Software Bill of Materials in Software Supply Chain Security A Systematic Literature Review Authors: Eric O'Donoghue, Yvette Hastings, Ernesto Ortiz, A. Redempta Manzi Muneza | Published: 2025-06-04 SBOM分析Risk AssessmentCauses of Information Leakage 2025.06.04 2025.06.06 Literature Database
ATAG: AI-Agent Application Threat Assessment with Attack Graphs Authors: Parth Atulbhai Gandhi, Akansha Shukla, David Tayouri, Beni Ifland, Yuval Elovici, Rami Puzis, Asaf Shabtai | Published: 2025-06-03 Indirect Prompt InjectionGraph ConstructionRisk Assessment 2025.06.03 2025.06.05 Literature Database
Bayesian Pseudo Posterior Mechanism for Differentially Private Machine Learning Authors: Robert Chew, Matthew R. Williams, Elan A. Segarra, Alexander J. Preiss, Amanda Konet, Terrance D. Savitsky | Published: 2025-03-27 Application of Text ClassificationPrivacy IssuesRisk Assessment 2025.03.27 2025.05.27 Literature Database
DeepDyve: Dynamic Verification for Deep Neural Networks Authors: Yu Li, Min Li, Bo Luo, Ye Tian, Qiang Xu | Published: 2020-09-21 | Updated: 2020-10-16 Risk AssessmentFactors of Performance DegradationOptimization Problem 2020.09.21 2025.05.28 Literature Database
Defensive Escort Teams via Multi-Agent Deep Reinforcement Learning Authors: Arpit Garg, Yazied A. Hasan, Adam Yañez, Lydia Tapia | Published: 2019-10-09 Risk AssessmentExperimental ValidationReinforcement Learning Environment 2019.10.09 2025.05.28 Literature Database
IntelliAV: Building an Effective On-Device Android Malware Detector Authors: Mansour Ahmadi, Angelo Sotgiu, Giorgio Giacinto | Published: 2018-02-04 Risk AssessmentMachine Learning MethodFeature Extraction 2018.02.04 2025.05.28 Literature Database
Forecasting Suspicious Account Activity at Large-Scale Online Service Providers Authors: Hassan Halawa, Matei Ripeanu, Konstantin Beznosov, Baris Coskun, Meizhu Liu | Published: 2018-01-25 Model EvaluationUser Behavior AnalysisRisk Assessment 2018.01.25 2025.05.28 Literature Database