<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Panos Panagiotou</style></author><author><style face="normal" font="default" size="100%">Notis Mengidis</style></author><author><style face="normal" font="default" size="100%">Theodora Tsikrika</style></author><author><style face="normal" font="default" size="100%">Stefanos Vrochidis</style></author><author><style face="normal" font="default" size="100%">Ioannis Kompatsiaris</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">AI</style></keyword><keyword><style  face="normal" font="default" size="100%">anomaly detection</style></keyword><keyword><style  face="normal" font="default" size="100%">artificial intelligence</style></keyword><keyword><style  face="normal" font="default" size="100%">computer security</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">intrusion detection</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><volume><style face="normal" font="default" size="100%">50</style></volume><pages><style face="normal" font="default" size="100%">37-48 </style></pages><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;margin-left:19.85pt;&quot;&gt;Cyberattacks are becoming more sophisticated, posing even greater challenges to traditional intrusion detections methods. Failure to prevent the intrusions could jeopardise security services&amp;rsquo; credibility, including data confidentiality, integrity, and availability. Anomaly-based Intrusion Detection Systems and Signature-based Intrusion Detection Systems are two types of systems that have been proposed in the literature to detect security threats. In the current work, a taxonomy of current IDSs is presented, a review of recent works is performed, and we discuss some of the most common datasets used for evaluation. Finally, the survey concludes with a discussion of future IDS research directions and broader observations.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Matthew N.O. Sadiku</style></author><author><style face="normal" font="default" size="100%">Shumon Alam</style></author><author><style face="normal" font="default" size="100%">Sarhan M. Musa</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Information Assurance Benefits and Challenges: An Introduction</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">computer security</style></keyword><keyword><style  face="normal" font="default" size="100%">information assurance</style></keyword><keyword><style  face="normal" font="default" size="100%">information goods</style></keyword><keyword><style  face="normal" font="default" size="100%">Information Security</style></keyword><keyword><style  face="normal" font="default" size="100%">information services</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><volume><style face="normal" font="default" size="100%">36</style></volume><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Information assurance (IA) is the practice of protecting and defending information systems by ensuring their availability, confidentiality, integrity, authentication, and nonrepudiation. As a discipline, IA grew from the practice of information security. It plays a crucial role in a networked infrastructure of e-commerce, e-business, and e-Government. For this reason, IA is a serious worldwide concern of organizations, industry, governments, and academia. This paper provides a brief introduction on information assurance, the benefits it brings, and the challenges in the implementation of the concept.&lt;/p&gt;</style></abstract></record></records></xml>