Is this IoT Device Likely to be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines Authors: Carlos A. Rivera Alvarez, Arash Shaghaghi, David D. Nguyen, Salil S. Kanhere | Published: 2021-11-23 Dataset evaluationModel Selection MethodRisk Assessment Method 2021.11.23 2025.05.28 Literature Database
Automated Security Assessment for the Internet of Things Authors: Xuanyu Duan, Mengmeng Ge, Triet H. M. Le, Faheem Ullah, Shang Gao, Xuequan Lu, M. Ali Babar | Published: 2021-09-09 Risk Assessment MethodMachine LearningVulnerability detection 2021.09.09 2025.05.28 Literature Database
Knowledge mining of unstructured information: application to cyber-domain Authors: Tuomas Takko, Kunal Bhattacharya, Martti Lehto, Pertti Jalasvirta, Aapo Cederberg, Kimmo Kaski | Published: 2021-09-08 | Updated: 2022-08-01 Risk Assessment MethodInformation Extraction MethodKnowledge Graph 2021.09.08 2025.05.28 Literature Database
Formalizing Distribution Inference Risks Authors: Anshuman Suri, David Evans | Published: 2021-06-07 | Updated: 2021-09-24 Cyber ThreatProperty Inference AttackRisk Assessment Method 2021.06.07 2025.05.28 Literature Database
Statistical inference for individual fairness Authors: Subha Maity, Songkai Xue, Mikhail Yurochkin, Yuekai Sun | Published: 2021-03-30 Risk Assessment MethodFairness evaluationOptimization Methods 2021.03.30 2025.05.28 Literature Database
Modeling Multivariate Cyber Risks: Deep Learning Dating Extreme Value Theory Authors: Mingyue Zhang Wu, Jinzhu Luo, Xing Fang, Maochao Xu, Peng Zhao | Published: 2021-03-15 Performance EvaluationRisk Assessment MethodDeep Learning Technology 2021.03.15 2025.05.28 Literature Database