Modeling security violation processes in machine learning systems
The widespread use of machine learning, including at critical information infrastructure facilities, entails risks of security threats in the absence of reliable means of protection. The article views the processes in machine learning systems as the ones occurring in information systems susceptible...
Main Authors: | Maxim A. Chekmarev, Stanislav G. Klyuev, Viktor V. Shadskiy |
---|---|
Format: | Article |
Language: | English |
Published: |
Saint Petersburg National Research University of Information Technologies, Mechanics and Optics (ITMO University)
2021-08-01
|
Series: | Naučno-tehničeskij Vestnik Informacionnyh Tehnologij, Mehaniki i Optiki |
Subjects: | |
Online Access: | https://ntv.ifmo.ru/file/article/20592.pdf |
Similar Items
-
Reasons for Picture Archiving and Communication System (PACS) data security breaches: Intentional versus non-intentional breaches
by: Tintswalo Brenda Mahlaola, et al.
Published: (2016-12-01) -
Reasons for Picture Archiving and Communication System (PACS) data security breaches: Intentional versus non-intentional breaches
by: Tintswalo B. Mahlaola, et al.
Published: (2016-10-01) -
Confidentiality challenges surrounding plasma therapy during the COVID-19 pandemic: a case discussion in Iran
by: Saeedeh Saeedi Tehrani, et al.
Published: (2020-12-01) -
Ethical issues in electronic health records: A general overview
by: Fouzia F Ozair, et al.
Published: (2015-01-01) -
Model for Quantifying the Quality of Secure Service
by: Paul M. Simon, et al.
Published: (2021-05-01)