You are currently viewing Explainability in Cybersecurity Knowledge Science

Explainability in Cybersecurity Knowledge Science

The Carnegie Mellon College Software program Engineering Institute, AI Engineering: A Nationwide Initiative. Accessed: 2023-08-29.

A. Alshamrani, S. Myneni, A. Chowdhary, and D. Huang, A survey on superior persistent threats: Strategies, options, challenges, and analysis alternatives, IEEE Communications Surveys & Tutorials, 21 (2019), pp. 1851–1877.

H. Barmer, R. Dzombak, M. Gaston, J. Palat, F. Redner, C. Smith, and T. Smith, Human-Centered AI. Accessed: 2023-08-29.

D. Bertsimas and J. Dunn, Optimum classification timber, Machine Studying, 106 (2017), pp. 1039–1082.

A. L. Buczak and E. Guven, A survey of knowledge mining and machine studying strategies for cyber safety intrusion detection, IEEE Communications Surveys & Tutorials, 18 (2015), pp. 1153–1176.

D. Dasgupta, Z. Akhtar, and S. Sen, Machine studying in cybersecurity: a complete survey, The Journal of Protection Modeling and Simulation, 19 (2022), pp. 57–106.

European Parliament and Council of the European Union, Regulation (EU) 2016/679 of the European Parliament and of the Council.

D. Gibert, C. Mateu, and J. Planes, The rise of machine studying for detection and classification of malware: Analysis developments, tendencies and challenges, Journal of Community and Pc Purposes, 153 (2020), p. 102526.

B. Goodman and S. Flaxman, EU rules on algorithmic decision-making and a “proper to rationalization”, in ICML Workshop on Human Interpretability in Machine Studying (WHI 2016), New York, NY., 2016.

Z. Hao, S. Liu, Y. Zhang, C. Ying, Y. Feng, H. Su, and J. Zhu, Physics-informed machine studying: A survey on issues, strategies and purposes, arXiv preprint, arXiv:2211.08064, (2022).

Ok. Highnam, Ok. Arulkumaran, Z. Hanif, and N. R. Jennings, BETH dataset: Actual cybersecurity information for anomaly detection analysis, Coaching, 763 (2021), p. 8.

G. E. Karniadakis, I. G. Kevrekidis, L. Lu, P. Perdikaris, S. Wang, and L. Yang, Physics-informed machine studying, Nature Opinions Physics, 3 (2021), pp. 422–440.

C. Rudin, Cease explaining black field machine studying fashions for top stakes selections and use interpretable fashions as a substitute, Nature Machine Intelligence, 1 (2019), pp. 206–215.

Ok. Shaukat, S. Luo, V. Varadharajan, I. A. Hameed, and M. Xu, A survey on machine studying methods for cyber safety within the final decade, IEEE Entry, 8 (2020), pp. 222310–222354.

D. Ucci, L. Aniello, and R. Baldoni, Survey of machine studying methods for malware evaluation, Computer systems & Safety, 81 (2019), pp. 123–147.

Y. Xin, L. Kong, Z. Liu, Y. Chen, Y. Li, H. Zhu, M. Gao, H. Hou, and C. Wang, Machine studying and deep studying strategies for cybersecurity, IEEE Entry, 6 (2018), pp. 35365–35381.

Leave a Reply