A Survey on Network Slicing Security: Attacks, Challenges, Solutions and Research Directions
The dawn of softwarized networks enables Network Slicing (NS) as an important technology
towards allocating end-to-end logical networks to facilitate diverse requirements of emerging …
towards allocating end-to-end logical networks to facilitate diverse requirements of emerging …
Requirements engineering for machine learning: A systematic mapping study
H Villamizar, T Escovedo… - 2021 47th Euromicro …, 2021 - ieeexplore.ieee.org
Machine learning (ML) has become a core feature for today's real-world applications,
making it a trending topic for the software engineering community. Requirements …
making it a trending topic for the software engineering community. Requirements …
[HTML][HTML] Modeling threats to AI-ML systems using STRIDE
The application of emerging technologies, such as Artificial Intelligence (AI), entails risks that
need to be addressed to ensure secure and trustworthy socio-technical infrastructures …
need to be addressed to ensure secure and trustworthy socio-technical infrastructures …
Requirements engineering for machine learning: A review and reflection
Today, many industrial processes are undergoing digital transformation, which often
requires the integration of well-understood domain models and state-of-the-art machine …
requires the integration of well-understood domain models and state-of-the-art machine …
Security for Machine Learning-based Software Systems: A Survey of Threats, Practices, and Challenges
The rapid development of Machine Learning (ML) has demonstrated superior performance
in many areas, such as computer vision and video and speech recognition. It has now been …
in many areas, such as computer vision and video and speech recognition. It has now been …
Stride-ai: An approach to identifying vulnerabilities of machine learning assets
We propose a security methodology for Machine Learning (ML) pipelines, supporting the
definition of key security properties of ML assets, the identification of threats to them as well …
definition of key security properties of ML assets, the identification of threats to them as well …
[HTML][HTML] Threat modeling of cloud systems with ontological security pattern catalog
B Andrei - International Journal of Open Information Technologies, 2021 - cyberleninka.ru
This work considers challenges, related to the lack of methods of automatic threat modeling
and well-formed data sources of threats and countermeasures as well as techniques to …
and well-formed data sources of threats and countermeasures as well as techniques to …
Conceptualizing the secure machine learning operations (secmlops) paradigm
X Zhang, J Jaskolka - 2022 IEEE 22nd International …, 2022 - ieeexplore.ieee.org
Due to the proliferation of machine learning in various domains and applications, Machine
Learning Operations (MLOps) was created to improve efficiency and adaptability by …
Learning Operations (MLOps) was created to improve efficiency and adaptability by …
Landscape of requirements engineering for machine learning-based ai systems
N Yoshioka, JH Husen, HT Tun, Z Chen… - 2021 28th Asia …, 2021 - ieeexplore.ieee.org
Techniques and practices in RE are not well researched, although problems and the
research challenges on requirements engineering (RE) for machine learning-based systems …
research challenges on requirements engineering (RE) for machine learning-based systems …
[PDF][PDF] Requirements Engineering Challenges and Techniques in Building Chatbots.
The proper execution of requirements engineering processes can be decisive for the
success of software development and, for chatbots, it is no different. Chatbots have been …
success of software development and, for chatbots, it is no different. Chatbots have been …