A Survey on Network Slicing Security: Attacks, Challenges, Solutions and Research Directions

C De Alwis, P Porambage, K Dev… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The dawn of softwarized networks enables Network Slicing (NS) as an important technology
towards allocating end-to-end logical networks to facilitate diverse requirements of emerging …

Requirements engineering for machine learning: A systematic mapping study

H Villamizar, T Escovedo… - 2021 47th Euromicro …, 2021 - ieeexplore.ieee.org
Machine learning (ML) has become a core feature for today's real-world applications,
making it a trending topic for the software engineering community. Requirements …

[HTML][HTML] Modeling threats to AI-ML systems using STRIDE

L Mauri, E Damiani - Sensors, 2022 - mdpi.com
The application of emerging technologies, such as Artificial Intelligence (AI), entails risks that
need to be addressed to ensure secure and trustworthy socio-technical infrastructures …

Requirements engineering for machine learning: A review and reflection

Z Pei, L Liu, C Wang, J Wang - 2022 IEEE 30th International …, 2022 - ieeexplore.ieee.org
Today, many industrial processes are undergoing digital transformation, which often
requires the integration of well-understood domain models and state-of-the-art machine …

Security for Machine Learning-based Software Systems: A Survey of Threats, Practices, and Challenges

H Chen, MA Babar - ACM Computing Surveys, 2024 - dl.acm.org
The rapid development of Machine Learning (ML) has demonstrated superior performance
in many areas, such as computer vision and video and speech recognition. It has now been …

Stride-ai: An approach to identifying vulnerabilities of machine learning assets

L Mauri, E Damiani - … on cyber security and resilience (CSR), 2021 - ieeexplore.ieee.org
We propose a security methodology for Machine Learning (ML) pipelines, supporting the
definition of key security properties of ML assets, the identification of threats to them as well …

[HTML][HTML] Threat modeling of cloud systems with ontological security pattern catalog

B Andrei - International Journal of Open Information Technologies, 2021 - cyberleninka.ru
This work considers challenges, related to the lack of methods of automatic threat modeling
and well-formed data sources of threats and countermeasures as well as techniques to …

Conceptualizing the secure machine learning operations (secmlops) paradigm

X Zhang, J Jaskolka - 2022 IEEE 22nd International …, 2022 - ieeexplore.ieee.org
Due to the proliferation of machine learning in various domains and applications, Machine
Learning Operations (MLOps) was created to improve efficiency and adaptability by …

Landscape of requirements engineering for machine learning-based ai systems

N Yoshioka, JH Husen, HT Tun, Z Chen… - 2021 28th Asia …, 2021 - ieeexplore.ieee.org
Techniques and practices in RE are not well researched, although problems and the
research challenges on requirements engineering (RE) for machine learning-based systems …

[PDF][PDF] Requirements Engineering Challenges and Techniques in Building Chatbots.

GRS Silva, ED Canedo - ICAART (1), 2022 - scitepress.org
The proper execution of requirements engineering processes can be decisive for the
success of software development and, for chatbots, it is no different. Chatbots have been …