An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center Authors: Sean Oesch, Robert Bridges, Jared Smith, Justin Beaver, John Goodall, Kelly Huffer, Craig Miles, Dan Scofield | Published: 2020-12-16 User Behavior AnalysisAttack DetectionRole of Machine Learning 2020.12.16 2025.05.28 Literature Database
Exacerbating Algorithmic Bias through Fairness Attacks Authors: Ninareh Mehrabi, Muhammad Naveed, Fred Morstatter, Aram Galstyan | Published: 2020-12-16 Taxonomy of AttacksAdversarial Attack MethodsRole of Machine Learning 2020.12.16 2025.05.28 Literature Database
Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach Authors: Noah Oghenfego Ogwara, Krassie Petrova, Mee Loong, Yang, Stephen G. MacDonell | Published: 2020-12-15 Cloud ComputingIntrusion Detection SystemRole of Machine Learning 2020.12.15 2025.05.28 Literature Database
Differentiation of Sliding Rescaled Ranges: New Approach to Encrypted and VPN Traffic Detection Authors: Raoul Nigmatullin, Alexander Ivchenko, Semyon Dorokhin | Published: 2020-12-14 Data Flow AnalysisTime-Related FeaturesRole of Machine Learning 2020.12.14 2025.05.28 Literature Database
I-GCN: Robust Graph Convolutional Network via Influence Mechanism Authors: Haoxi Zhan, Xiaobing Pei | Published: 2020-12-11 PoisoningRole of Machine LearningKnowledge Graph 2020.12.11 2025.05.28 Literature Database
GNNUnlock: Graph Neural Networks-based Oracle-less Unlocking Scheme for Provably Secure Logic Locking Authors: Lilas Alrahis, Satwik Patnaik, Faiq Khalid, Muhammad Abdullah Hanif, Hani Saleh, Muhammad Shafique, Ozgur Sinanoglu | Published: 2020-12-10 Dataset evaluationTaxonomy of AttacksRole of Machine Learning 2020.12.10 2025.05.28 Literature Database
Data Minimization for GDPR Compliance in Machine Learning Models Authors: Abigail Goldsteen, Gilad Ezov, Ron Shmelkin, Micha Moffie, Ariel Farkash | Published: 2020-08-06 Data ObfuscationData Extraction and AnalysisRole of Machine Learning 2020.08.06 2025.05.28 Literature Database
Estimating g-Leakage via Machine Learning Authors: Marco Romanelli, Konstantinos Chatzikokolakis, Catuscia Palamidessi, Pablo Piantanida | Published: 2020-05-09 | Updated: 2021-11-24 Bayesian ClassificationRole of Machine LearningVulnerability Assessment Method 2020.05.09 2025.05.28 Literature Database
Insider Threat Detection Based on Stress Recognition Using Keystroke Dynamics Authors: Azamat Sultanov, Konstantin Kogos | Published: 2020-05-06 AlgorithmRole of Machine Learningevaluation metrics 2020.05.06 2025.05.28 Literature Database
Mind the Gap: On Bridging the Semantic Gap between Machine Learning and Information Security Authors: Michael R. Smith, Nicholas T. Johnson, Joe B. Ingram, Armida J. Carbajal, Ramyaa Ramyaa, Evelyn Domschot, Christopher C. Lamb, Stephen J. Verzi, W. Philip Kegelmeyer | Published: 2020-05-04 PoisoningMalware ClassificationRole of Machine Learning 2020.05.04 2025.05.28 Literature Database