Risk Assessment

Software Bill of Materials in Software Supply Chain Security A Systematic Literature Review

Authors: Eric O'Donoghue, Yvette Hastings, Ernesto Ortiz, A. Redempta Manzi Muneza | Published: 2025-06-04
SBOM分析
Risk Assessment
Causes of Information Leakage

ATAG: AI-Agent Application Threat Assessment with Attack Graphs

Authors: Parth Atulbhai Gandhi, Akansha Shukla, David Tayouri, Beni Ifland, Yuval Elovici, Rami Puzis, Asaf Shabtai | Published: 2025-06-03
Indirect Prompt Injection
Graph Construction
Risk Assessment

Bayesian Pseudo Posterior Mechanism for Differentially Private Machine Learning

Authors: Robert Chew, Matthew R. Williams, Elan A. Segarra, Alexander J. Preiss, Amanda Konet, Terrance D. Savitsky | Published: 2025-03-27
Application of Text Classification
Privacy Issues
Risk Assessment

DeepDyve: Dynamic Verification for Deep Neural Networks

Authors: Yu Li, Min Li, Bo Luo, Ye Tian, Qiang Xu | Published: 2020-09-21 | Updated: 2020-10-16
Risk Assessment
Factors of Performance Degradation
Optimization Problem

Defensive Escort Teams via Multi-Agent Deep Reinforcement Learning

Authors: Arpit Garg, Yazied A. Hasan, Adam Yañez, Lydia Tapia | Published: 2019-10-09
Risk Assessment
Experimental Validation
Reinforcement Learning Environment

IntelliAV: Building an Effective On-Device Android Malware Detector

Authors: Mansour Ahmadi, Angelo Sotgiu, Giorgio Giacinto | Published: 2018-02-04
Risk Assessment
Machine Learning Method
Feature Extraction

Forecasting Suspicious Account Activity at Large-Scale Online Service Providers

Authors: Hassan Halawa, Matei Ripeanu, Konstantin Beznosov, Baris Coskun, Meizhu Liu | Published: 2018-01-25
Model Evaluation
User Behavior Analysis
Risk Assessment