Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 2

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
1
Content available Cyber threats of machine learning
EN
This paper offers a detailed and comprehensive analysis of the various cyber threats that target machine learning models and applications. It begins by characterizing basic classifiers and exploring the objectives of intentional attacks on typical classifiers, providing a foundational understanding of the threat landscape. The paper then thoroughly examines the vulnerabilities that machine learning systems face, alongside the methods for detecting, countering, and responding to these cyber threats. Special attention is given to specific types of threats, including attacks on machine learning models, adversarial attacks, poisoning attacks, and backdoor attacks. The paper also addresses critical issues such as attacks on data protection mechanisms, replay attacks, denial of service attacks, learning model theft, malware, and breaches in data privacy. Each of these threats is analyzed in detail, with a focus on their potential impact and the strategies that can be employed to mitigate them. In its conclusion, the paper provides recommendations on regulatory measures and best practices to safeguard machine learning models and applications against these evolving cyber threats. These recommendations emphasize the necessity for a robust regulatory framework to ensure the security, reliability, and integrity of machine learning systems in an increasingly digital and interconnected world.
2
Content available Selected issues of threat management in cyberspace
EN
The paper describes the cyber threat management system. Three essential components of such a system are presented. With reference to such documents as ISO 2700, the NIST Cyber Security Framework, U.S. presidential executive orders, European Union regulations or STIX and TAXIS standards, norms, legal and standards regulations for managing cyber threats are described. The cyber threat management model is presented. Kill Chain and MITRE ATT&CK threat description methods are presented. A toolkit to support various stages of the cyber threat management process is also described.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.