Handbook of Big Data Privacy 2020
DOI: 10.1007/978-3-030-38557-6_2
|View full text |Cite
|
Sign up to set email alerts
|

AI and Security of Critical Infrastructure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 49 publications
0
5
0
Order By: Relevance
“…Azmoodeh et al in (3) highlighted that the most crucial parameters in order to use a Deep Learning model is the generalization of the model and the selection of the correct training parameters (e.g batch size, learning rate, weight decay).…”
Section: Model Selectionmentioning
confidence: 99%
“…Azmoodeh et al in (3) highlighted that the most crucial parameters in order to use a Deep Learning model is the generalization of the model and the selection of the correct training parameters (e.g batch size, learning rate, weight decay).…”
Section: Model Selectionmentioning
confidence: 99%
“…Such methods are Cyber Kill Chain [284] and Diamond Model of Intrusion Analysis [285] (or a combination of the two [279]). Moreover, modern approaches for providing security in this sector are considered, like game-theory-based [286], blockchain-based [287], or AIbased methods [288].…”
Section: ) Attacks and Countermeasuresmentioning
confidence: 99%
“…AI security is becoming an increasingly critical topic [9], especially with the growing number of connected devices and systems. With the proliferation of the Internet of Things (IoT) and the digitization of various industries [10], the need to preserve the security and privacy of data becomes inevitable.…”
Section: Introductionmentioning
confidence: 99%