2021 4th International Conference on Information and Communications Technology (ICOIACT) 2021
DOI: 10.1109/icoiact53268.2021.9563985
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning for Security and Security for Machine Learning: A Literature Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 60 publications
0
2
0
Order By: Relevance
“…This study combines the methods used by Kitchenham et al (2007), Liao et al (Liao et al, 2020), and Wiranda (Wiranda & Sadikin, 2021) . There are five stages carried out in this study, as shown in Figure 1.…”
Section: Methodsmentioning
confidence: 99%
“…This study combines the methods used by Kitchenham et al (2007), Liao et al (Liao et al, 2020), and Wiranda (Wiranda & Sadikin, 2021) . There are five stages carried out in this study, as shown in Figure 1.…”
Section: Methodsmentioning
confidence: 99%
“…The model adapts its parameters as input data is introduced, ultimately achieving a well-tailored fit during the cross-validation phase. Harnessing supervised learning can empower organizations to tackle a wide array of real-world challenges on a large scale, including tasks such as sorting spam into a separate folder within an inbox [4].…”
Section: Machine Learning Model For the Heat Exchangermentioning
confidence: 99%