2024
DOI: 10.1016/j.iot.2024.101063
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly detection based on Artificial Intelligence of Things: A Systematic Literature Mapping

Sergio Trilles,
Sahibzada Saadoon Hammad,
Ditsuhi Iskandaryan
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2025
2025

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(2 citation statements)
references
References 68 publications
0
2
0
Order By: Relevance
“…AI algorithms can optimize encryption processes, making them more efficient and resistant to attacks. For example, AI can be used to dynamically adjust encryption keys and protocols based on the sensitivity of the data and the current threat environment, providing adaptive and context-aware data protection [57,58]. Furthermore, Explainable AI (XAI) techniques can be used to create more transparent AI security systems [59].…”
Section: Leveraging Artificial Intelligence and Technological Solutio...mentioning
confidence: 99%
“…AI algorithms can optimize encryption processes, making them more efficient and resistant to attacks. For example, AI can be used to dynamically adjust encryption keys and protocols based on the sensitivity of the data and the current threat environment, providing adaptive and context-aware data protection [57,58]. Furthermore, Explainable AI (XAI) techniques can be used to create more transparent AI security systems [59].…”
Section: Leveraging Artificial Intelligence and Technological Solutio...mentioning
confidence: 99%
“…Machine learning algorithms are increasingly used to automate anomaly detection, and make it more efficient and accurate [14]. Some of these applications including:…”
Section: Introductionmentioning
confidence: 99%