ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
CyberLearning: Effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks
Internet of Things
◽
10.1016/j.iot.2021.100393
◽
2021
◽
Vol 14
◽
pp. 100393
Author(s):
Iqbal H. Sarker
Keyword(s):
Machine Learning
◽
Effectiveness Analysis
◽
Security Modeling
◽
Machine Learning Security
Download Full-text
Related Documents
Cited By
References
The Top 10 Risks of Machine Learning Security
Computer
◽
10.1109/mc.2020.2984868
◽
2020
◽
Vol 53
(6)
◽
pp. 57-61
◽
Cited By ~ 1
Author(s):
Gary McGraw
◽
Richie Bonett
◽
Victor Shepardson
◽
Harold Figueroa
Keyword(s):
Machine Learning
◽
Machine Learning Security
Download Full-text
A Guide to Research Frontier of Machine Learning Security
IEICE ESS FUNDAMENTALS REVIEW
◽
10.1587/essfr.15.1_37
◽
2021
◽
Vol 15
(1)
◽
pp. 37-46
Author(s):
Ikuya MORIKAWA
Keyword(s):
Machine Learning
◽
Machine Learning Security
Download Full-text
Assessment of Machine Learning Security: The Case of Healthcare Data
International Conference on Data Science, E-learning and Information Systems 2021
◽
10.1145/3460620.3460738
◽
2021
◽
Author(s):
Anood Manasrah
◽
Aisha Alkayem
◽
Malik Qasaimeh
◽
Samer Nofal
Keyword(s):
Machine Learning
◽
Healthcare Data
◽
Machine Learning Security
Download Full-text
Effectiveness Analysis of Traditional Chinese Medicine for Anti-Alzheimer’s Disease Based on Machine Learning
Communications in Computer and Information Science - Security and Privacy in Social Networks and Big Data
◽
10.1007/978-981-15-9031-3_18
◽
2020
◽
pp. 203-214
Author(s):
Jingwen Lu
◽
Peng Tang
◽
Weidong Qiu
◽
Hao Wang
◽
Jie Guo
Keyword(s):
Machine Learning
◽
Alzheimer’S Disease
◽
Alzheimer's Disease
◽
Chinese Medicine
◽
Traditional Chinese Medicine
◽
Effectiveness Analysis
Download Full-text
Effectiveness analysis of machine learning in education big data
Journal of Physics Conference Series
◽
10.1088/1742-6596/1651/1/012105
◽
2020
◽
Vol 1651
◽
pp. 012105
Author(s):
Ya Zhou
◽
Zhuoqing Song
Keyword(s):
Machine Learning
◽
Big Data
◽
Effectiveness Analysis
Download Full-text
Bitcoin Concepts, Threats, and Machine-Learning Security Solutions
IEEE Access
◽
10.1109/access.2018.2874539
◽
2018
◽
Vol 6
◽
pp. 67189-67205
◽
Cited By ~ 20
Author(s):
Mohamed Rahouti
◽
Kaiqi Xiong
◽
Nasir Ghani
Keyword(s):
Machine Learning
◽
Machine Learning Security
Download Full-text
Machine Learning Security Assessment Method Based on Adversary and Attack Methods
Communications in Computer and Information Science - Telematics and Computing
◽
10.1007/978-3-030-62554-2_27
◽
2020
◽
pp. 377-389
Author(s):
Hugo Sebastian Pacheco-Rodríguez
◽
Eleazar Aguirre-Anaya
◽
Ricardo Menchaca-Méndez
◽
Manel Medina-Llinàs
Keyword(s):
Machine Learning
◽
Assessment Method
◽
Security Assessment
◽
Machine Learning Security
Download Full-text
Effectiveness analysis of machine learning classification models for predicting personalized context-aware smartphone usage
Journal Of Big Data
◽
10.1186/s40537-019-0219-y
◽
2019
◽
Vol 6
(1)
◽
Cited By ~ 31
Author(s):
Iqbal H. Sarker
◽
A. S. M. Kayes
◽
Paul Watters
Keyword(s):
Machine Learning
◽
Context Aware
◽
Classification Models
◽
Machine Learning Classification
◽
Effectiveness Analysis
Download Full-text
Machine Learning Security Allocation in IoT
2019 International Conference on Intelligent Computing and Control Systems (ICCS)
◽
10.1109/iccs45141.2019.9065886
◽
2019
◽
Author(s):
P. Karthika
◽
R. Ganesh Babu
◽
A. Nedumaran
Keyword(s):
Machine Learning
◽
Machine Learning Security
Download Full-text
Cryptographic Strength and Machine Learning Security for Low Complexity IoT Sensors
2019 IEEE 17th International Conference on Industrial Informatics (INDIN)
◽
10.1109/indin41052.2019.8972053
◽
2019
◽
Author(s):
Jan Long
◽
Sam Matsumoto
Keyword(s):
Machine Learning
◽
Low Complexity
◽
Machine Learning Security
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close