Role of Machine Learning

An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center

Authors: Sean Oesch, Robert Bridges, Jared Smith, Justin Beaver, John Goodall, Kelly Huffer, Craig Miles, Dan Scofield | Published: 2020-12-16
User Behavior Analysis
Attack Detection
Role of Machine Learning

Exacerbating Algorithmic Bias through Fairness Attacks

Authors: Ninareh Mehrabi, Muhammad Naveed, Fred Morstatter, Aram Galstyan | Published: 2020-12-16
Taxonomy of Attacks
Adversarial Attack Methods
Role of Machine Learning

Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach

Authors: Noah Oghenfego Ogwara, Krassie Petrova, Mee Loong, Yang, Stephen G. MacDonell | Published: 2020-12-15
Cloud Computing
Intrusion Detection System
Role of Machine Learning

Differentiation of Sliding Rescaled Ranges: New Approach to Encrypted and VPN Traffic Detection

Authors: Raoul Nigmatullin, Alexander Ivchenko, Semyon Dorokhin | Published: 2020-12-14
Data Flow Analysis
Time-Related Features
Role of Machine Learning

I-GCN: Robust Graph Convolutional Network via Influence Mechanism

Authors: Haoxi Zhan, Xiaobing Pei | Published: 2020-12-11
Poisoning
Role of Machine Learning
Knowledge Graph

GNNUnlock: Graph Neural Networks-based Oracle-less Unlocking Scheme for Provably Secure Logic Locking

Authors: Lilas Alrahis, Satwik Patnaik, Faiq Khalid, Muhammad Abdullah Hanif, Hani Saleh, Muhammad Shafique, Ozgur Sinanoglu | Published: 2020-12-10
Dataset evaluation
Taxonomy of Attacks
Role of Machine Learning

Data Minimization for GDPR Compliance in Machine Learning Models

Authors: Abigail Goldsteen, Gilad Ezov, Ron Shmelkin, Micha Moffie, Ariel Farkash | Published: 2020-08-06
Data Obfuscation
Data Extraction and Analysis
Role of Machine Learning

Estimating g-Leakage via Machine Learning

Authors: Marco Romanelli, Konstantinos Chatzikokolakis, Catuscia Palamidessi, Pablo Piantanida | Published: 2020-05-09 | Updated: 2021-11-24
Bayesian Classification
Role of Machine Learning
Vulnerability Assessment Method

Insider Threat Detection Based on Stress Recognition Using Keystroke Dynamics

Authors: Azamat Sultanov, Konstantin Kogos | Published: 2020-05-06
Algorithm
Role of Machine Learning
evaluation metrics

Mind the Gap: On Bridging the Semantic Gap between Machine Learning and Information Security

Authors: Michael R. Smith, Nicholas T. Johnson, Joe B. Ingram, Armida J. Carbajal, Ramyaa Ramyaa, Evelyn Domschot, Christopher C. Lamb, Stephen J. Verzi, W. Philip Kegelmeyer | Published: 2020-05-04
Poisoning
Malware Classification
Role of Machine Learning