4.2 Article

Tech Optimization in Cybersecurity Defenses by Advanced ML Methods: The Use Case of Volleyball Industry

Related references

Note: Only part of the references are listed.
Article Engineering, Multidisciplinary

Machine learning in cybersecurity: a comprehensive survey

Dipankar Dasgupta et al.

Summary: This paper provides a comprehensive survey of recent research on machine learning in cybersecurity, covering topics such as cyber-attacks and defenses, commonly used machine learning algorithms, and ML and data mining schemes for cybersecurity. The article also presents an overview of adversarial ML, including the security characteristics of deep learning methods. Additionally, it highlights open issues and challenges in cybersecurity and discusses potential future research directions.

JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS (2022)

Article Education & Educational Research

Machine learning for human learners: opportunities, issues, tensions and threats

Mary E. Webb et al.

Summary: The article discusses the impact of machine learning on human learning and education systems, emphasizing the importance of explainability and accountability in the design of machine learning systems. Students need to understand key aspects of machine learning systems and have opportunities to adapt and create such systems.

ETR&D-EDUCATIONAL TECHNOLOGY RESEARCH AND DEVELOPMENT (2021)

Article Computer Science, Information Systems

Research and Analysis of Sports Training Real-Time Monitoring System Based on Mobile Artificial Intelligence Terminal

Biao Ma et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2020)

Article Computer Science, Artificial Intelligence

Computational Intelligence Enabled Cybersecurity for the Internet of Things

Shanshan Zhao et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE (2020)

Article Computer Science, Hardware & Architecture

Grand Challenge: Applying Artificial Intelligence and Machine Learning to Cybersecurity

Kirk Bresniker et al.

COMPUTER (2019)

Article Computer Science, Information Systems

Artificial intelligence techniques for information security risk assessment

Yasser Azan Basallo et al.

IEEE Latin America Transactions (2018)

Review Computer Science, Information Systems

Cyber security meets artificial intelligence: a survey

Jian-hua Li

FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING (2018)

Proceedings Paper Computer Science, Artificial Intelligence

Research on Optimization of Distributed Big Data Real-Time Management Method

Ping Lin

2018 3RD INTERNATIONAL CONFERENCE ON SMART CITY AND SYSTEMS ENGINEERING (ICSCSE) (2018)

Article Communication

Wearable devices and healthcare: Data sharing and privacy

Syagnik (Sy) Banerjee et al.

INFORMATION SOCIETY (2018)

Article Computer Science, Cybernetics

Unsupervised learning techniques for fine-tuning fuzzy cognitive map causal links

Elpiniki I. Papageorgiou et al.

INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2006)