2020
DOI: 10.1007/978-3-030-38788-4_6
|View full text |Cite
|
Sign up to set email alerts
|

Seven Pitfalls of Using Data Science in Cybersecurity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…They are more voluminous, noisier, and more complex than the ones used in regular modeling practices for analyzing algorithms performance and comparisons. 333 As observed, these problems are not exclusive of PSE areas but of the modeling community. Several solutions have been proposed for solving or, at least, mitigating this issues.…”
Section: Critical Analysis and Identified Limitationsmentioning
confidence: 95%
See 2 more Smart Citations
“…They are more voluminous, noisier, and more complex than the ones used in regular modeling practices for analyzing algorithms performance and comparisons. 333 As observed, these problems are not exclusive of PSE areas but of the modeling community. Several solutions have been proposed for solving or, at least, mitigating this issues.…”
Section: Critical Analysis and Identified Limitationsmentioning
confidence: 95%
“…In addition, the use of an algorithm for a typical case does not guarantee the same result in a different case. , In addition, real world problems have a different behavior of idealized or synthetic data sets. They are more voluminous, noisier, and more complex than the ones used in regular modeling practices for analyzing algorithms performance and comparisons . As observed, these problems are not exclusive of PSE areas but of the modeling community.…”
Section: Critical Analysis and Identified Limitationsmentioning
confidence: 99%
See 1 more Smart Citation
“…It has been used successfully in other domains, such as network traffic analysis [ 45 , 46 ] and biometrics [ 47 ]. There are several pitfalls, however, as described by Johnstone and Peacock [ 48 ]. To overcome some of these issues, a variant of a recurrent neural network, called a long short-term memory or LSTM is attractive.…”
Section: Related Workmentioning
confidence: 99%