已入深夜,您辛苦了!由于当前在线用户较少,发布求助请尽量完整的填写文献信息,科研通机器人24小时在线,伴您度过漫漫科研夜!祝你早点完成任务,早点休息,好梦!

Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects

计算机科学 活力 自动化 数据科学 计算机安全 弹性(材料科学) 网络空间 大数据 工程类 万维网 数据挖掘 机械工程 物理 互联网 量子力学 热力学
作者
Iqbal H. Sarker,Helge Janicke,Ahmad Mohsin,Asif Qumer Gill,Λέανδρος Μαγλαράς
出处
期刊:ICT Express [Elsevier BV]
卷期号:10 (4): 935-958 被引量:26
标识
DOI:10.1016/j.icte.2024.05.007
摘要

Digital twins (DTs) are an emerging digitalization technology with a huge impact on today's innovations in both industry and research. DTs can significantly enhance our society and quality of life through the virtualization of a real-world physical system, providing greater insights about their operations and assets, as well as enhancing their resilience through real-time monitoring and proactive maintenance. DTs also pose significant security risks, as intellectual property is encoded and more accessible, as well as their continued synchronization to their physical counterparts. The rapid proliferation and dynamism of cyber threats in today's digital environments motivate the development of automated and intelligent cyber solutions. Today's industrial transformation relies heavily on artificial intelligence (AI), including machine learning (ML) and data-driven technologies that allow machines to perform tasks such as self-monitoring, investigation, diagnosis, future prediction, and decision-making intelligently. However, to effectively employ AI-based models in the context of cybersecurity, human-understandable explanations, and their trustworthiness, are significant factors when making decisions in real-world scenarios. This article provides an extensive study of explainable AI (XAI) based cybersecurity modeling through a taxonomy of AI and XAI methods that can assist security analysts and professionals in comprehending system functions, identifying potential threats and anomalies, and ultimately addressing them in DT environments in an intelligent manner. We discuss how these methods can play a key role in solving contemporary cybersecurity issues in various real-world applications. We conclude this paper by identifying crucial challenges and avenues for further research, as well as directions on how professionals and researchers might approach and model future-generation cybersecurity in this emerging field.
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
redstone发布了新的文献求助10
1秒前
润润润完成签到 ,获得积分10
2秒前
XD824完成签到,获得积分10
3秒前
学医的小胖子完成签到 ,获得积分10
7秒前
redstone完成签到,获得积分10
7秒前
9秒前
kai chen完成签到 ,获得积分0
10秒前
汉堡包应助ERIS采纳,获得10
10秒前
热心盼波完成签到,获得积分10
11秒前
沉静盼易发布了新的文献求助10
13秒前
等待寄云完成签到 ,获得积分10
15秒前
可爱的函函应助沉静盼易采纳,获得10
18秒前
18秒前
19秒前
阿玖完成签到 ,获得积分10
20秒前
端庄洪纲发布了新的文献求助10
20秒前
星宇应助暗鲨猫猫头采纳,获得10
20秒前
LU完成签到,获得积分10
21秒前
粽子发布了新的文献求助10
21秒前
xl完成签到 ,获得积分10
23秒前
henxi完成签到,获得积分10
24秒前
nenoaowu应助Fiona采纳,获得30
26秒前
义气高丽完成签到 ,获得积分10
27秒前
铁甲小宝完成签到,获得积分10
27秒前
粽子完成签到,获得积分10
29秒前
星星完成签到,获得积分10
30秒前
A吞发布了新的文献求助10
33秒前
36秒前
5001完成签到,获得积分10
39秒前
友好半邪完成签到 ,获得积分20
39秒前
鱼yu发布了新的文献求助10
40秒前
Hugo完成签到,获得积分10
41秒前
云霞完成签到 ,获得积分10
42秒前
A吞完成签到,获得积分20
45秒前
吴雪葵完成签到,获得积分10
46秒前
科研通AI2S应助鱼yu采纳,获得10
46秒前
Skye完成签到 ,获得积分10
48秒前
林黛玉完成签到 ,获得积分10
49秒前
付创完成签到,获得积分10
49秒前
loudly完成签到,获得积分10
50秒前
高分求助中
Applied Survey Data Analysis (第三版, 2025) 800
Assessing and Diagnosing Young Children with Neurodevelopmental Disorders (2nd Edition) 700
The Elgar Companion to Consumer Behaviour and the Sustainable Development Goals 540
Images that translate 500
Handbook of Innovations in Political Psychology 400
Mapping the Stars: Celebrity, Metonymy, and the Networked Politics of Identity 400
Towards a spatial history of contemporary art in China 300
热门求助领域 (近24小时)
化学 材料科学 医学 生物 工程类 有机化学 物理 生物化学 纳米技术 计算机科学 化学工程 内科学 复合材料 物理化学 电极 遗传学 量子力学 基因 冶金 催化作用
热门帖子
关注 科研通微信公众号,转发送积分 3843144
求助须知:如何正确求助?哪些是违规求助? 3385420
关于积分的说明 10540341
捐赠科研通 3105987
什么是DOI,文献DOI怎么找? 1710810
邀请新用户注册赠送积分活动 823771
科研通“疑难数据库(出版商)”最低求助积分说明 774264