Login / Signup
Everybody's Got ML, Tell Me What Else You Have: Practitioners' Perception of ML-Based Security Tools and Explanations.
Jaron Mink
Hadjer Benkraouda
Limin Yang
Arridhana Ciptadi
Ali Ahmadzadeh
Daniel Votipka
Gang Wang
Published in:
SP (2023)
Keyphrases
</>
maximum likelihood
security policies
data sets
end users
em algorithm
intrusion detection
neural network
case study
computational intelligence
information security
network security
software tools
human perception
software developers
security issues