<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Panos Panagiotou</style></author><author><style face="normal" font="default" size="100%">Notis Mengidis</style></author><author><style face="normal" font="default" size="100%">Theodora Tsikrika</style></author><author><style face="normal" font="default" size="100%">Stefanos Vrochidis</style></author><author><style face="normal" font="default" size="100%">Ioannis Kompatsiaris</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">AI</style></keyword><keyword><style  face="normal" font="default" size="100%">anomaly detection</style></keyword><keyword><style  face="normal" font="default" size="100%">artificial intelligence</style></keyword><keyword><style  face="normal" font="default" size="100%">computer security</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">intrusion detection</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">50</style></volume><pages><style face="normal" font="default" size="100%">37-48 </style></pages><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;margin-left:19.85pt;&quot;&gt;Cyberattacks are becoming more sophisticated, posing even greater challenges to traditional intrusion detections methods. Failure to prevent the intrusions could jeopardise security services&amp;rsquo; credibility, including data confidentiality, integrity, and availability. Anomaly-based Intrusion Detection Systems and Signature-based Intrusion Detection Systems are two types of systems that have been proposed in the literature to detect security threats. In the current work, a taxonomy of current IDSs is presented, a review of recent works is performed, and we discuss some of the most common datasets used for evaluation. Finally, the survey concludes with a discussion of future IDS research directions and broader observations.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Notis Mengidis</style></author><author><style face="normal" font="default" size="100%">Theodora Tsikrika</style></author><author><style face="normal" font="default" size="100%">Stefanos Vrochidis</style></author><author><style face="normal" font="default" size="100%">Ioannis Kompatsiaris</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Blockchain and AI for the Next Generation Energy Grids: Cybersecurity Challenges and Opportunities</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">AI</style></keyword><keyword><style  face="normal" font="default" size="100%">blockchain</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">Energy Grid</style></keyword><keyword><style  face="normal" font="default" size="100%">Smart Contracts</style></keyword><keyword><style  face="normal" font="default" size="100%">Smart Grid</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2019</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">43</style></volume><pages><style face="normal" font="default" size="100%">21-33</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Renewable energy sources and the increasing interest in green energy have been the driving forces behind many innovations in the energy sector, such as how utility companies interact with their customers and vice versa. The introduction of smart grids is one of these innovations in what is basically a fusion between the traditional energy grid with the IT sector. Even though this new combination brings a plethora of advantages, it also comes with an increase of the attack surface of the energy grid, which becomes susceptible to cyberattacks. In this work, we analyse the emerging cybersecurity challenges and how the ensuing risks could be alleviated by the advancements in AI and blockchain technologies.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">21</style></section></record></records></xml>