語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Leveraging machine learning for secu...
~
Purdue University.
Leveraging machine learning for security related decision making.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Leveraging machine learning for security related decision making./
作者:
Gates, Christopher S.
面頁冊數:
1 online resource (135 pages)
附註:
Source: Dissertation Abstracts International, Volume: 76-05(E), Section: B.
Contained By:
Dissertation Abstracts International76-05B(E).
標題:
Computer science. -
電子資源:
click for full text (PQDT)
ISBN:
9781321446814
Leveraging machine learning for security related decision making.
Gates, Christopher S.
Leveraging machine learning for security related decision making.
- 1 online resource (135 pages)
Source: Dissertation Abstracts International, Volume: 76-05(E), Section: B.
Thesis (Ph.D.)--Purdue University, 2014.
Includes bibliographical references
The need to ensure the primary functionality of any system means that considerations of security are often secondary. Computer security considerations are made in relation to considerations of usability, functionality, productivity, and other goals. Decision-making related to security is about finding an appropriate tradeoff. Most existing security mechanisms take a binary approach where an action is either malicious or benign, and therefore allowed or denied. However, security and privacy outcomes are often fuzzy and cannot be represented by a binary decision. It is useful for end users, who may ultimately need to allow or deny an action, to understand the potential differences among objects and the way that these differences are communicated matters.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9781321446814Subjects--Topical Terms:
573171
Computer science.
Index Terms--Genre/Form:
554714
Electronic books.
Leveraging machine learning for security related decision making.
LDR
:03129ntm a2200361Ki 4500
001
919677
005
20181129115240.5
006
m o u
007
cr mn||||a|a||
008
190606s2014 xx obm 000 0 eng d
020
$a
9781321446814
035
$a
(MiAaPQ)AAI3669224
035
$a
(MiAaPQ)purdue:17834
035
$a
AAI3669224
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
$d
NTU
100
1
$a
Gates, Christopher S.
$3
1194302
245
1 0
$a
Leveraging machine learning for security related decision making.
264
0
$c
2014
300
$a
1 online resource (135 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertation Abstracts International, Volume: 76-05(E), Section: B.
500
$a
Adviser: Ninghui Li.
502
$a
Thesis (Ph.D.)--Purdue University, 2014.
504
$a
Includes bibliographical references
520
$a
The need to ensure the primary functionality of any system means that considerations of security are often secondary. Computer security considerations are made in relation to considerations of usability, functionality, productivity, and other goals. Decision-making related to security is about finding an appropriate tradeoff. Most existing security mechanisms take a binary approach where an action is either malicious or benign, and therefore allowed or denied. However, security and privacy outcomes are often fuzzy and cannot be represented by a binary decision. It is useful for end users, who may ultimately need to allow or deny an action, to understand the potential differences among objects and the way that these differences are communicated matters.
520
$a
In this work, we use machine learning and feature extraction techniques to model normal behavior in various contexts and then used those models to detect the degree that new behavior is anomalous. This measurement can then be used, not as a binary signal but as a more nuanced indicator that can be communicated to a user to help guide decision-making.
520
$a
We examine the application of this idea in two domains. The first is the installation of applications on a mobile device. The focus in this domain is on permissions that represent capabilities and access to data, and we generate a model for expected permission requests. Various user studies were conducted to explore effective ways to communicate this measurement to influence decision-making by end users. Next, we examined to the domain of insider threat detection in the setting of a source code repository. The goal was to build models of expected user access and more appropriately predict the degree that new behavior deviates from the previous behavior. This information can be utilized and understood by security personnel to focus on unexpected patterns.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Computer science.
$3
573171
650
4
$a
Artificial intelligence.
$3
559380
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0984
690
$a
0800
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
Purdue University.
$b
Computer Sciences.
$3
1179390
773
0
$t
Dissertation Abstracts International
$g
76-05B(E).
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3669224
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入