A survey of anomaly and automation from a cybersecurity perspective

Michael Donevski, Tanveer Zia

Research output: Book chapter/Published conference paperConference paperpeer-review

1 Citation (Scopus)
1 Downloads (Pure)


As the technological advances mature towards widespread adoption of Internet of Things (IoT) and Cyber Physical Systems (CPS), there come new security challenges, vulnerabilities, threats and attacks. Countering these security challenges require advance detection, prevention and defence techniques backed by automation and machine learning. This survey paper defines the cybersecurity preliminaries and stimulates questions to use machine learning and automation to counter cybersecurity challenges, many of those are unknown. The paper examines the literature and outlines research undertaken in the cybersecurity domain combating unknown or previously not seen cyber-attacks with focus on autonomous management of anomalies.
Original languageEnglish
Title of host publication2018 IEEE Globcom Workshops (GC Wkshps)
Subtitle of host publication2018 IEEE Workshop on Communication, Computing, and Networking in Cyber Physical Systems
Place of PublicationRed Hook NY, USA
Number of pages6
ISBN (Electronic)9781538649206 , 9781538669778 (USB)
ISBN (Print)9781538649213
Publication statusPublished - 13 Dec 2018
Event IEEE Global Telecommunications Conference Globecom 2018 - Abu Dhabi National Exhibition Centre (ADNEC) , Abu Dhabi, United Arab Emirates
Duration: 09 Dec 201813 Dec 2018
https://globecom2018.ieee-globecom.org/ (conference website)


Conference IEEE Global Telecommunications Conference Globecom 2018
CountryUnited Arab Emirates
CityAbu Dhabi
OtherIEEE GLOBECOM is one of the two flagship conferences of the IEEE Communications Society (ComSoc), and is a premium event that brings together the best researchers and professionals from academic, industry and government to exchange novel ideas that will shape future generations of communication technologies.
Internet address

Fingerprint Dive into the research topics of 'A survey of anomaly and automation from a cybersecurity perspective'. Together they form a unique fingerprint.

Cite this