A Threat Analysis Methodology for Security Requirements Elicitation in Machine Learning Based Systems
暂无分享,去创建一个
[1] Xiaohong Yuan,et al. Developing Abuse Cases Based on Threat Modeling and Attack Patterns , 2015, J. Softw..
[2] Mesut Ozdag,et al. Adversarial Attacks and Defenses Against Deep Neural Networks: A Survey , 2018 .
[3] Jennifer Horkoff,et al. Non-Functional Requirements for Machine Learning: Challenges and New Directions , 2019, 2019 IEEE 27th International Requirements Engineering Conference (RE).
[4] M. E. Kabay,et al. Writing Secure Code , 2015 .
[5] Elham Tabassi,et al. A taxonomy and terminology of adversarial machine learning , 2019 .
[6] Fuyuki Ishikawa,et al. How Do Engineers Perceive Difficulties in Engineering of Machine-Learning Systems? - Questionnaire Survey , 2019, 2019 IEEE/ACM Joint 7th International Workshop on Conducting Empirical Studies in Industry (CESI) and 6th International Workshop on Software Engineering Research and Industrial Practice (SER&IP).
[7] J. Doug Tygar,et al. Adversarial machine learning , 2019, AISec '11.
[8] W. Marsden. I and J , 2012 .
[9] Harald C. Gall,et al. Software Engineering for Machine Learning: A Case Study , 2019, 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP).
[10] Mohammed Nazir,et al. A Systematic Review and Analytical Evaluation of Security Requirements Engineering Approaches , 2019 .
[11] James A. Landay,et al. Investigating statistical machine learning as a tool for software development , 2008, CHI.
[12] Andriy V. Miranskyy,et al. Big Picture of Big Data Software Engineering: With Example Research Challenges , 2015, 2015 IEEE/ACM 1st International Workshop on Big Data Software Engineering.
[13] Dhirendra Pandey,et al. STORE: Security Threat Oriented Requirements Engineering Methodology , 2018, Journal of King Saud University - Computer and Information Sciences.
[14] Frank Swiderski,et al. Threat Modeling , 2018, Hacking Connected Cars.
[15] Patrick D. McDaniel,et al. Making machine learning robust against adversarial inputs , 2018, Commun. ACM.
[16] Gail C. Murphy,et al. How does Machine Learning Change Software Development Practices? , 2021, IEEE Transactions on Software Engineering.
[17] Fan Zhang,et al. Stealing Machine Learning Models via Prediction APIs , 2016, USENIX Security Symposium.
[18] Karen A. Scarfone,et al. The Common Vulnerability Scoring System (CVSS) and its Applicability to Federal Agency Systems , 2007 .
[19] Michael P. Wellman,et al. SoK: Security and Privacy in Machine Learning , 2018, 2018 IEEE European Symposium on Security and Privacy (EuroS&P).
[20] Muhammad Shafique,et al. Security for Machine Learning-Based Systems: Attacks and Challenges During Training and Inference , 2018, 2018 International Conference on Frontiers of Information Technology (FIT).
[21] Lei Ma,et al. Secure Deep Learning Engineering: A Road Towards Quality Assurance of Intelligent Systems , 2019, ICFEM.
[22] Debdeep Mukhopadhyay,et al. Adversarial Attacks and Defences: A Survey , 2018, ArXiv.
[23] Michael N. Johnstone. Modelling misuse cases as a means of capturing security requirements , 2011 .
[24] Carlos E. Otero,et al. Research Directions for Engineering Big Data Analytics Software , 2015, IEEE Intelligent Systems.
[25] Wei Cai,et al. A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View , 2018, IEEE Access.
[26] Adam Shostack,et al. Threat Modeling: Designing for Security , 2014 .
[27] Andreas Vogelsang,et al. Requirements Engineering for Machine Learning: Perspectives from Data Scientists , 2019, 2019 IEEE 27th International Requirements Engineering Conference Workshops (REW).
[28] R. Stephenson. A and V , 1962, The British journal of ophthalmology.