356
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Attack Model for Generic Intelligent Systems

ORCID Icon

References

  • Al-Fedaghi, S., & Moein, S. (2014). Modeling attacks. International Journal of Safety and Security Engineering, 4(2), 97–115. https://doi.org/10.2495/SAFE-V4-N2-97-115
  • Anley, C. (2022). Practical attacks on machine learning systems. NCC Group.
  • ATT&CK. (2022, April 1). ATT&CK matrix for enterprise. Retrieved August 20, 2022, from MITRE ATT&CK: https://attack.mitre.org/
  • Bedi, P., Gandotra, V., Singhal, A., Narang, H., & Sharma, S. (2013). Threat-oriented security framework in risk management using multiagent system. Software: Practice and Experience, 43(9), 1013–1038. https://doi.org/10.1002/spe.2133
  • Bistron, M., & Piotrowski, Z. (2021). Artificial intelligence applications in military systems and their influence on sense of security of citizens. Electronics, 10(7), 871. https://doi.org/10.3390/electronics10070871
  • Curzon, J., Kosa, T. A., Akalu, R., & El-Khatib, K. (2021, April). Privacy and artificial intelligence. IEEE Transactions on Artificial Intelligence, 2(2), 96–108. https://doi.org/10.1109/TAI.2021.3088084
  • Dastin, J. (2018, October 11). Amazon scraps secret AI recruiting tool that showed bias against women. Retrieved August 21, 2022, from Reuters: https://www.reuters.com/article/us-amazon-com-jobs-automation-insight-idUSKCN1MK08G
  • de Freitas Barbosa, V. A., Gomes, J. C., de Santana, M. A., d A., Albuquerque, J. E. d., Souza, R. G., de Souza, R. E., & dos Santos, W. P. (2022). Heg. IA: an intelligent system to support diagnosis of Covid-19 based on blood tests. Research on Biomedical Engineering, 38(1), 99–116. https://doi.org/10.1007/s42600-020-00112-5
  • Deng, M., Wuyts, K., Scandariato, R., Preneel, B., & Joosen, W. (2011). A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requirements Engineering, 16(1), 3–32. https://doi.org/10.1007/s00766-010-0115-7
  • Frydman, M., Ruiz, G., Heymann, E., Cesar, E., & Miller, B. P. (2014). Automating risk analysis of software design models. The Scientific World Journal, 2014, 1–12. https://doi.org/10.1155/2014/805856
  • Gregor, S., & Benbasat, I. (1999). Explanations from intelligent systems: theoretical foundations and implications for practice. MIS Quarterly, 23(4), 497–530. https://doi.org/10.2307/249487
  • Gupta, R., Tanwar, S., Tyagi, S., & Kumar, N. (2020). Machine learning model for secure data analytics: A taxonomy threat model. Computer Communications, 153, 406–440. https://doi.org/10.1016/j.comcom.2020.02.008
  • Khamis, A., Meng, J., Wang, J., Azar, A. T., Prestes, E., Li, H., A. Hameed, I., Takács, Á., Rudas, I. J., & Haidegger, T. (2021). Robotics and intelligent systems against a pandemic. Acta Polytechnica Hungarica, 18(5), 13–35. https://doi.org/10.12700/APH.18.5.2021.5.3
  • Kohfelder, K., & Garg, P. (1999). The threats to our products. Microsft.
  • Marshall, A., Parikh, J., Kiciman, E., & Kumar, R. S. (2022). Threat modeling AI/ML systems and dependencies. Microsoft. https://docs.microsoft.com/en-us/security/engineering/threat-modeling-aiml
  • Meszaros, J., & Buchalcevova, A. (2017). Introducing OSSF: A framework for online service cybersecurity risk management. Computers & Security, 65, 300–313. https://doi.org/10.1016/j.cose.2016.12.008
  • Mitchell, T. (1997). Machine learning. McGraw Hill.
  • Molina, M. (2022, December 18). What is an intelligent system? arXiv:2009.09083v3 [cs.CY].
  • Okacha, D., Achtaich, N., & Najib, K. (2021). An intelligent strategy for developing scientific learning skills. In M. B. Ahmed, S. Mellouli, L. Braganca, B. A. Abdelhakim, & K. A. Bernadetta (Eds.), Emerging trends in ICT for sustainable development (pp. 29–36). Springer.
  • Okeme, P. A., Skakun, A. D., & Muzalevskiiv, A. R. (2021). Transformation of factory to smart factory. In IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), St. Petersburg. IEEE.
  • Shen, Z., Fan, S., Wong, Y., Ng, T.-T., & Kankanhalli, M. (2019). Human-imperceptible privacy protection against machines [Paper presentation]. MM '19: Proceedings of the 27th ACM International Conference on Multimedia, ACM (pp. 1119–1128). https://doi.org/10.1145/3343031.3350963
  • UcedaVélez, T. (2021, November 23). What is PASTA threat modeling? Step into the kitchen as the co-founder of PASTA threat modeling breaks down the 7 steps. Retrieved August 12, 2022, from VerSprite: https://versprite.com/blog/what-is-pasta-threat-modeling/
  • Uzunov, A. V., & Fernandez, E. B. (2014, June). An extensible pattern-based library and taxonomy of security threats for distributed systems. Computer Standards & Interfaces, 36(4), 734–747. https://doi.org/10.1016/j.csi.2013.12.008
  • Wenjun, X., & Lagerstrom, R. (2019, July). Threat modeling—A systematic literature. Computers & Security, 84, 53–69. https://doi.org/10.1016/j.cose.2019.03.010
  • Wolf, A., Simopoulos, D., D'Avino, L., & Schwaiger, P. (2021). The PASTA threat model implementation in the IoT development life cycle. In INFORMATIK 2020 (pp. 1195–1204). Gesellschaft für Informatik.
  • Wooldridge, M., & Jennings, N. R. (1995). Intelligent agents: Theory and practice. The Knowledge Engineering Review, 10(2), 115–152. https://doi.org/10.1017/S0269888900008122
  • Wright, D., Finn, R., & Rodrigues, R. (2013, January). A comparative analysis of privacy impact assessment in six countries. Journal of Contemporary European Research, 9(1), 160–180. https://doi.org/10.30950/jcer.v9i1.513
  • Wuyts, K., Sion, L., & Joosen, W. (2020). LINDDUN GO: A lightweight approach to privacy threat modeling [Paper presentation]. 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), IEEE, Genoa, Italy. https://doi.org/10.1109/EuroSPW51379.2020.00047
  • Xiong, W., Legrand, E., Aberg, O., & Lagerstrom, R. (2022). Cyber security threat modeling based on the MITRE enterprise ATT&CK matrix. Software and Systems Modeling, 21(1), 157–177. https://doi.org/10.1007/s10270-021-00898-7