{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T15:26:13Z","timestamp":1767713173556,"version":"3.37.3"},"reference-count":54,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100005014","name":"Northrop Grumman","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100005014","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,26]]},"DOI":"10.1109\/csr51186.2021.9527917","type":"proceedings-article","created":{"date-parts":[[2021,9,6]],"date-time":"2021-09-06T21:35:06Z","timestamp":1630964106000},"page":"147-154","source":"Crossref","is-referenced-by-count":13,"title":["STRIDE-AI: An Approach to Identifying Vulnerabilities of Machine Learning Assets"],"prefix":"10.1109","author":[{"given":"Lara","family":"Mauri","sequence":"first","affiliation":[]},{"given":"Ernesto","family":"Damiani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2018.8585471"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/WCNCW.2018.8369033"},{"key":"ref33","article-title":"Security threat modeling and analysis: A goal-oriented approach","author":"oladimeji","year":"2006","journal-title":"ICSE 2006"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/9781118988374"},{"key":"ref31","article-title":"Threat modeling as a basis for security requirements","author":"myagmar","year":"2005","journal-title":"Proceeding of Symposium on Requirements Engineering for Information Security"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35289-8_5"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2017.8260283"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/RWEEK.2015.7287428"},{"journal-title":"Threat Modeling Designing for Security","year":"2014","author":"shostack","key":"ref35"},{"key":"ref34","article-title":"Experiences Threat Modeling at Microsoft","volume":"413","author":"shostack","year":"0"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00847-5_1"},{"key":"ref27","article-title":"AI Pipeline - bringing AI to you. End-to-end integration of data, algorithms and deployment tools","volume":"abs 1901 5049","author":"de prado","year":"2019","journal-title":"CoRR"},{"key":"ref29","first-page":"112","article-title":"The Quest for Statistical Significance: Ignorance, Bias and Malpractice of Research Practitioners","volume":"5","author":"abah","year":"2018","journal-title":"Int J of Research"},{"key":"ref2","first-page":"68","article-title":"Threat Modeling - Uncover Security Design Flaws Using The STRIDE Approach","author":"hernan","year":"2006","journal-title":"MSDN Magazine"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v38i3.2756"},{"year":"2020","key":"ref20","article-title":"AI Cybersecurity Challenges &#x2013; Threat Landscape for Artificial Intelligence"},{"article-title":"Threat Modeling AI\/ML Systems and Dependencies","year":"2019","author":"marshall","key":"ref22"},{"key":"ref21","article-title":"An Architectural Risk Analysis of Machine Learning Systems","author":"mcgraw","year":"2020","journal-title":"Berryville Institute of Machine Learning (BIML)"},{"key":"ref24","article-title":"Failure Modes in Machine Learning Systems","volume":"abs 1911 11034","author":"kumar","year":"2019","journal-title":"CoRR"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C51114.2020.00078"},{"key":"ref26","article-title":"Estimating Degradation of Machine Learning Data Assets","volume":"1","author":"mauri","year":"2021","journal-title":"ACM Journal of Data and Information Quality"},{"article-title":"AI\/ML Pivots to the Security Development Lifecycle Bug Bar","year":"2019","author":"marshall","key":"ref25"},{"journal-title":"Building Machine Learning Powered Applications Going from Idea to Product","year":"2020","author":"ameisen","key":"ref50"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120015"},{"key":"ref54","article-title":"Be Your Neighbor&#x2019;s Miner: Building Trust in Ledger Content via Reciprocally Useful Work","author":"mauri","year":"2020","journal-title":"13th IEEE International Conference on Cloud Computing CLOUD 2020"},{"key":"ref53","first-page":"1","article-title":"TrustFed: A Framework for Fair and Trustworthy Cross-Device Federated Learning in IIoT","author":"rehman","year":"2021","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.10.006"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2018.07.023"},{"key":"ref11","article-title":"A Taxonomy and Terminology of Adversarial Machine Learning","author":"tabassi","year":"2019","journal-title":"US Department of Commerce National Institute of Standards and Technology - draft NISTIR 8269"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72817-9_6"},{"year":"2020","key":"ref12","article-title":"Technical Report ISO\/IEC TR 24028:2020 Information technology &#x2014; Artificial intelligence &#x2014; Overview of trustworthiness in artificial intelligence"},{"key":"ref13","first-page":"3520","article-title":"Certified Defenses for Data Poisoning Attacks","author":"steinhardt","year":"2017","journal-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems"},{"key":"ref14","article-title":"Certified Defenses against Adversarial Examples","volume":"abs 1801 9344","author":"raghunathan","year":"2018","journal-title":"CoRR"},{"key":"ref15","first-page":"5286","article-title":"Provable Defenses against Adversarial Examples via the Convex Outer Adversarial Polytope","volume":"80","author":"wong","year":"0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63387-9_5"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63387-9_1"},{"key":"ref18","article-title":"Ground-Truth Adversarial Examples","volume":"abs 1709 10207","author":"carlini","year":"2017","journal-title":"CoRR"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-38919-2_1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5188-5"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128824"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00035"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2046684.2046692"},{"key":"ref8","first-page":"47","author":"mu\u00f1oz-gonz\u00e1lez","year":"2019","journal-title":"The Security of Machine Learning Systems"},{"key":"ref7","first-page":"1","article-title":"A Marauder&#x2019;s Map of Security and Privacy in Machine Learning: An overview of current and future research directions for making machine learning secure and private","author":"papernot","year":"2018","journal-title":"Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security CCS 2018"},{"key":"ref49","article-title":"Detection of Adversarial Training Examples in Poisoning Attacks through Anomaly Detection","volume":"abs 1802 3041","author":"paudice","year":"2018","journal-title":"CoRR"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2886017"},{"article-title":"When AI Misjudgment Is Not an Accident","year":"2018","author":"yeung","key":"ref46"},{"key":"ref45","article-title":"From Jeopardy! to Jaundice: The Medical Liability Implications of Dr. Watson and Other Artificial Intelligence Systems","volume":"73","author":"allain","year":"2013","journal-title":"Louisiana Law Review"},{"key":"ref48","article-title":"On Data Augmentation and Adversarial Risk: An Empirical Analysis","volume":"abs 2007 2650","author":"eghbal-zadeh","year":"2020","journal-title":"CoRR"},{"key":"ref47","article-title":"Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning","volume":"abs 1712 5526","author":"chen","year":"2017","journal-title":"CoRR"},{"key":"ref42","first-page":"82","article-title":"A STRIDE-Based Threat Model for Telehealth Systems","author":"abomhara","year":"2015","journal-title":"Nisk J"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1103780.1103795"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"ref43","first-page":"113","author":"cimato","year":"2018","journal-title":"Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything"}],"event":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2021,7,26]]},"location":"Rhodes, Greece","end":{"date-parts":[[2021,7,28]]}},"container-title":["2021 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9527731\/9527900\/09527917.pdf?arnumber=9527917","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:45:45Z","timestamp":1652197545000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9527917\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,26]]},"references-count":54,"URL":"https:\/\/doi.org\/10.1109\/csr51186.2021.9527917","relation":{},"subject":[],"published":{"date-parts":[[2021,7,26]]}}}