anomaly-based network intrusion detection. In: 2018 28th International telecommunication networks and applications conference (ITNAC), pp 1–3
go back to reference Alzantot M, Sharma Y, Chakraborty S, Zhang H, Hsieh C-J, Srivastava M (2018) Genattack: practical black-box attacks with gradient-free optimization Alzantot M, Sharma Y, Chakraborty S, Zhang H, Hsieh C-J, Srivastava M (2018) Genattack: practical black-box attacks with gradient-free optimization
go back to reference Amor NB, Benferhat S, Elouedi Z (2004) Naive bayes vs decision trees in intrusion detection systems. In: Proceedings of the 2004 ACM symposium on applied computing, SAC’04. ACM, New York, pp 420–424 Amor NB, Benferhat S, Elouedi Z (2004) Naive bayes vs decision trees in intrusion detection systems. In: Proceedings of the 2004 ACM symposium on applied computing, SAC’04. ACM, New York, pp 420–424
go back to reference Anderson R, Fuloria S (2010) Who controls the off switch? In: 1st IEEE international conference on smart grid communications. IEEE, Los Alamitos, pp 96–101 Anderson R, Fuloria S (2010) Who controls the off switch? In: 1st IEEE international conference on smart grid communications. IEEE, Los Alamitos, pp 96–101
go back to reference Anderson D, Frivold T, Valdes A (1995) Next-generation intrusion detection expert system (NIDES) a summary Anderson D, Frivold T, Valdes A (1995) Next-generation intrusion detection expert system (NIDES) a summary
go back to reference Anderson HS, Woodbridge J, Filar B (2016) DeepDGA: adversarially-tuned domain generation and detection. In: Proceedings of the 2016 ACM workshop on artificial intelligence and security. ACM, New York, pp 13–21 Anderson HS, Woodbridge J, Filar B (2016) DeepDGA: adversarially-tuned domain generation and detection. In: Proceedings of the 2016 ACM workshop on artificial intelligence and security. ACM, New York, pp 13–21
go back to reference ANSSI ICS Working Group (2014) Managing cybersecurity of industrial control systems ANSSI ICS Working Group (2014) Managing cybersecurity of industrial control systems
go back to reference Autodesk (2015) Autodesk and airbus show the future of aerospace design and manufacture in pioneering generatively designed 3d printed partition. Accessed 3 June 2019 Autodesk (2015) Autodesk and airbus show the future of aerospace design and manufacture in pioneering generatively designed 3d printed partition. Accessed 3 June 2019
go back to reference Axelsson S (2000) Intrusion detection systems: a survey and taxonomy. Technical report Axelsson S (2000) Intrusion detection systems: a survey and taxonomy. Technical report
go back to reference Bahnsen AC, Torroledo I, Camacho D, Villegas S (2018) DeepPhish: simulating malicious AI. In: Proceedings of the 2018 APWG symposium on electronic crime research (eCrime’18), pp 1–8 Bahnsen AC, Torroledo I, Camacho D, Villegas S (2018) DeepPhish: simulating malicious AI. In: Proceedings of the 2018 APWG symposium on electronic crime research (eCrime’18), pp 1–8
go back to reference Balu A, Lore KG, Young G, Krishnamurthy A, Sarkar S (2016) A deep 3d convolutional neural network based design for manufacturability framework Balu A, Lore KG, Young G, Krishnamurthy A, Sarkar S (2016) A deep 3d convolutional neural network based design for manufacturability framework
go back to reference Bechtsis D, Tsolakis N, Vlachos D, Srai JS (2018) Intelligent autonomous vehicles in digital supply chains: a framework for integrating innovations towards sustainable value networks. J Clean Prod 181:60–71 Bechtsis D, Tsolakis N, Vlachos D, Srai JS (2018) Intelligent autonomous vehicles in digital supply chains: a framework for integrating innovations towards sustainable value networks. J Clean Prod 181:60–71
go back to reference Biggio B, Roli F (2018) Wild patterns: ten years after the rise of adversarial machine learning. Pattern Recognit 84:317–331 Biggio B, Roli F (2018) Wild patterns: ten years after the rise of adversarial machine learning. Pattern Recognit 84:317–331
go back to reference Bilge L, Kirda E, Kruegel C, Balduzzi M (2011) Exposure: finding malicious domains using passive DNS analysis Bilge L, Kirda E, Kruegel C, Balduzzi M (2011) Exposure: finding malicious domains using passive DNS analysis
go back to reference Bilge L, Balzarotti D, Robertson W, Kirda E, Kruegel C (2012) Disclosure: detecting botnet command and control servers through large-scale netflow analysis. In: ACSAC, 28th annual computer security applications conference, December 3–7. Orlando, Florida, USA, Orlando, UNITED STATES Bilge L, Balzarotti D, Robertson W, Kirda E, Kruegel C (2012) Disclosure: detecting botnet command and control servers through large-scale netflow analysis. In: ACSAC, 28th annual computer security applications conference, December 3–7. Orlando, Florida, USA, Orlando, UNITED STATES
go back to reference Breiman L (1996) Bagging predictors. Mach Learn 24(2):123–140MATH Breiman L (1996) Bagging predictors. Mach Learn 24(2):123–140MATH
go back to reference Brundage M, Avin S, Clark J, Toner H, Eckersley P, Garfinkel B, Dafoe A, Scharre P, Zeitzoff T, Filar B, Anderson H, Roff H, Allen GC, Steinhardt J, Flynn C, ÓhÉigeartaigh S, Beard S, Belfield H, Farquhar S, Lyle C (2018) The malicious use of artificial intelligence: forecasting, prevention, and mitigation Brundage M, Avin S, Clark J, Toner H, Eckersley P, Garfinkel B, Dafoe A, Scharre P, Zeitzoff T, Filar B, Anderson H, Roff H, Allen GC, Steinhardt J, Flynn C, ÓhÉigeartaigh S, Beard S, Belfield H, Farquhar S, Lyle C (2018) The malicious use of artificial intelligence: forecasting, prevention, and mitigation
go back to reference Buczak AL, Guven E (2016) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv Tutor 18(2):1153–1176 Buczak AL, Guven E (2016) A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun Surv Tutor 18(2):1153–1176
go back to reference Choi S, Jung K, Noh SD (2015) Virtual reality applications in manufacturing industries: past research, present findings, and future directions. Concurr Eng 23(1):40–63 Choi S, Jung K, Noh SD (2015) Virtual reality applications in manufacturing industries: past research, present findings, and future directions. Concurr Eng 23(1):40–63
go back to reference Chung K, Kalbarczyk ZT, Iyer RK (2019) Availability attacks on computing systems through alteration of environmental control: smart malware approach. In: Proceedings of the 10th ACM/IEEE international conference on cyber-physical systems. ACM, New York, pp 1–12 Chung K, Kalbarczyk ZT, Iyer RK (2019) Availability attacks on computing systems through alteration of environmental control: smart malware approach. In: Proceedings of the 10th ACM/IEEE international conference on cyber-physical systems. ACM, New York, pp 1–12
go back to reference Cohen G (1989) Using AI techniques to optimize manufacturing shop-floor operations. Eng Appl Artif Intell 2(3):238–246 Cohen G (1989) Using AI techniques to optimize manufacturing shop-floor operations. Eng Appl Artif Intell 2(3):238–246
go back to reference Creech G (2014) Developing a high-accuracy cross platform host-based intrusion detection system capable of reliably detecting zero-day attacks Creech G (2014) Developing a high-accuracy cross platform host-based intrusion detection system capable of reliably detecting zero-day attacks
go back to reference Creech G, Hu J (2013) Generation of a new ids test dataset: time to retire the KDD collection, pp 4487–4492 Creech G, Hu J (2013) Generation of a new ids test dataset: time to retire the KDD collection, pp 4487–4492
go back to reference Creech G, Hu J (2014) A semantic approach to host-based intrusion detection systems using contiguousand discontiguous system call patterns. IEEE Trans Comput 63:807–819, 04MathSciNetMATH Creech G, Hu J (2014) A semantic approach to host-based intrusion detection systems using contiguousand discontiguous system call patterns. IEEE Trans Comput 63:807–819, 04MathSciNetMATH
go back to reference Culp C, Haberl J, Norford L, Brothers PW, Hall JD (1990) The impact of AI technology within the HVAC industry. ASHRAE J (Am Soc Heat Refrig Air-Conditioning Eng) (USA) 32(12):12–22 Culp C, Haberl J, Norford L, Brothers PW, Hall JD (1990) The impact of AI technology within the HVAC industry. ASHRAE J (Am Soc Heat Refrig Air-Conditioning Eng) (USA) 32(12):12–22
go back to reference Czimmermann T, Ciuti G, Milazzo M, Chiurazzi M, Roccella S, Oddo CM, Dario P (2020) Visual-based defect detection and classification approaches for industrial applications—a survey. Sensors Czimmermann T, Ciuti G, Milazzo M, Chiurazzi M, Roccella S, Oddo CM, Dario P (2020) Visual-based defect detection and classification approaches for industrial applications—a survey. Sensors
go back to reference Debar H, Didier S, Becker M (1992) A neural network component for an intrusion detection system Debar H, Didier S, Becker M (1992) A neural network component for an intrusion detection system
go back to reference Deutsches Institut für Normung eV (2016) Reference architecture model industrie 4.0 (RAMI4.0) Deutsches Institut für Normung eV (2016) Reference architecture model industrie 4.0 (RAMI4.0)
go back to reference Dharmapurikar S, Lockwood JW (2006) Fast and scalable pattern matching for network intrusion detection systems. IEEE J Sel A Commun 24(10):1781–1792 Dharmapurikar S, Lockwood JW (2006) Fast and scalable pattern matching for network intrusion detection systems. IEEE J Sel A Commun 24(10):1781–1792
go back to reference Domb M, Bonchek-Dokow E, Leshem G (2016) Lightweight adaptive random-forest for IoT rule generation and execution. J Inf Secur Appl Domb M, Bonchek-Dokow E, Leshem G (2016) Lightweight adaptive random-forest for IoT rule generation and execution. J Inf Secur Appl
go back to reference Emanuilov I (2017) Autonomous systems in aviation: between product liability and innovation Emanuilov I (2017) Autonomous systems in aviation: between product liability and innovation
go back to reference Ertoz L, Eilertson E, Lazarevic A, Tan P, Srivava J, Kumar V, Dokas P (2004) Minds—minnesota intrusion detection system. In: Next generation data mining. MIT Press, Boston Ertoz L, Eilertson E, Lazarevic A, Tan P, Srivava J, Kumar V, Dokas P (2004) Minds—minnesota intrusion detection system. In: Next generation data mining. MIT Press, Boston
go back to reference European Commission (2009) European machinery directive. Accessed 3 June 2019 European Commission (2009) European machinery directive. Accessed 3 June 2019
go back to reference Freund Y, Schapire RE (1997) A decision-theoretic generalization of on-line learning and an application to boosting. J Comput Syst Sci 55(1):119–139MathSciNetMATH Freund Y, Schapire RE (1997) A decision-theoretic generalization of on-line learning and an application to boosting. J Comput Syst Sci 55(1):119–139MathSciNetMATH
go back to reference Fuente J, Saludes S (2000) Fault detection and isolation in a non-linear plant via neural networks, pp 463–468 Fuente J, Saludes S (2000) Fault detection and isolation in a non-linear plant via neural networks, pp 463–468
go back to reference Fuller A, Fan Z, Day C, Barlow C (2019) Digital twin: enabling technologies, challenges and open research. arXiv e-prints Fuller A, Fan Z, Day C, Barlow C (2019) Digital twin: enabling technologies, challenges and open research. arXiv e-prints
go back to reference Gacek S (2012) CNC machine group scheduling methods in a multitasking system. In: Proceedings of Carpathian logistics congress 2012, Jesenik, Czech Republic Gacek S (2012) CNC machine group scheduling methods in a multitasking system. In: Proceedings of Carpathian logistics congress 2012, Jesenik, Czech Republic
go back to reference Gao D, Reiter MK, Song D (2006) Behavioral distance measurement using hidden Markov models. In: Proceedings of the 9th international conference on recent advances in intrusion detection, RAID’06. Springer, Berlin, pp 19–40 Gao D, Reiter MK, Song D (2006) Behavioral distance measurement using hidden Markov models. In: Proceedings of the 9th international conference on recent advances in intrusion detection, RAID’06. Springer, Berlin, pp 19–40
go back to reference Gau J, Evans R (2016) DeepMind AI reduces google data centre cooling bill by 40 percent Gau J, Evans R (2016) DeepMind AI reduces google data centre cooling bill by 40 percent
go back to reference Gharibian F, Ghorbani A (2007) Comparative study of supervised machine learning techniques for intrusion detection, pp 350–358 Gharibian F, Ghorbani A (2007) Comparative study of supervised machine learning techniques for intrusion detection, pp 350–358
go back to reference Gonzalez FA (2003) A study of artificial immune systems applied to anomaly detection. PhD thesis. AAI3092441 Gonzalez FA (2003) A study of artificial immune systems applied to anomaly detection. PhD thesis. AAI3092441
go back to reference Goodfellow IJ, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. In: Proceedings of the 27th international conference on neural information processing systems, NIPS’14, vol 2. MIT Press, Cambridge, pp 2672–2680 Goodfellow IJ, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. In: Proceedings of the 27th international conference on neural information processing systems, NIPS’14, vol 2. MIT Press, Cambridge, pp 2672–2680
go back to reference Granzer W, Praus F, Kastner W (2010) Security in building automation systems. IEEE Trans Ind Electron 57:3622–3630 Granzer W, Praus F, Kastner W (2010) Security in building automation systems. IEEE Trans Ind Electron 57:3622–3630
go back to reference Grapentin A, Plauth M, Polze A (2017) MemSpaces: Evaluating the tuple space paradigm in the context of memory-centric architectures. In: 2017 Fifth international symposium on computing and networking (CANDAR), pp 284–290 Grapentin A, Plauth M, Polze A (2017) MemSpaces: Evaluating the tuple space paradigm in the context of memory-centric architectures. In: 2017 Fifth international symposium on computing and networking (CANDAR), pp 284–290
go back to reference Grewal G, Areibi S, Westrik M, Abuowaimer Z, Zhao B (2017) A machine learning framework for FPGA placement (abstract only). In: Proceedings of the 2017 ACM/SIGDA international symposium on field-programmable gate arrays, FPGA’17. ACM, New York, pp 286–286 Grewal G, Areibi S, Westrik M, Abuowaimer Z, Zhao B (2017) A machine learning framework for FPGA placement (abstract only). In: Proceedings of the 2017 ACM/SIGDA international symposium on field-programmable gate arrays, FPGA’17. ACM, New York, pp 286–286
go back to reference Hinton G, Sejnowski T (1999) Unsupervised learning: foundations of neural computation. MIT Press, Cambridge Hinton G, Sejnowski T (1999) Unsupervised learning: foundations of neural computation. MIT Press, Cambridge
go back to reference Hitaj B, Gasti P, Ateniese G, Perez-Cruz F (2017) Passgan: a deep learning approach Hitaj B, Gasti P, Ateniese G, Perez-Cruz F (2017) Passgan: a deep learning approach
go back to reference Hu W, Tan Y (2017) Generating adversarial malware examples for black-box attacks based on GAN Hu W, Tan Y (2017) Generating adversarial malware examples for black-box attacks based on GAN
go back to reference Hu W, Liao Y, Vemuri VR (2003) Robust support vector machines for anomaly detection in computer security. In: Proceedings of the 2003 international conference on machine learning and applications—ICMLA 2003, June 23–24, 2003, Los Angeles, California, USA, pp 168–174 Hu W, Liao Y, Vemuri VR (2003) Robust support vector machines for anomaly detection in computer security. In: Proceedings of the 2003 international conference on machine learning and applications—ICMLA 2003, June 23–24, 2003, Los Angeles, California, USA, pp 168–174
go back to reference Hu W, Hu W, Maybank S (2008) Adaboost-based algorithm for network intrusion detection. Trans Syst Man Cybern Part B 38(2):577–583 Hu W, Hu W, Maybank S (2008) Adaboost-based algorithm for network intrusion detection. Trans Syst Man Cybern Part B 38(2):577–583
go back to reference Humayed A, Lin J, Li F, Luo B (2017) Cyber-physical systems security—a survey. IEEE Internet Things J 4(6):1802–1831 Humayed A, Lin J, Li F, Luo B (2017) Cyber-physical systems security—a survey. IEEE Internet Things J 4(6):1802–1831
go back to reference Hutchins EM, Cloppert MJ, Amin RM (2011) Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Lead Issues Inf Warf Secur Res 1(1): 80 Hutchins EM, Cloppert MJ, Amin RM (2011) Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Lead Issues Inf Warf Secur Res 1(1): 80
go back to reference Ilgun K, Kemmerer RA, Porras PA (1995) State transition analysis: a rule-based intrusion detection approach. IEEE Trans Softw Eng 21(3):181–199 Ilgun K, Kemmerer RA, Porras PA (1995) State transition analysis: a rule-based intrusion detection approach. IEEE Trans Softw Eng 21(3):181–199
go back to reference Jemili F, Zaghdoud M, Ahmed MB (2007) A framework for an adaptive intrusion detection system using Bayesian network, pp 66–70 Jemili F, Zaghdoud M, Ahmed MB (2007) A framework for an adaptive intrusion detection system using Bayesian network, pp 66–70
go back to reference Jensen F, Nielsen TD (2007) Bayesian networks and decision graphs, 2nd edn. Springer Publishing Company, Incorporated, BerlinMATH Jensen F, Nielsen TD (2007) Bayesian networks and decision graphs, 2nd edn. Springer Publishing Company, Incorporated, BerlinMATH
go back to reference Ji W, Wang L (2017) Big data analytics based fault prediction for shop floor scheduling. J Manuf Syst 43(Part 1):187–194 Ji W, Wang L (2017) Big data analytics based fault prediction for shop floor scheduling. J Manuf Syst 43(Part 1):187–194
go back to reference Kalajdzic K, Jegourel C, Bartocci E, Legay A, Smolka S, Grosu R (2015) Model checking as control: feedback control for statistical model checking of cyber-physical systems Kalajdzic K, Jegourel C, Bartocci E, Legay A, Smolka S, Grosu R (2015) Model checking as control: feedback control for statistical model checking of cyber-physical systems
go back to reference Kaloudi N, Li J (2020) The AI-based cyber threat landscape: a survey. ACM Comput Surv 53(1), Article 20 Kaloudi N, Li J (2020) The AI-based cyber threat landscape: a survey. ACM Comput Surv 53(1), Article 20
go back to reference Karami A, Guerrero-Zapata M (2015) A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks. Neurocomputing 149:1253–1269, 02 Karami A, Guerrero-Zapata M (2015) A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks. Neurocomputing 149:1253–1269, 02
go back to reference Kirat D, Jang J, Stoecklin M (2018) Deeplocker—concealing targeted attacks with AI locksmithing. In: Proceedings of the black hat USA conference Kirat D, Jang J, Stoecklin M (2018) Deeplocker—concealing targeted attacks with AI locksmithing. In: Proceedings of the black hat USA conference
go back to reference Knowles W, Prince D, Hutchison D, Diss JP, Jones K (2015) A survey of cyber security management in industrial control systems. Int J Crit Infrastruct Prot 9 Knowles W, Prince D, Hutchison D, Diss JP, Jones K (2015) A survey of cyber security management in industrial control systems. Int J Crit Infrastruct Prot 9
go back to reference Kolias C, Kambourakis G, Maragoudakis M (2011) Swarm intelligence in intrusion detection: a survey. Comput Secur 30(8):625–642 Kolias C, Kambourakis G, Maragoudakis M (2011) Swarm intelligence in intrusion detection: a survey. Comput Secur 30(8):625–642
go back to reference Korvesis P (2017) Machine learning for predictive maintenance in aviation. Artificial intelligence[cs.AI] Korvesis P (2017) Machine learning for predictive maintenance in aviation. Artificial intelligence[cs.AI]
go back to reference Kumar K (2017) Intrusion detection and prevention system in enhancing security of cloud environment. 6:2278–1323 Kumar K (2017) Intrusion detection and prevention system in enhancing security of cloud environment. 6:2278–1323
go back to reference Kumar S, Spafford EH (1994) A pattern matching model for misuse intrusion detection. Technical report, Purdue University Kumar S, Spafford EH (1994) A pattern matching model for misuse intrusion detection. Technical report, Purdue University
go back to reference Laura B, Davoli L, Medioli A, Marchini PL, Ferrari G (2019) Toward industry 4.0 with IoT: optimizing business processes in an evolving manufacturing factory Laura B, Davoli L, Medioli A, Marchini PL, Ferrari G (2019) Toward industry 4.0 with IoT: optimizing business processes in an evolving manufacturing factory
go back to reference Lee J-H, Lee J-H, Sohn SG, Ryu JH, Chung Tai-Myoung M (2008) Effective value of decision tree with KDD 99 intrusion detection datasets for intrusion detection system. In: 2008 10th International conference on advanced communication technology, vol 2, pp 1170–1175 Lee J-H, Lee J-H, Sohn SG, Ryu JH, Chung Tai-Myoung M (2008) Effective value of decision tree with KDD 99 intrusion detection datasets for intrusion detection system. In: 2008 10th International conference on advanced communication technology, vol 2, pp 1170–1175
go back to reference Lee J, Davari H, Singh J, Pandhare V (2018) Industrial artificial intelligence for industry 4.0-based manufacturing systems Lee J, Davari H, Singh J, Pandhare V (2018) Industrial artificial intelligence for industry 4.0-based manufacturing systems
go back to reference Li J (2018) Cyber security meets artificial intelligence: a survey. Front Inf Technol Electron Eng 1462–1474 Li J (2018) Cyber security meets artificial intelligence: a survey. Front Inf Technol Electron Eng 1462–1474
go back to reference Lightman S, Abrams M, Hahn A, Stouffer K, Pillitteri V (2015) Guide to industrial control systems (ICS) security Lightman S, Abrams M, Hahn A, Stouffer K, Pillitteri V (2015) Guide to industrial control systems (ICS) security
go back to reference Lim Y, Ramasamy S, Gardi A, Kistan T, Sabatini R (2017) Cognitive human–machine interfaces and interactions for unmanned aircraft. J Intell Robotic Syst 10 Lim Y, Ramasamy S, Gardi A, Kistan T, Sabatini R (2017) Cognitive human–machine interfaces and interactions for unmanned aircraft. J Intell Robotic Syst 10
go back to reference Lin S-W, Miller B, Durand J, Bleakley G, Chigani A, Martin R, Murphy B, Crawford M (2019) The industrial internet of things volume g1: reference architecture. 6 Lin S-W, Miller B, Durand J, Bleakley G, Chigani A, Martin R, Murphy B, Crawford M (2019) The industrial internet of things volume g1: reference architecture. 6
go back to reference Lippmann RP, Fried DJ, Graf I, Haines JW, Kendall K, Mcclung DM, Weber D, Webster SE, Wyschogrod D, Cunningham RK, Zissman MA (2000) Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation Lippmann RP, Fried DJ, Graf I, Haines JW, Kendall K, Mcclung DM, Weber D, Webster SE, Wyschogrod D, Cunningham RK, Zissman MA (2000) Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation
go back to reference Lippmann R, Haines JW, Fried DJ, Korba J, Das K (2000) The 1999 DARPA off-line intrusion detection evaluation. Comput Netw 34(4):579–595 Lippmann R, Haines JW, Fried DJ, Korba J, Das K (2000) The 1999 DARPA off-line intrusion detection evaluation. Comput Netw 34(4):579–595
go back to reference Lowe’s Company Incorporated (2016) Lowe’s introduces LoweBot—the next generation robot to enhance the home improvement shopping experience in the bay area Lowe’s Company Incorporated (2016) Lowe’s introduces LoweBot—the next generation robot to enhance the home improvement shopping experience in the bay area
go back to reference Lu Y, Xu X (2019) Cloud-based manufacturing equipment and big data analytics to enable on-demand manufacturing services. Robotics Comput Integr Manuf 57:92–102 Lu Y, Xu X (2019) Cloud-based manufacturing equipment and big data analytics to enable on-demand manufacturing services. Robotics Comput Integr Manuf 57:92–102
go back to reference Ludovic ME (1998) Gassata, a genetic algorithm as an alternative tool for security audit trails analysis. In: Proceedings of the first international work-shop on the recent advances in intrusion detection Ludovic ME (1998) Gassata, a genetic algorithm as an alternative tool for security audit trails analysis. In: Proceedings of the first international work-shop on the recent advances in intrusion detection
go back to reference Lunt TF, Jagannathan R (1988) A prototype real-time intrusion-detection expert system. In: Proceedings of the 1988 IEEE conference on security and privacy, SP’88. IEEE Computer Society, Washington, DC, pp 59–66 Lunt TF, Jagannathan R (1988) A prototype real-time intrusion-detection expert system. In: Proceedings of the 1988 IEEE conference on security and privacy, SP’88. IEEE Computer Society, Washington, DC, pp 59–66
go back to reference Luo J, Bridges S (2000) Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection. Int J Intell Syst 15:687–703, 08MATH Luo J, Bridges S (2000) Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection. Int J Intell Syst 15:687–703, 08MATH
go back to reference Luo Y, Xiao Y, Cheng L, Peng G, Yao DD (2020) Deep learning-based anomaly detection in cyber-physical systems: progress and opportunities. arXiv:2003.13213 Luo Y, Xiao Y, Cheng L, Peng G, Yao DD (2020) Deep learning-based anomaly detection in cyber-physical systems: progress and opportunities. arXiv:​2003.​13213
go back to reference Makkar S, Devi G, Solanki V (2020) Applications of machine learning techniques in supply chain optimization Makkar S, Devi G, Solanki V (2020) Applications of machine learning techniques in supply chain optimization
go back to reference Malatras A, Skouloudi C, Koukounas A (2019) Industry 4.0 cybersecurity: challenges & recommendations Malatras A, Skouloudi C, Koukounas A (2019) Industry 4.0 cybersecurity: challenges & recommendations
go back to reference Mantere M, Sailio M, Noponen S (2014) A module for anomaly detection in ICS networks. In: Proceedings of the 3rd international conference on high confidence networked systems, HiCoNS’14. Association for Computing Machinery, New York, pp 49–56 Mantere M, Sailio M, Noponen S (2014) A module for anomaly detection in ICS networks. In: Proceedings of the 3rd international conference on high confidence networked systems, HiCoNS’14. Association for Computing Machinery, New York, pp 49–56
go back to reference Mao S, Wang B, Tang Y, Qian F (2019) Opportunities and challenges of artificial intelligence for green manufacturing in the process industry. Engineering 5(6):2019 Mao S, Wang B, Tang Y, Qian F (2019) Opportunities and challenges of artificial intelligence for green manufacturing in the process industry. Engineering 5(6):2019
go back to reference Mazini M, Shirazi B, Mahdavi I (2018) Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms. J King Saud Univ Comput Inf Sci Mazini M, Shirazi B, Mahdavi I (2018) Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms. J King Saud Univ Comput Inf Sci
go back to reference Moon I, Lee GM, Park J, Kiritsis D, von Cieminski G (2018) Advances in production management systems. Production management for data-driven, intelligent, collaborative, and sustainable manufacturing. In: IFIP WG 5.7 international conference, APMS proceedings. Part I, Seoul, Korea, p 2018 Moon I, Lee GM, Park J, Kiritsis D, von Cieminski G (2018) Advances in production management systems. Production management for data-driven, intelligent, collaborative, and sustainable manufacturing. In: IFIP WG 5.7 international conference, APMS proceedings. Part I, Seoul, Korea, p 2018
go back to reference Morris T, Gao W (2014) Industrial control system traffic data sets for intrusion detection research. Int Conf Crit Infrast Prot 441:65–78 Morris T, Gao W (2014) Industrial control system traffic data sets for intrusion detection research. Int Conf Crit Infrast Prot 441:65–78
go back to reference Mosli R, Wright M, Yuan B, Pan Y (2019) They might not be giants: crafting black-box adversarial examples with fewer queries using particle swarm optimization Mosli R, Wright M, Yuan B, Pan Y (2019) They might not be giants: crafting black-box adversarial examples with fewer queries using particle swarm optimization
go back to reference Mukkamala S, Sung AH, Abraham A (2005) Intrusion detection using an ensemble of intelligent paradigms. J Netw Comput Appl 28(2):167–182 Mukkamala S, Sung AH, Abraham A (2005) Intrusion detection using an ensemble of intelligent paradigms. J Netw Comput Appl 28(2):167–182
go back to reference Nicholas L, Ooi SY, Pang Y-H, Hwang SO, Tan S-Y (2018) Study of long short-term memory in flow-based network intrusion detection system. J Intell Fuzzy Syst 35:5947–5957 Nicholas L, Ooi SY, Pang Y-H, Hwang SO, Tan S-Y (2018) Study of long short-term memory in flow-based network intrusion detection system. J Intell Fuzzy Syst 35:5947–5957
go back to reference Otto B, Steinbuß S, International Data Spaces Association (2019) Reference architecture model. Anna-Louisa-Karsch-Str. 210178 Berlin, Germany Otto B, Steinbuß S, International Data Spaces Association (2019) Reference architecture model. Anna-Louisa-Karsch-Str. 210178 Berlin, Germany
go back to reference Pagnoni A, Visconti A (2004) NAIS: intrusion detection via native immune system. In: Proceedings of the 10th international conference on cybernetics and information technologies, systems and applications. Hsing-Wei Chu et al Pagnoni A, Visconti A (2004) NAIS: intrusion detection via native immune system. In: Proceedings of the 10th international conference on cybernetics and information technologies, systems and applications. Hsing-Wei Chu et al
go back to reference Papernot N, McDaniel P, Goodfellow I, Jha S, Celik ZB, Swami A (2017) Practical black-box attacks against machine learning. In: Proceedings of the 2017 ACM on Asia conference on computer and communications security, ASIA CCS’17. ACM, New York, pp 506–519 Papernot N, McDaniel P, Goodfellow I, Jha S, Celik ZB, Swami A (2017) Practical black-box attacks against machine learning. In: Proceedings of the 2017 ACM on Asia conference on computer and communications security, ASIA CCS’17. ACM, New York, pp 506–519
go back to reference Park HS, Phuong DX, Kumar S (2019) AI based injection molding process for consistent product quality. Procedia Manuf 28:102–106 Park HS, Phuong DX, Kumar S (2019) AI based injection molding process for consistent product quality. Procedia Manuf 28:102–106
go back to reference Petro D, Morris B (2017) Weaponizing machine learning: humanity was overrated anyway. In: Proceedings of DEF CON 25 Petro D, Morris B (2017) Weaponizing machine learning: humanity was overrated anyway. In: Proceedings of DEF CON 25
go back to reference Phelan N (2016) Designing with machine learning Phelan N (2016) Designing with machine learning
go back to reference Pinker E (2018) Reporting accuracy of rare event classifiers. NPJ Digit Med 1(1):1–2 Pinker E (2018) Reporting accuracy of rare event classifiers. NPJ Digit Med 1(1):1–2
go back to reference Polikar R (2009) Ensemble learning. Scholarpedia 4(4):2776 Polikar R (2009) Ensemble learning. Scholarpedia 4(4):2776
go back to reference Porras PA, Neumann PG (1997) EMERALD: event monitoring enabling responses to anomalous live disturbances. In: 1997 National information systems security conference Porras PA, Neumann PG (1997) EMERALD: event monitoring enabling responses to anomalous live disturbances. In: 1997 National information systems security conference
go back to reference Qiu S, Liu Q, Zhou S, Wu C (2019) Review of artificial intelligence adversarial attack and defense technologies. Appl Sci 9:909 Qiu S, Liu Q, Zhou S, Wu C (2019) Review of artificial intelligence adversarial attack and defense technologies. Appl Sci 9:909
go back to reference Rabiner LR, Juang BH (1986) An introduction to hidden Markov models. IEEE ASSp Magazine Rabiner LR, Juang BH (1986) An introduction to hidden Markov models. IEEE ASSp Magazine
go back to reference Resende PAA, Drummond AC (2018) A survey of random forest based methods for intrusion detection systems. ACM Comput Surv 51(3):48:1–48:36 Resende PAA, Drummond AC (2018) A survey of random forest based methods for intrusion detection systems. ACM Comput Surv 51(3):48:1–48:36
go back to reference Roesch M (1999) Snort: lightweight intrusion detection for networks. In: Proceedings of LISA’99: 13th systems administration conference, volume 99 of Lisa Roesch M (1999) Snort: lightweight intrusion detection for networks. In: Proceedings of LISA’99: 13th systems administration conference, volume 99 of Lisa
go back to reference Robert Friedman Jerome Hastie, Trevor Tibshirani (2009) Data Mining, Inference, and Prediction, The Elements of Statistical Learning Robert Friedman Jerome Hastie, Trevor Tibshirani (2009) Data Mining, Inference, and Prediction, The Elements of Statistical Learning
go back to reference Russell S, Norvig P (2009) Artificial intelligence: a modern approach, 3rd edn. Prentice Hall Press, Upper Saddle RiverMATH Russell S, Norvig P (2009) Artificial intelligence: a modern approach, 3rd edn. Prentice Hall Press, Upper Saddle RiverMATH
go back to reference Samuel AL (1959) Some studies in machine learning using the game of checkers. IBM J Res Dev 3(3):210–229MathSciNet Samuel AL (1959) Some studies in machine learning using the game of checkers. IBM J Res Dev 3(3):210–229MathSciNet
go back to reference Santofimia-Romero M-J, del Toro-García X, López-López J-C (2011) Artificial intelligence techniques for smart grid applications Santofimia-Romero M-J, del Toro-García X, López-López J-C (2011) Artificial intelligence techniques for smart grid applications
go back to reference Schneible J, Lu A (2017) Anomaly detection on the edge, pp 678–682 Schneible J, Lu A (2017) Anomaly detection on the edge, pp 678–682
go back to reference Sculley D, Holt G, Golovin D, Davydov E, Phillips T, Ebner D, Chaudhary V, Young M, Crespo J-F, Dennison D (2015) Hidden technical debt in machine learning systems. In: Proceedings of the 28th international conference on neural information processing systems, NIPS’15, vol 2. MIT Press, Cambridge, pp 2503–2511 Sculley D, Holt G, Golovin D, Davydov E, Phillips T, Ebner D, Chaudhary V, Young M, Crespo J-F, Dennison D (2015) Hidden technical debt in machine learning systems. In: Proceedings of the 28th international conference on neural information processing systems, NIPS’15, vol 2. MIT Press, Cambridge, pp 2503–2511
go back to reference Sebring MM, Shellhouse E, Hanna MF, Whitehurst RA (1988) Expert systems in intrusion detection: a case study Sebring MM, Shellhouse E, Hanna MF, Whitehurst RA (1988) Expert systems in intrusion detection: a case study
go back to reference Seymour J, Tully P (2016) Weaponizing data science for social engineering: automated E2E spear phishing on twitter. Proc Black Hat USA 37(2016):1–39 Seymour J, Tully P (2016) Weaponizing data science for social engineering: automated E2E spear phishing on twitter. Proc Black Hat USA 37(2016):1–39
go back to reference Sharafaldin I, Lashkari AH, Ghorbani A (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization, pp 108–116 Sharafaldin I, Lashkari AH, Ghorbani A (2018) Toward generating a new intrusion detection dataset and intrusion traffic characterization, pp 108–116
go back to reference Sharif M, Bhagavatula S, Bauer L, Reiter MK (2016) Accessorize to a crime: real and stealthy attacks on state-of-the-art face recognition. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, CCS’16. ACM, New York, pp 1528–1540 Sharif M, Bhagavatula S, Bauer L, Reiter MK (2016) Accessorize to a crime: real and stealthy attacks on state-of-the-art face recognition. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, CCS’16. ACM, New York, pp 1528–1540
go back to reference Sheen S, Rajesh R (2008) Network intrusion detection using feature selection and decision tree classifier, pp 1–4 Sheen S, Rajesh R (2008) Network intrusion detection using feature selection and decision tree classifier, pp 1–4
go back to reference Shin C, Park S (2010) A machine learning approach to yield management in semiconductor manufacturing. Int J Prod Res 38(17):4261–4271 Shin C, Park S (2010) A machine learning approach to yield management in semiconductor manufacturing. Int J Prod Res 38(17):4261–4271
go back to reference Sindhu SSS, Geetha S, Kannan A (2012) Decision tree based light weight intrusion detection using a wrapper approach. Expert Syst Appl 39(1):129–141 Sindhu SSS, Geetha S, Kannan A (2012) Decision tree based light weight intrusion detection using a wrapper approach. Expert Syst Appl 39(1):129–141
go back to reference Śliwiński M, Piesik E, Piesi J (2018) Integrated functional safety and cyber security analysis. IFAC-PapersOnLine 51(24):1263–1270. 10th IFAC symposium on fault detection, supervision and safety for technical processes SAFEPROCESS 2018 Śliwiński M, Piesik E, Piesi J (2018) Integrated functional safety and cyber security analysis. IFAC-PapersOnLine 51(24):1263–1270. 10th IFAC symposium on fault detection, supervision and safety for technical processes SAFEPROCESS 2018
go back to reference Smaha SE (1988) Haystack: an intrusion detection system Smaha SE (1988) Haystack: an intrusion detection system
go back to reference Stefanova Z, Ramachandran K (2017) Network attribute selection, classification and accuracy (NASCA) procedure for intrusion detection systems. In: Proceedings of the 2007 IEEE international symposium on technologies for homeland security Stefanova Z, Ramachandran K (2017) Network attribute selection, classification and accuracy (NASCA) procedure for intrusion detection systems. In: Proceedings of the 2007 IEEE international symposium on technologies for homeland security
go back to reference Stolfo SJ (1999) KDD cup 1999 data data set. Accessed 3 June 2019 Stolfo SJ (1999) KDD cup 1999 data data set. Accessed 3 June 2019
go back to reference Stouffer K, Lightman S, Pillitteri V, Abrams M, Hahn A (2015) Guide to industrial control systems (ICS) security Stouffer K, Lightman S, Pillitteri V, Abrams M, Hahn A (2015) Guide to industrial control systems (ICS) security
go back to reference Sun B, Li X, Wan B, Wang C, Zhou X, Chen X (2016) Definitions of predictability for cyber physical systems. J Syst Archit 63:48–60 Sun B, Li X, Wan B, Wang C, Zhou X, Chen X (2016) Definitions of predictability for cyber physical systems. J Syst Archit 63:48–60
go back to reference Sung AH, Mukkamala S (2003) Identifying important features for intrusion detection using support vector machines and neural networks. In: Proceedings of the 2003 symposium on applications and the internet, SAINT’03. IEEE Computer Society, Washington, DC, p 209 Sung AH, Mukkamala S (2003) Identifying important features for intrusion detection using support vector machines and neural networks. In: Proceedings of the 2003 symposium on applications and the internet, SAINT’03. IEEE Computer Society, Washington, DC, p 209
go back to reference System architectures for industrie 4.0 applications—derivation of a generic architecture proposal. Production Engineering, Research and Development, Issue 3-4 (2019) System architectures for industrie 4.0 applications—derivation of a generic architecture proposal. Production Engineering, Research and Development, Issue 3-4 (2019)
go back to reference Szychter A, Ameur H, Kung A, Daussin H (2018) The impact of artificial intelligence on security: a dual perspective. C&ESAR Szychter A, Ameur H, Kung A, Daussin H (2018) The impact of artificial intelligence on security: a dual perspective. C&ESAR
go back to reference Tavallaee M, Stakhanova N, Ghorbani A (2010) Toward credible evaluation of anomaly-based intrusion-detection methods. IEEE Trans Syst Man Cybern Part C Appl Rev 40:516–524 Tavallaee M, Stakhanova N, Ghorbani A (2010) Toward credible evaluation of anomaly-based intrusion-detection methods. IEEE Trans Syst Man Cybern Part C Appl Rev 40:516–524
go back to reference Tedeschi S, Emmanouilidis C, Mehnen J, Roy R (2019) A design approach to IoT endpoint security for production machinery monitoring. Sensors 19(2355):2019 Tedeschi S, Emmanouilidis C, Mehnen J, Roy R (2019) A design approach to IoT endpoint security for production machinery monitoring. Sensors 19(2355):2019
go back to reference Thakkar A, Lohiya R (2020) Role of swarm and evolutionary algorithms for intrusion detection system: a survey. Swarm Evol Comput 53:100631 Thakkar A, Lohiya R (2020) Role of swarm and evolutionary algorithms for intrusion detection system: a survey. Swarm Evol Comput 53:100631
go back to reference Thapar V (2019) GE brings AI into preventive maintenance to reduce jet engine failure by one-third Thapar V (2019) GE brings AI into preventive maintenance to reduce jet engine failure by one-third
go back to reference Trieu K, Yang Y (2018) Artificial intelligence-based password brute force attacks Trieu K, Yang Y (2018) Artificial intelligence-based password brute force attacks
go back to reference Truong TC, Diep QB, Zelinka I (2020) Artificial intelligence in the cyber domain: offense and defense. Symmetry 12(3):410 Truong TC, Diep QB, Zelinka I (2020) Artificial intelligence in the cyber domain: offense and defense. Symmetry 12(3):410
go back to reference Turchin A (2015) A map: AGI failures modes and levels Turchin A (2015) A map: AGI failures modes and levels
go back to reference Turchin A, Denkenberger D (2020) Classification of global catastrophic risks connected with artificial intelligence. AI Soc 35(1):147–163 Turchin A, Denkenberger D (2020) Classification of global catastrophic risks connected with artificial intelligence. AI Soc 35(1):147–163
go back to reference Valdes A, Skinner K (2000) Recent advances in intrusion detection. Adaptive, model-based monitoring for cyber attack detection. Springer, Berlin Valdes A, Skinner K (2000) Recent advances in intrusion detection. Adaptive, model-based monitoring for cyber attack detection. Springer, Berlin
go back to reference Wang L (2019) From intelligence science to intelligent manufacturing. Engineering 5(4):615–618 Wang L (2019) From intelligence science to intelligent manufacturing. Engineering 5(4):615–618
go back to reference Warrender C, Forrest S, Pearlmutter B (1999) Detecting intrusions using system calls: alternative data models. In: IEEE symposium on security and privacy. IEEE Computer Society, pp 133–145 Warrender C, Forrest S, Pearlmutter B (1999) Detecting intrusions using system calls: alternative data models. In: IEEE symposium on security and privacy. IEEE Computer Society, pp 133–145
go back to reference Williams TJ (1994) The Purdue enterprise reference architecture. Comput Ind 24(2–3):141–158 Williams TJ (1994) The Purdue enterprise reference architecture. Comput Ind 24(2–3):141–158
go back to reference Xiao H (2017) Adversarial and secure machine learning Xiao H (2017) Adversarial and secure machine learning
go back to reference Xiao H, Biggio B, Nelson B, Xiao H, Eckert C, Roli F (2015) Support vector machines under adversarial label contamination. Neurocomputing 160(C):53–62 Xiao H, Biggio B, Nelson B, Xiao H, Eckert C, Roli F (2015) Support vector machines under adversarial label contamination. Neurocomputing 160(C):53–62
go back to reference Xu X (2012) From cloud computing to cloud manufacturing. Robotics Comput Integr Manuf 28(1):75–86 Xu X (2012) From cloud computing to cloud manufacturing. Robotics Comput Integr Manuf 28(1):75–86
go back to reference Yampolskiy RV (2016) Taxonomy of pathways to dangerous artificial intelligence. In: Proceedings of the workshops at the 30th AAAI conference on artificial intelligence Yampolskiy RV (2016) Taxonomy of pathways to dangerous artificial intelligence. In: Proceedings of the workshops at the 30th AAAI conference on artificial intelligence
go back to reference Yan J, He H, Zhong X, Tang Y (2017) Q-learning-based vulnerability analysis of smart grid against sequential topology attacks. IEEE Trans Inf Forensics and Secur 12(1):2017 Yan J, He H, Zhong X, Tang Y (2017) Q-learning-based vulnerability analysis of smart grid against sequential topology attacks. IEEE Trans Inf Forensics and Secur 12(1):2017
go back to reference Yao J, Zhao SL, Saxton L (2005) A study on fuzzy intrusion detection, vol 5812 Yao J, Zhao SL, Saxton L (2005) A study on fuzzy intrusion detection, vol 5812
go back to reference Yao M (2017) 4 unique challenges of industrial artificial intelligence Yao M (2017) 4 unique challenges of industrial artificial intelligence
go back to reference Yao Y, Viswanath B, Cryan J, Zheng H, Zhao BY (2017) Automated crowdturfing attacks and defenses in online review systems. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security. Association for Computing Machinery, New York, pp 1143–1158. https://doi.org/10.1145/3133956.3133990 Yao Y, Viswanath B, Cryan J, Zheng H, Zhao BY (2017) Automated crowdturfing attacks and defenses in online review systems. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security. Association for Computing Machinery, New York, pp 1143–1158. https://​doi.​org/​10.​1145/​3133956.​3133990
go back to reference Ye N, Zhang Y, Borror CM (2004) Robustness of the Markov-chain model for cyber-attack detection. In: IEEE transactions on reliability, vol 53, pp 116–123 Ye N, Zhang Y, Borror CM (2004) Robustness of the Markov-chain model for cyber-attack detection. In: IEEE transactions on reliability, vol 53, pp 116–123
go back to reference Yegnanarayana B (2009) Artificial neural networks. PHI Learning Yegnanarayana B (2009) Artificial neural networks. PHI Learning
go back to reference Yeo LH, Che X, Lakkaraju S (2017) Understanding modern intrusion detection systems: a survey Yeo LH, Che X, Lakkaraju S (2017) Understanding modern intrusion detection systems: a survey
go back to reference Yeung D-Y, Ding Y (2003) Host-based intrusion detection using dynamic and static behavioral models. Pattern Recognit 36(1):229–243MATH Yeung D-Y, Ding Y (2003) Host-based intrusion detection using dynamic and static behavioral models. Pattern Recognit 36(1):229–243MATH
go back to reference Yin M, Yao D, Luo J, Liu X, Ma J (2013) Network backbone anomaly detection using double random forests based on non-extensive entropy feature extraction. In: Ninth international conference on natural computation, ICNC 2013, Shenyang, China, July 23–25, 2013, pp 80–84 Yin M, Yao D, Luo J, Liu X, Ma J (2013) Network backbone anomaly detection using double random forests based on non-extensive entropy feature extraction. In: Ninth international conference on natural computation, ICNC 2013, Shenyang, China, July 23–25, 2013, pp 80–84
go back to reference Zaataria ES, Mareia M, Lia W, Usmanb Z (2019) Cobot programming for collaborative industrial tasks: an overview. Robotics Auton Syst Zaataria ES, Mareia M, Lia W, Usmanb Z (2019) Cobot programming for collaborative industrial tasks: an overview. Robotics Auton Syst
go back to reference Zaharia M, Xin RS, Wendell P, Das T, Armbrust M, Dave A, Meng X, Rosen J, Venkataraman S, Franklin MJ, Ghodsi A, Gonzalez J, Shenker S, Stoica I (2016) Apache spark: a unified engine for big data processing. Commun ACM 59(11):56–65 Zaharia M, Xin RS, Wendell P, Das T, Armbrust M, Dave A, Meng X, Rosen J, Venkataraman S, Franklin MJ, Ghodsi A, Gonzalez J, Shenker S, Stoica I (2016) Apache spark: a unified engine for big data processing. Commun ACM 59(11):56–65
go back to reference Zaman S, Karray F (2009) Features selection for intrusion detection systems based on support vector machines. In: Proceedings of the 6th IEEE conference on consumer communications and networking conference, CCNC’09. IEEE Press, Piscataway, pp 1066–1073 Zaman S, Karray F (2009) Features selection for intrusion detection systems based on support vector machines. In: Proceedings of the 6th IEEE conference on consumer communications and networking conference, CCNC’09. IEEE Press, Piscataway, pp 1066–1073
go back to reference Zhang J, Zulkernine M (2005) Network intrusion detection using random forests Zhang J, Zulkernine M (2005) Network intrusion detection using random forests
go back to reference Zhang R, Chen X, Lu J, Wen S, Nepal S, Xiang Y (2018) Using AI to hack IA: a new stealthy spyware against voice assistance functions in smart phones Zhang R, Chen X, Lu J, Wen S, Nepal S, Xiang Y (2018) Using AI to hack IA: a new stealthy spyware against voice assistance functions in smart phones
go back to reference Zhou Z-H (2012) Ensemble methods: foundations and algorithms, 1st edn. Chapman and Hall/CRC, London Zhou Z-H (2012) Ensemble methods: foundations and algorithms, 1st edn. Chapman and Hall/CRC, London
go back to reference Zhu Y, Yan J, Sun YL, He H (2014) Revealing cascading failure vulnerability in power grids using risk-graph. IEEE Trans Parallel Distrib Syst 25(12):3274–3284 Zhu Y, Yan J, Sun YL, He H (2014) Revealing cascading failure vulnerability in power grids using risk-graph. IEEE Trans Parallel Distrib Syst 25(12):3274–3284
Metadata
Title
Artificial intelligence, cyber-threats and Industry 4.0: challenges and opportunities
Authors
Adrien Bécue
Isabel Praça
João Gama
Publication date
04-02-2021
Publisher
Springer Netherlands
Published in
Artificial Intelligence Review / Issue 5/2021
Print ISSN: 0269-2821
Electronic ISSN: 1573-7462
DOI
https://doi.org/10.1007/s10462-020-09942-2

Other articles of this Issue 5/2021

Artificial Intelligence Review 5/2021 Go to the issue

Premium Partner