Risk Management

The Dangers of Computational Law and Cybersecurity; Perspectives from Engineering and the AI Act

Authors: Kaspar Rosager Ludvigsen, Shishir Nagaraja, Angela Daly | Published: 2022-07-01
Cybersecurity
Risk Management
Artificial Intelligence Regulation

Threat Assessment in Machine Learning based Systems

Authors: Lionel Nganyewou Tidjon, Foutse Khomh | Published: 2022-06-30
Risk Management
Attacker Behavior Analysis
Threat Model

Differentially Empirical Risk Minimization under the Fairness Lens

Authors: Cuong Tran, My H. Dinh, Ferdinando Fioretto | Published: 2021-06-04 | Updated: 2022-09-08
DP-SGD
Privacy Protection Method
Risk Management

GRAVITAS: Graphical Reticulated Attack Vectors for Internet-of-Things Aggregate Security

Authors: Jacob Brown, Tanujay Saha, Niraj K. Jha | Published: 2021-05-31
Risk Management
Vulnerability Assessment Method
Defense Mechanism

Darknet Data Mining — A Canadian Cyber-crime Perspective

Authors: Edward Crowder, Jay Lansiquot | Published: 2021-05-18
Darknet Traffic Analysis
Data Collection
Risk Management

On Data Augmentation and Adversarial Risk: An Empirical Analysis

Authors: Hamid Eghbal-zadeh, Khaled Koutini, Paul Primus, Verena Haunschmid, Michal Lewandowski, Werner Zellinger, Bernhard A. Moser, Gerhard Widmer | Published: 2020-07-06
Poisoning
Risk Management
Adversarial Learning

A Multi-step and Resilient Predictive Q-learning Algorithm for IoT with Human Operators in the Loop: A Case Study in Water Supply Networks

Authors: Maria Grammatopoulou, Aris Kanellopoulos, Kyriakos G. ~Vamvoudakis, Nathan Lau | Published: 2020-06-06
Algorithm
Risk Management
Improvement of Learning

Assessing Supply Chain Cyber Risks

Authors: Alberto Redondo, Alberto Torres-Barrán, David Ríos Insua, Jordi Domingo | Published: 2019-11-26
Risk Management
Information Security
Attack Type

Towards Federated Graph Learning for Collaborative Financial Crimes Detection

Authors: Toyotaro Suzumura, Yi Zhou, Natahalie Baracaldo, Guangnan Ye, Keith Houck, Ryo Kawahara, Ali Anwar, Lucia Larise Stavarache, Yuji Watanabe, Pablo Loyola, Daniel Klyashtorny, Heiko Ludwig, Kumar Bhaskaran | Published: 2019-09-19 | Updated: 2019-10-02
Graph Representation Learning
Risk Management
Machine Learning Application

A Deep Belief Network Based Machine Learning System for Risky Host Detection

Authors: Wangyan Feng, Shuning Wu, Xiaodan Li, Kevin Kunkle | Published: 2017-12-29
Risk Management
Performance Evaluation Metrics
Machine Learning Algorithm