Assembling a Cyber Range to Evaluate Artificial Intelligence / Machine Learning (AI/ML) Security Tools.
Jeffrey A. NicholsKevin D. SpakesCory L. WatsonRobert A. BridgesPublished in: CoRR (2022)
Keyphrases
- artificial intelligence
- machine learning
- ai methods
- cyber security
- knowledge representation
- computational intelligence
- cyber defense
- computer science
- ai systems
- expert systems
- natural language processing
- law enforcement agencies
- intelligent systems
- maximum likelihood
- knowledge based systems
- ai community
- knowledge acquisition
- learning systems
- information security
- cyber crime
- cyber attacks
- ai technologies
- security requirements
- machine intelligence
- access control
- knowledge representation and reasoning
- intelligent behavior
- statistical databases
- artificially intelligent
- human learning
- human level
- data mining
- john mccarthy
- lecture notes in artificial intelligence
- security issues
- security policies
- knowledge engineering
- machine learning methods
- intrusion detection
- learning algorithm
- human intelligence
- national security
- cognitive science
- statistical methods
- machine learning algorithms
- computational logic
- software engineering
- case based reasoning
- decision trees