Trustworthy Machine Learning Approaches for Cyberattack Detection: A Review

被引:0
|
作者
Guembe, Blessing [1 ,3 ]
Azeta, Ambrose [2 ,3 ]
Misra, Sanjay [2 ,3 ]
Ahuja, Ravin [3 ,4 ]
机构
[1] Department of Computer and Information Sciences, Covenant University, Ogun, Ota, Nigeria
[2] Department of Computer Science, Namibia University of Science and Technology, Windhoek, Namibia
[3] Department of Computer Science and Communication, Ostfold University College, Halden, Norway
[4] Delhi Skills and Entrepreneurship University, Delhi, India
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Database systems - Decision trees - Diagnosis - Digital libraries - Face recognition - Learning algorithms - Machine learning - Philosophical aspects - Semantics - Transparency
引用
收藏
页码:265 / 278
相关论文
共 50 条
  • [31] Editorial: Safe and Trustworthy Machine Learning
    Kailkhura, Bhavya
    Chen, Pin-Yu
    Lin, Xue
    Li, Bo
    FRONTIERS IN BIG DATA, 2021, 4
  • [32] The Role of Randomization in Trustworthy Machine Learning
    Papernot, Nicolas
    PROCEEDINGS OF THE 9TH ACM WORKSHOP ON MOVING TARGET DEFENSE, MTD 2022, 2022, : 23 - 24
  • [33] Trustworthy Machine Learning: Fairness and Robustness
    Liu, Haochen
    WSDM'22: PROCEEDINGS OF THE FIFTEENTH ACM INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING, 2022, : 1553 - 1554
  • [34] Sustainable and Trustworthy Edge Machine Learning
    Brandic, Ivona
    IEEE INTERNET COMPUTING, 2021, 25 (05) : 5 - 9
  • [35] Explainable Machine Learning for Trustworthy AI
    Giannotti, Fosca
    ARTIFICIAL INTELLIGENCE RESEARCH AND DEVELOPMENT, 2022, 356 : 3 - 3
  • [36] Detection of trachoma using machine learning approaches
    Socia, Damien
    Brady, Christopher J.
    West, Sheila K.
    Cockrell, R. Chase
    PLOS NEGLECTED TROPICAL DISEASES, 2022, 16 (12):
  • [37] Covert Channel Detection: Machine Learning Approaches
    Elsadig, Muawia A.
    Gafar, Ahmed
    IEEE ACCESS, 2022, 10 : 38391 - 38405
  • [38] Machine Learning Approaches to Maritime Anomaly Detection
    Obradovic, Ines
    Milicevic, Mario
    Zubrinic, Krunoslav
    NASE MORE, 2014, 61 (5-6): : 96 - 101
  • [39] Analysis of machine learning approaches to packing detection
    Van Ouytsel, Charles-Henry Bertrand
    Dam, Khanh Huu The
    Legay, Axel
    COMPUTERS & SECURITY, 2024, 136
  • [40] Collaborative Learning for Cyberattack Detection in Blockchain Networks
    Khoa, Tran Viet
    Son, Do Hai
    Hoang, Dinh Thai
    Trung, Nguyen Linh
    Quynh, Tran Thi Thuy
    Nguyen, Diep N.
    Ha, Nguyen Viet
    Dutkiewicz, Eryk
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2024, 54 (07): : 3920 - 3933