[HTML][HTML] Cyber Threat Intelligence on Blockchain: A Systematic Literature Review

D Chatziamanetoglou, K Rantos - Computers, 2024 - mdpi.com
Cyber Threat Intelligence (CTI) has become increasingly important in safeguarding
organizations against cyber threats. However, managing, storing, analyzing, and sharing …

[HTML][HTML] Federated Learning-Oriented Edge Computing Framework for the IIoT

X Liu, X Dong, N Jia, W Zhao - Sensors, 2024 - mdpi.com
With the maturity of artificial intelligence (AI) technology, applications of AI in edge
computing will greatly promote the development of industrial technology. However, the …

Autonomous Threat Hunting: A Future Paradigm for AI-Driven Threat Intelligence

SR Sindiramutty - arXiv preprint arXiv:2401.00286, 2023 - arxiv.org
The evolution of cybersecurity has spurred the emergence of autonomous threat hunting as
a pivotal paradigm in the realm of AI-driven threat intelligence. This review navigates …

Demystifying Privacy-preserving AI: Strategies for Responsible Data Handling

A Sharma - MZ Journal of Artificial Intelligence, 2024 - mzjournal.com
In the age of data-driven technologies, the intersection of artificial intelligence (AI) and
privacy has become increasingly crucial. While AI offers remarkable opportunities for …

Fil-Cad: A Fault Detection Method for Iiot Based on Federated Incremental Learning with Class Accuracy Distillation

Y Liu, W Fang, W Huang, X Wang, B Zhao… - Available at SSRN … - papers.ssrn.com
Fault detection is a research topic attracting much attention in IIoT. However, the continuous
accumulation and growth of IIoT data leads to the catastrophic forgetting problem in the fault …

[PDF][PDF] Methods for blocking malicious traffic with static Bayes-ian game in IIoT

M Wang, B Zhang, Q Xia - poster-openaccess.com
With the development of the Industrial Internet of Things (IIoT), its security issues have
become prominent, and network attacks have continued to increase, including malicious …