Academic literature on the topic 'Machine Learning in Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Machine Learning in Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Machine Learning in Security"
Dubey, Harshita. "High Security Machine Learning Algorithm for Industrial IoT." International Journal of Science and Research (IJSR) 12, no. 4 (2023): 1794–99. http://dx.doi.org/10.21275/sr23428074556.
Full textSingh, Dr Sachin, Piyush Rastogi, Prabal Bhatnagar, RavishKr Dubey, Salman Siddique, and Mansi Pathak. "Enhancing Blockchain Security and Efficiency with Machine Learning." International Journal of Research Publication and Reviews 6, sp5 (2025): 224–30. https://doi.org/10.55248/gengpi.6.sp525.1930.
Full textMajjaru, Chandrababu, and Senthil Kumar K. Dr. "Proficient Machine Learning Techniques for a Secured Cloud Environment." International Journal of Engineering and Advanced Technology (IJEAT) 11, no. 6 (2022): 74–81. https://doi.org/10.35940/ijeat.F3730.0811622.
Full textBaracaldo, Nathalie, and Alina Oprea. "Machine Learning Security and Privacy." IEEE Security & Privacy 20, no. 5 (2022): 11–13. http://dx.doi.org/10.1109/msec.2022.3188190.
Full textSuomalainen, Jani, Arto Juhola, Shahriar Shahabuddin, Aarne Mammela, and Ijaz Ahmad. "Machine Learning Threatens 5G Security." IEEE Access 8 (2020): 190822–42. http://dx.doi.org/10.1109/access.2020.3031966.
Full textGupta, Tanishq. "Machine Learning in Cyber security." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–9. https://doi.org/10.55041/ijsrem40331.
Full textMcgraw, Gary, Richie Bonett, Harold Figueroa, and Victor Shepardson. "Security Engineering for Machine Learning." Computer 52, no. 8 (2019): 54–57. http://dx.doi.org/10.1109/mc.2019.2909955.
Full textHartmann, Mark. "Machine Learning und IT-Security." Datenschutz und Datensicherheit - DuD 42, no. 4 (2018): 231–35. http://dx.doi.org/10.1007/s11623-018-0913-5.
Full textBarreno, Marco, Blaine Nelson, Anthony D. Joseph, and J. D. Tygar. "The security of machine learning." Machine Learning 81, no. 2 (2010): 121–48. http://dx.doi.org/10.1007/s10994-010-5188-5.
Full textAhmad, Asiyah. "Improving Distance Learning Security using Machine Learning." Journal of Computer Science Application and Engineering (JOSAPEN) 1, no. 2 (2023): 39–43. https://doi.org/10.70356/josapen.v1i2.13.
Full textDissertations / Theses on the topic "Machine Learning in Security"
Stomeo, Carlo. "Applying Machine Learning to Cyber Security." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/17303/.
Full textJan, Steve T. K. "Robustifying Machine Learning based Security Applications." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/99862.
Full textDEMETRIO, LUCA. "Formalizing evasion attacks against machine learning security detectors." Doctoral thesis, Università degli studi di Genova, 2021. http://hdl.handle.net/11567/1035018.
Full textShrivastwa, Ritu Ranjan. "Enhancements in Embedded Systems Security using Machine Learning." Electronic Thesis or Diss., Institut polytechnique de Paris, 2023. http://www.theses.fr/2023IPPAT051.
Full textTian, Ke. "Learning-based Cyber Security Analysis and Binary Customization for Security." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/85013.
Full textPozdniakov, K. "A machine learning approach for smart computer security audit." Thesis, City, University of London, 2017. http://openaccess.city.ac.uk/19971/.
Full textGrosse, Kathrin [Verfasser]. "Why is Machine Learning Security so hard? / Kathrin Grosse." Saarbrücken : Saarländische Universitäts- und Landesbibliothek, 2020. http://d-nb.info/1237268818/34.
Full textSorio, Enrico. "Machine Learning Techniques for Document Processing and Web Security." Doctoral thesis, Università degli studi di Trieste, 2013. http://hdl.handle.net/10077/8533.
Full textDavis, Jonathan J. "Machine learning and feature engineering for computer network security." Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/106914/1/Jonathan_Davis_Thesis.pdf.
Full textLounici, Sofiane. "Watermarking machine learning models." Electronic Thesis or Diss., Sorbonne université, 2022. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2022SORUS282.pdf.
Full textBooks on the topic "Machine Learning in Security"
Chen, Xiaofeng, Willy Susilo, and Elisa Bertino, eds. Cyber Security Meets Machine Learning. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6726-5.
Full textChen, Xiaofeng, Hongyang Yan, Qiben Yan, and Xiangliang Zhang, eds. Machine Learning for Cyber Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62223-7.
Full textChen, Xiaofeng, Hongyang Yan, Qiben Yan, and Xiangliang Zhang, eds. Machine Learning for Cyber Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62460-6.
Full textChen, Xiaofeng, Hongyang Yan, Qiben Yan, and Xiangliang Zhang, eds. Machine Learning for Cyber Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62463-7.
Full textChen, Xiaofeng, Xinyi Huang, and Jun Zhang, eds. Machine Learning for Cyber Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30619-9.
Full textXu, Yuan, Hongyang Yan, Huang Teng, Jun Cai, and Jin Li, eds. Machine Learning for Cyber Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20102-8.
Full textXu, Yuan, Hongyang Yan, Huang Teng, Jun Cai, and Jin Li, eds. Machine Learning for Cyber Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20096-0.
Full textXu, Yuan, Hongyang Yan, Huang Teng, Jun Cai, and Jin Li, eds. Machine Learning for Cyber Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-20099-1.
Full textKim, Dan Dongseong, and Chao Chen, eds. Machine Learning for Cyber Security. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-2458-1.
Full textXiang, Yang, and Jian Shen, eds. Machine Learning for Cyber Security. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-96-4566-4.
Full textBook chapters on the topic "Machine Learning in Security"
Salane, Douglas E. "Machine Learning." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-69891-5_14-1.
Full textSalane, Douglas E. "Machine Learning." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-69891-5_14-2.
Full textSalane, Douglas E. "Machine Learning." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_14-3.
Full textSalane, Douglas E. "Machine Learning." In Encyclopedia of Security and Emergency Management. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_14.
Full textHernández-Castro, Carlos Javier, Zhuoran Liu, Alex Serban, Ilias Tsingenopoulos, and Wouter Joosen. "Adversarial Machine Learning." In Security and Artificial Intelligence. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98795-4_12.
Full textMöller, Dietmar P. F. "Machine Learning and Deep Learning." In Advances in Information Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-26845-8_8.
Full textKuznetsov, Phillip, Riley Edmunds, Ted Xiao, et al. "Adversarial Machine Learning." In Artificial Intelligence Safety and Security. Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9781351251389-17.
Full textGupta, Pramod, Naresh Kumar Sehgal, and John M. Acken. "Machine Learning Concepts." In Introduction to Machine Learning with Security. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-59170-9_1.
Full textGupta, Pramod, Naresh Kumar Sehgal, and John M. Acken. "Machine Learning Operations." In Introduction to Machine Learning with Security. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-59170-9_13.
Full textGupta, Pramod, Naresh Kumar Sehgal, and John M. Acken. "Machine Learning Algorithms." In Introduction to Machine Learning with Security. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-59170-9_2.
Full textConference papers on the topic "Machine Learning in Security"
Attila, Nagy, Ács Szilvia, Horváth-Kiss Anikó, Fregan Beatrix, and Rajnai Zoltán. "Machine Learning Used in Cyber Security." In 2024 IEEE 18th International Symposium on Applied Computational Intelligence and Informatics (SACI). IEEE, 2024. http://dx.doi.org/10.1109/saci60582.2024.10619896.
Full textPatel, Anish, Mansi Bhavsar, and Kaushik Roy. "Enchanced CAV Security Using Machine Learning." In 2024 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD). IEEE, 2024. http://dx.doi.org/10.1109/icabcd62167.2024.10645287.
Full textM, Saumya Y., Vinay P, Charis Pinto, Natasha Elizabeth Correia, Melanie Crystal Miranda, and Joyline Rencita Dsouza. "SmartDefend - IoT Security Using Machine Learning." In 2024 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER). IEEE, 2024. http://dx.doi.org/10.1109/discover62353.2024.10750744.
Full textSarma, Nilotpola, E. Bhawani Eswar Reddy, and Chandan Karfa. "Security Concerns of Machine Learning Hardware." In 2024 IEEE 33rd Asian Test Symposium (ATS). IEEE, 2024. https://doi.org/10.1109/ats64447.2024.10915390.
Full textBagade, Jayashree V., Sukhvinder Singh Dari, Rekha Dhivrani, Santosh Chowhan, G. Ravivarman, and V. Janakiraman. "Automation Through Machine Learning: Reinvigorating Cyber Security." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10724667.
Full textVigenesh, M., M. Shalini, P. Mandar, Inzimam Ul Hassan, Sukhvinder Singh Dari, and S. Annamalai. "Applying Machine Learning to Strengthening Cyber Security." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10723995.
Full textAmanulla, Syed Faisal, Vignesh T, Shaik Khadeer Basha, and Tiparani Manikanta Sai Pavan. "Advancements in Biometric Security: Machine Learning Approaches." In 2024 International Conference on IoT, Communication and Automation Technology (ICICAT). IEEE, 2024. https://doi.org/10.1109/icicat62666.2024.10922895.
Full textTomasov, Adrian, Petr Dejdar, Petr Munster, and Tomas Horvath. "Utilizing a State of Polarization Change Detector and Machine Learning for Enhanced Security in Fiber-Optic Networks." In CLEO: Applications and Technology. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/cleo_at.2024.jtu2a.217.
Full textWagner, David. "Security and Machine Learning." In CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2017. http://dx.doi.org/10.1145/3133956.3134108.
Full textWiranda, Nuruddin, and Fal Sadikin. "Machine Learning for Security and Security for Machine Learning: A Literature Review." In 2021 4th International Conference on Information and Communications Technology (ICOIACT). IEEE, 2021. http://dx.doi.org/10.1109/icoiact53268.2021.9563985.
Full textReports on the topic "Machine Learning in Security"
Barreno, Marco, Blaine A. Nelson, Anthony D. Joseph, and Doug Tygar. The Security of Machine Learning. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada519143.
Full textVerzi, Stephen, Raga Krishnakumar, Drew Levin, Daniel Krofcheck, and Kelly Williams. Data Science and Machine Learning for Genome Security. Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1855003.
Full textPasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.
Full textSkryzalin, Jacek, Kenneth Goss, and Benjamin Jackson. Securing machine learning models. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1661020.
Full textSinghal, Anoop. Modeling and Security Analysis of Attacks on Machine Learning Systems. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.sp.800-237.
Full textSinghal, Anoop. Modeling and Security Analysis of Attacks on Machine Learning Systems. National Institute of Standards and Technology, 2025. https://doi.org/10.6028/nist.sp.800-237.ipd.
Full textRitchey, Ralph P., Garrett S. Payer, and Richard E. Harang. Compilation of a Network Security/Machine Learning Toolchain for Android ARM Platforms. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada609411.
Full textPasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.
Full textLohn, Andrew. Poison in the Well: Securing the Shared Resources of Machine Learning. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/2020ca013.
Full textBuchanan, Ben. A National Security Research Agenda for Cybersecurity and Artificial Intelligence. Center for Security and Emerging Technology, 2020. http://dx.doi.org/10.51593/2020ca001.
Full text