Access the full text.
Sign up today, get DeepDyve free for 14 days.
Chang-Jung Hsieh, Ting-Yuan Chan (2016)
Detection DDoS attacks based on neural-network using Apache Spark2016 International Conference on Applied System Innovation (ICASI)
G. Chullai, J. Kumar, Gaurav Tripathi, Kuldeep Singh (2017)
Sparse proximity based robust fingerprint recognition2017 International Conference on Computing, Communication and Automation (ICCCA)
Ganesh Santhanam, Benjamin Holland, S. Kothari, Nikhil Ranade (2017)
Human-on-the-Loop Automation for Detecting Software Side-Channel Vulnerabilities
Yong Zhang, Xu Chen, Da Guo, Mei Song, Yinglei Teng, Xiaojuan Wang (2019)
PCCN: Parallel Cross Convolutional Neural Network for Abnormal Network Traffic Flows Detection in Multi-Class Imbalanced Network Traffic FlowsIEEE Access, 7
P. Nithyakani, A. Shanthini, Godwin Ponsam (2019)
Human Gait Recognition using Deep Convolutional Neural Network2019 3rd International Conference on Computing and Communications Technologies (ICCCT)
C. Park, Kathryn Laskey, P. Costa, Shou Matsumoto
International Command and Control Research and Technology Symposium C2 in Underdeveloped, Degraded and Denied Operational Environments Multi-entity Bayesian Networks Learning in Predictive Situation Awareness
Hang Yang, Yan Jia, Weihong Han, Yuan-Ping Nie, Shudong Li, Xiaojuan Zhao (2019)
Calculation of Network Security Index Based on Convolution Neural Networks
Weston Kowert (2017)
The Foreseeability of Human–Artificial Intelligence Interactions *Texas Law Review, 96
David Nunes, Pei Zhang, J. Silva (2015)
A Survey on Human-in-the-Loop Applications Towards an Internet of AllIEEE Communications Surveys & Tutorials, 17
Wei Zhang, Xiaoqi Lu, Yu Gu, Yang Liu, Xianjing Meng, Jing Li (2019)
A Robust Iris Segmentation Scheme Based on Improved U-NetIEEE Access, 7
Junying Zeng, Fan Wang, J. Deng, Chuanbo Qin, Yikui Zhai, Junying Gan, V. Piuri (2020)
Finger Vein Verification Algorithm Based on Fully Convolutional Neural Network and Conditional Random FieldIEEE Access, 8
Xiaozhen Lu, Liang Xiao, Tangwei Xu, Yifeng Zhao, Yuliang Tang, W. Zhuang (2020)
Reinforcement Learning Based PHY Authentication for VANETsIEEE Transactions on Vehicular Technology, 69
Yuede Ji, Benjamin Bowman, H. Huang (2019)
Securing Malware Cognitive Systems against Adversarial Attacks2019 IEEE International Conference on Cognitive Computing (ICCC)
Michael Tyworth, Nicklaus Giacobe, Vincent Mancuso, M. McNeese, D. Hall (2013)
A human-in-the-loop approach to understanding situation awareness in cyber defence analysisEAI Endorsed Trans. Security Safety, 1
Yuanquan Shi, Tao Li, Renfa Li, Xiaoning Peng, Pengju Tang (2017)
An Immunity-Based IOT Environment Security Situation Awareness ModelJournal of Computational Chemistry, 05
(2019)
2019 3rd International Conference on Computing and Communications Technologies (ICCCT)
Xiaoyong Yuan, Chuanhuang Li, Xiaolin Li (2017)
DeepDefense: Identifying DDoS Attack via Deep Learning2017 IEEE International Conference on Smart Computing (SMARTCOMP)
Nikos Benias, A. Markopoulos (2017)
A review on the readiness level and cyber-security challenges in Industry 4.02017 South Eastern European Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM)
Paul Taylor, T. Dargahi, A. Dehghantanha, R. Parizi, K. Choo (2020)
A systematic literature review of blockchain cyber securityDigit. Commun. Networks, 6
J. McIntire, L. McIntire, P. Havig (2009)
A variety of automated turing tests for network security: Using AI-hard problems in perception and cognition to ensure secure collaborations2009 International Symposium on Collaborative Technologies and Systems
Hariyanto, S. Sudiro, S. Lukman (2015)
Minutiae Matching Algorithm Using Artificial Neural Network for Fingerprint Recognition2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS)
Yi Zeng, Zihao Qi, Wencheng Chen, Yanzhe Huang, Xingxin Zheng, Han Qiu (2019)
TEST: an End-to-End Network Traffic Examination and Identification Framework Based on Spatio-Temporal Features ExtractionArXiv, abs/1908.10271
Joseph Shelton, John Jenkins, K. Roy (2016)
Micro-dimensional Feature Extraction for multispectral Iris recognitionSoutheastCon 2016
Loan Păvăloi, C. Nita (2018)
Iris recognition using SIFT descriptors with different distance measures2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)
Yusuf Korkmaz (2016)
Developing password security system by using artificial neural networks in user log in systems2016 Electric Electronics, Computer Science, Biomedical Engineerings' Meeting (EBBT)
A. Pandeeswari, G. Kumar (2016)
Anomaly Detection System in Cloud Environment Using Fuzzy Clustering Based ANNMobile Networks and Applications, 21
Jiawei Su, Danilo Vargas, K. Sakurai (2017)
One Pixel Attack for Fooling Deep Neural NetworksIEEE Transactions on Evolutionary Computation, 23
Tariq Mahmood, U. Afzal (2013)
Security Analytics: Big Data Analytics for cybersecurity: A review of trends, techniques and tools2013 2nd National Conference on Information Assurance (NCIA)
(2016)
Cyber security management: a review
Dongmei Zhao, Jinxing Liu (2018)
Study on network security situation awareness based on particle swarm optimization algorithmComput. Ind. Eng., 125
Fahman Saeed, M. Hussain, Hatim Aboalsamh (2018)
Classification of Live Scanned Fingerprints using Histogram of Gradient Descriptor2018 21st Saudi Computer Society National Computer Conference (NCC)
Xueyu Li, Xu Zhang, Dongbin Wang (2018)
Spatiotemporal Cyberspace Situation Awareness Mechanism for Backbone Networks2018 4th International Conference on Big Data Computing and Communications (BIGCOM)
Lingjing Kong, Guowei Huang, Keke Wu, Q. Tang, Suying Ye (2018)
Comparison of Internet Traffic Identification on Machine Learning Methods2018 International Conference on Big Data and Artificial Intelligence (BDAI)
Ibraheem Aljamal, Ali Tekeoglu, Korkut Bekiroglu, Saumendra Sengupta (2019)
Hybrid Intrusion Detection System Using Machine Learning Techniques in Cloud Computing Environments2019 IEEE 17th International Conference on Software Engineering Research, Management and Applications (SERA)
Akamin Thongsook, Theerathep Nunthawarasilp, Pachara Kraypet, Jirapong Lim, N. Ruangpayoongsak (2019)
C4.5 Decision Tree against Neural Network on Gait Phase Recognition for Lower Limp Exoskeleton2019 First International Symposium on Instrumentation, Control, Artificial Intelligence, and Robotics (ICA-SYMP)
Yakun Zhang, Weijun Li, Liping Zhang, X. Ning, Linjun Sun, Yaxuan Lu (2019)
Adaptive Learning Gabor Filter for Finger-Vein RecognitionIEEE Access, 7
Chuan Chang, T. Eude, L. Carbajal (2016)
Biometric Authentication by Keystroke Dynamics for Remote Evaluation with One-Class Classification
Hyung Hong, Min Lee, K. Park (2017)
Convolutional Neural Network-Based Finger-Vein Recognition Using NIR Image SensorsSensors (Basel, Switzerland), 17
Behnam Bakhshi, H. Veisi (2019)
End to End Fingerprint Verification Based on Convolutional Neural Network2019 27th Iranian Conference on Electrical Engineering (ICEE)
Lingjing Kong, Guowei Huang, Keke Wu (2017)
Identification of Abnormal Network Traffic Using Support Vector Machine2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)
I. Gheyas, A. Abdallah (2016)
Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysisBig Data Analytics, 1
Wenjie Liu, Weijun Li, Linjun Sun, Liping Zhang, Peng Chen (2017)
Finger vein recognition based on deep learning2017 12th IEEE Conference on Industrial Electronics and Applications (ICIEA)
V. Kanimozhi, T. Jacob (2019)
Artificial Intelligence based Network Intrusion Detection with Hyper-Parameter Optimization Tuning on the Realistic Cyber Dataset CSE-CIC-IDS2018 using Cloud Computing2019 International Conference on Communication and Signal Processing (ICCSP)
(2018)
2018 International Conference on Big Data and Artificial Intelligence (BDAI)
Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zheng, Jucheng Yang, C. Valli (2019)
Securing Deep Learning Based Edge Finger Vein Biometrics With Binary Decision DiagramIEEE Transactions on Industrial Informatics, 15
M. Ali, John Monaco, C. Tappert, Meikang Qiu (2017)
Keystroke Biometric Systems for User AuthenticationJournal of Signal Processing Systems, 86
Hongrui Bao, Haiguang He, Zhe Liu, Zhongwei Liu (2019)
Research on Information Security Situation Awareness System Based on Big Data and Artificial Intelligence Technology2019 International Conference on Robots & Intelligent System (ICRIS)
(2018)
2018 4th International Conference on Big Data Computing and Communications (BIGCOM)
Lingjing Kong, Guowei Huang, Ying Zhou, Jianfeng Ye (2018)
Fast Abnormal Identification for Large Scale Internet TrafficProceedings of the 8th International Conference on Communication and Network Security
Monu Verma, S. Vipparthi, Girdhari Singh (2019)
HiNet: Hybrid Inherited Feature Learning Network for Facial Expression RecognitionIEEE Letters of the Computer Society, 2
Zhongru Wang, Binxing Fang (2019)
Application of combined kernel function artificial intelligence algorithm in mobile communication network security authentication mechanismThe Journal of Supercomputing, 75
Srinivas Parthasarathy, C. Busso (2019)
Semi-Supervised Speech Emotion Recognition With Ladder NetworksIEEE/ACM Transactions on Audio, Speech, and Language Processing, 28
Subha Fairuz, M. Habaebi, E. Elsheikh (2018)
Finger Vein Identification Based On Transfer Learning of AlexNet2018 7th International Conference on Computer and Communication Engineering (ICCCE)
Nouf Aljurayban, Ahmed Emam (2015)
Framework for cloud intrusion detection system service2015 2nd World Symposium on Web Applications and Networking (WSWAN)
Jandaulyet Salyut, Ç. Kurnaz (2018)
Profile Face Recognition using Local Binary Patterns with Artificial Neural Network2018 International Conference on Artificial Intelligence and Data Processing (IDAP)
M. Deng, Haonan Yang, Jiuwen Cao, Xiaoreng Feng (2019)
View-Invariant Gait Recognition Based on Deterministic Learning and Knowledge Fusion2019 International Joint Conference on Neural Networks (IJCNN)
Md. Uddin, W. Khaksar, J. Tørresen (2017)
A robust gait recognition system using spatiotemporal features and deep learning2017 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems (MFI)
Sugandhi K., R. G. (2019)
An Efficient HOG-Centroid Descriptor for Human Gait Recognition2019 Amity International Conference on Artificial Intelligence (AICAI)
Rui Xiao, Hui Zhu, Chao Song, Ximeng Liu, Jian Dong, Hui Li (2018)
Attacking Network Isolation in Software-Defined Networks: New Attacks and Countermeasures2018 27th International Conference on Computer Communication and Networks (ICCCN)
Mike Ford, C. Mallery, Frank Palmasani, M. Rabb, Reid Turner, Lem Soles, D. Snider (2016)
A process to transfer Fail2ban data to an adaptive enterprise intrusion detection and prevention systemSoutheastCon 2016
Ozlem Yavanoglu, M. Aydos (2017)
A review on cyber security datasets for machine learning algorithms2017 IEEE International Conference on Big Data (Big Data)
Changxing Ding, D. Tao (2016)
Trunk-Branch Ensemble Convolutional Neural Networks for Video-Based Face RecognitionIEEE Transactions on Pattern Analysis and Machine Intelligence, 40
Naila Marir, Huiqiang Wang, Guangsheng Feng, Bingyang Li, Meijuan Jia (2018)
Distributed Abnormal Behavior Detection Approach Based on Deep Belief Network and Ensemble SVM Using SparkIEEE Access, 6
K. Veeramachaneni, Ignacio Arnaldo, Vamsi Korrapati, Constantinos Bassias, Kuan-Ching Li (2016)
AI^2: Training a Big Data Machine to Defend2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS)
Yunhu Jin, Yongjun Shen, Guidong Zhang, Hua Zhi (2016)
The model of network security situation assessment based on random forest2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)
Bojan Kolosnjaji, Ambra Demontis, B. Biggio, Davide Maiorca, G. Giacinto, C. Eckert, F. Roli (2018)
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables2018 26th European Signal Processing Conference (EUSIPCO)
Cheng Li, Xingzhi Li (2017)
Cyber performance situation awareness on fuzzy correlation analysis2017 3rd IEEE International Conference on Computer and Communications (ICCC)
Tianyu Gu, Brendan Dolan-Gavitt, S. Garg (2017)
BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply ChainArXiv, abs/1708.06733
A. Gangwar, Akanksha Joshi (2016)
DeepIrisNet: Deep iris representation with applications in iris recognition and cross-sensor iris recognition2016 IEEE International Conference on Image Processing (ICIP)
C. Kruse, Benjamin Frederick, Taylor Jacobson, D. Monticone (2017)
Cybersecurity in healthcare: A systematic review of modern threats and trends.Technology and health care : official journal of the European Society for Engineering and Medicine, 25 1
Seral Özşen, S. Günes, S. Kara, F. Latifoğlu (2009)
Use of Kernel Functions in Artificial Immune Systems for the Nonlinear Classification ProblemsIEEE Transactions on Information Technology in Biomedicine, 13
Yang Lu, Li Xu (2019)
Internet of Things (IoT) Cybersecurity Research: A Review of Current Research TopicsIEEE Internet of Things Journal, 6
V. Jyothi, Xueyang Wang, Sateesh Addepalli, R. Karri (2016)
BRAIN: BehavioR Based Adaptive Intrusion Detection in Networks: Using Hardware Performance Counters to Detect DDoS Attacks2016 29th International Conference on VLSI Design and 2016 15th International Conference on Embedded Systems (VLSID)
Zijie Wang, Robert Turko, Omar Shaikh, Haekyu Park, Nilaksh Das, Fred Hohman, Minsuk Kahng, Duen Chau (2020)
CNN Explainer: Learning Convolutional Neural Networks with Interactive VisualizationIEEE Transactions on Visualization and Computer Graphics, 27
Aditya Amberkar, Parikshit Awasarmol, Gaurav Deshmukh, Piyush Dave (2018)
Speech Recognition using Recurrent Neural Networks2018 International Conference on Current Trends towards Converging Technologies (ICCTCT)
Andreas Holzinger, M. Plass, K. Holzinger, G. Crişan, C. Pintea, V. Palade (2016)
Towards interactive Machine Learning (iML): Applying Ant Colony Algorithms to Solve the Traveling Salesman Problem with the Human-in-the-Loop Approach
Yanpeng Guan, Xiaohua Ge (2018)
Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming AttacksIEEE Transactions on Signal and Information Processing over Networks, 4
Weiwei Hu, Ying Tan (2017)
Generating Adversarial Malware Examples for Black-Box Attacks Based on GANArXiv, abs/1702.05983
A. AdekunleY. (2019)
Holistic Exploration of Gaps vis-à-vis Artificial Intelligence in Automated Teller Machine and Internet Banking
Mohiuddin Ahmed, A. Mahmood, Jiankun Hu (2016)
A survey of network anomaly detection techniquesJ. Netw. Comput. Appl., 60
Lorenzo Maimó, Á. Gómez, F. Clemente, M. Pérez, G. Pérez (2018)
A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G NetworksIEEE Access, 6
M. Sliti, W. Abdallah, N. Boudriga (2018)
Jamming Attack Detection in Optical UAV Networks2018 20th International Conference on Transparent Optical Networks (ICTON)
A. Shoufan (2017)
Continuous authentication of UAV flight command data using behaviometrics2017 IFIP/IEEE International Conference on Very Large Scale Integration (VLSI-SoC)
张智敏, 石飞飞, 万月亮, 1 ,宁焕生, Zhi-min Zhang, ,. Shi, ,. Wan, XU ,, .. Zhang, ,. Ning (2020)
Application progress of artificial intelligence in military confrontationChinese journal of engineering, 42
Zhiyan Han, Jian Wang (2019)
Speech Emotion Recognition Based on Deep Learning and Kernel Nonlinear PSVM2019 Chinese Control And Decision Conference (CCDC)
M. Naderpour, Jie Lu, Guangquan Zhang (2014)
An intelligent situation awareness support system for safety-critical environmentsDecis. Support Syst., 59
U. Schlegel, Hiba Arnout, Mennatallah El-Assady, Daniela Oelke, D. Keim (2019)
Towards A Rigorous Evaluation Of XAI Methods On Time Series2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)
Publisher's Note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations
In recent times, there have been attempts to leverage artificial intelligence (AI) techniques in a broad range of cyber security applications. Therefore, this paper surveys the existing literature (comprising 54 papers mainly published between 2016 and 2020) on the applications of AI in user access authentication, network situation awareness, dangerous behavior monitoring, and abnormal traffic identification. This paper also identifies a number of limitations and challenges, and based on the findings, a conceptual human-in-the-loop intelligence cyber security model is presented.
Artificial Intelligence Review – Springer Journals
Published: Feb 1, 2022
Keywords: Cyber Security; Artificial Intelligence; Security Methods; Human-in-the-Loop
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.