Meem et al., 2025 - Google Patents
A comprehensive survey on security features and vulnerabilities in data science toolsMeem et al., 2025
View PDF- Document ID
- 1735861110809354215
- Author
- Meem F
- Mahdy I
- Tisha S
- Sohag S
- Publication year
- Publication venue
- International Journal of Computer Science & Security (IJCSS)
External Links
Snippet
Data science tools have grown quickly, changing many industries by allowing advanced data analysis, predictive models, and more intelligent decisions. However, their rapid development has also introduced significant security challenges and vulnerabilities. This …
- 238000004458 analytical method 0 abstract description 17
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11748480B2 (en) | Policy-based detection of anomalous control and data flow paths in an application program | |
| US11949719B2 (en) | Systems and methods of information security monitoring with third-party indicators of compromise | |
| US11218510B2 (en) | Advanced cybersecurity threat mitigation using software supply chain analysis | |
| Sharma et al. | A survey of Mythril, a smart contract security analysis tool for EVM bytecode | |
| US20220210202A1 (en) | Advanced cybersecurity threat mitigation using software supply chain analysis | |
| US11895121B1 (en) | Efficient identification and remediation of excessive privileges of identity and access management roles and policies | |
| CN107409126B (en) | System and method for securing an enterprise computing environment | |
| US12323449B1 (en) | Code analysis feedback loop for code created using generative artificial intelligence (‘AI’) | |
| US8099711B2 (en) | System and method for multi-level security filtering of model representations | |
| US11330007B2 (en) | Graphical temporal graph pattern editor | |
| US12500823B2 (en) | System and method for enterprise-wide data utilization tracking and risk reporting | |
| US20250165617A1 (en) | Generative cybersecurity exploit discovery and evaluation | |
| Venkatesh et al. | A study on use of big data in cloud computing environment | |
| Singh et al. | Navigating the landscape of security threat analysis in cloud computing environments | |
| US12314406B1 (en) | Generative cybersecurity exploit discovery and evaluation | |
| Meem et al. | A comprehensive survey on security features and vulnerabilities in data science tools | |
| Xu et al. | Design of Intelligent Software Security System Based on Spark Big Data Computing | |
| US11341275B2 (en) | System and method for implementing and testing security protections in computer software | |
| George | Exploring the Integration of Blockchain in IoT Use Cases: Challenges and Opportunities | |
| Alawadhi et al. | Application of Big Data in Cybersecurity | |
| Welling | Application Security Testing | |
| Jeyaraman | Vector Databases Unleashed: Isolating Data in Multi-Tenant LLM Systems | |
| Gandhi et al. | Enhancing Cloud Security with Real-Time Anomaly Detection in Big Data Environments | |
| Islam | Architecture-centric support for security orchestration and automation | |
| Papalia | Forensic-Aware DevSecOps Pipeline: Design, Implementation and Execution against a Purposefully Vulnerable Microservice |