2020
DOI: 10.3390/electronics9010097
|View full text |Cite
|
Sign up to set email alerts
|

Applications in Security and Evasions in Machine Learning: A Survey

Abstract: In recent years, machine learning (ML) has become an important part to yield security and privacy in various applications. ML is used to address serious issues such as real-time attack detection, data leakage vulnerability assessments and many more. ML extensively supports the demanding requirements of the current scenario of security and privacy across a range of areas such as real-time decision-making, big data processing, reduced cycle time for learning, cost-efficiency and error-free processing. Therefore,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 52 publications
(29 citation statements)
references
References 141 publications
(142 reference statements)
0
27
0
Order By: Relevance
“…The studies [122], [123] investigated the security risks of traditional applications, and developed defence strategies to defend applications from various security risks. In a similar context, to realise the true potential of blockchain systems, the first step is to explore and clarify the security risks that could appear.…”
Section: A Motivationmentioning
confidence: 99%
“…The studies [122], [123] investigated the security risks of traditional applications, and developed defence strategies to defend applications from various security risks. In a similar context, to realise the true potential of blockchain systems, the first step is to explore and clarify the security risks that could appear.…”
Section: A Motivationmentioning
confidence: 99%
“…From previous research [12][13][14] and descriptions related to insider threat detection and analysis based on machine learning methodology, we selected the classification and clustering concepts as well as the related techniques [15,16] for anomaly detection and misuse as the main scope of this research.…”
Section: Insider Threats Based On Machine Learning Approachmentioning
confidence: 99%
“…The usage of machine learning and artificial intelligence techniques is getting expanded rapidly in different areas of life such as finance [14][15][16], education [17], medicine [18][19][20][21], manufacturing industry [22], and particularly in the field of cyber security [23][24][25][26][27][28].…”
Section: Introductionmentioning
confidence: 99%