[go: up one dir, main page]

Meem et al., 2025 - Google Patents

A comprehensive survey on security features and vulnerabilities in data science tools

Meem et al., 2025

View PDF
Document ID
1735861110809354215
Author
Meem F
Mahdy I
Tisha S
Sohag S
Publication year
Publication venue
International Journal of Computer Science & Security (IJCSS)

External Links

Snippet

Data science tools have grown quickly, changing many industries by allowing advanced data analysis, predictive models, and more intelligent decisions. However, their rapid development has also introduced significant security challenges and vulnerabilities. This …
Continue reading at www.researchgate.net (PDF) (other versions)

Similar Documents

Publication Publication Date Title
US11748480B2 (en) Policy-based detection of anomalous control and data flow paths in an application program
US11949719B2 (en) Systems and methods of information security monitoring with third-party indicators of compromise
US11218510B2 (en) Advanced cybersecurity threat mitigation using software supply chain analysis
Sharma et al. A survey of Mythril, a smart contract security analysis tool for EVM bytecode
US20220210202A1 (en) Advanced cybersecurity threat mitigation using software supply chain analysis
US11895121B1 (en) Efficient identification and remediation of excessive privileges of identity and access management roles and policies
CN107409126B (en) System and method for securing an enterprise computing environment
US12323449B1 (en) Code analysis feedback loop for code created using generative artificial intelligence (‘AI’)
US8099711B2 (en) System and method for multi-level security filtering of model representations
US11330007B2 (en) Graphical temporal graph pattern editor
US12500823B2 (en) System and method for enterprise-wide data utilization tracking and risk reporting
US20250165617A1 (en) Generative cybersecurity exploit discovery and evaluation
Venkatesh et al. A study on use of big data in cloud computing environment
Singh et al. Navigating the landscape of security threat analysis in cloud computing environments
US12314406B1 (en) Generative cybersecurity exploit discovery and evaluation
Meem et al. A comprehensive survey on security features and vulnerabilities in data science tools
Xu et al. Design of Intelligent Software Security System Based on Spark Big Data Computing
US11341275B2 (en) System and method for implementing and testing security protections in computer software
George Exploring the Integration of Blockchain in IoT Use Cases: Challenges and Opportunities
Alawadhi et al. Application of Big Data in Cybersecurity
Welling Application Security Testing
Jeyaraman Vector Databases Unleashed: Isolating Data in Multi-Tenant LLM Systems
Gandhi et al. Enhancing Cloud Security with Real-Time Anomaly Detection in Big Data Environments
Islam Architecture-centric support for security orchestration and automation
Papalia Forensic-Aware DevSecOps Pipeline: Design, Implementation and Execution against a Purposefully Vulnerable Microservice