USE OF MACHINE LEARNING IN RECOMMENDER SYSTEMS

Authors: Giorgi Iashvili , Roman Odarchenko , Sergii Gnatyuk, Avtandil Gagnidze
Affiliation: Caucasus University, Tbilisi, Georgia, National Aviation University, Kyiv, Ukraine, East West University, Tbilisi, Georgia

Category:

Keywords: machine learning, content-based, vulnerability identification;
ABSTRACT. Machine learning and artificial intelligence are becoming increasingly common today. They are used in a variety of fields, including the energy, medical and financial sectors, to perform a variety of tasks and assist with key choices. Among other applications, machine learning and artificial intelligence are used to build powerful recommendation engines to provide users with relevant recommendations in a variety of areas, such as movie recommendations, friend suggestions on social networks, and much more. The objective of this paper is to identify and understand the vulnerabilities of hardware-based systems and related mechanisms in order to improve appropriate security measures. The aim of this paper is to develop an updated detection system model to detect hardware-based faults and provide users with necessary recommendations.

References:

1.Taehyun, K., & Youngjoo, S. (2019). Reinforcing Meltdown Attack with the Use of Return Stack Buffer. IEEE Access, 2019, 186065–186077. DOI: 10.1109/ACCESS.2019.29
2.Schwarz, M., Lipp, M., Moghimi, D., et al. (2019). ZombieLoad: Cross-Privilege-Boundary Data Sampling. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (pp. 753–768). London, UK.
3.Clavier, C., Coron, JS., & Dabbous, N. (2000). Differential Power Analysis with Countermeasures against Techniques. In CHES Proceedings (pp. 252–263). Worcester, MA.
4.Schaumont, P., & Tiri, K. (2007). Masking and dual-rail logic don't add up. In Proceedings of Cryptographic Hardware and Embedded Systems (pp. 95–106). Vienna, Austria.
5.Abomhara, M., & Køien, G. M. (2015). Cybersecurity and Internet of Things: Challenges, Risks, Protection, and Safety Measures. Journal of Cybersecurity and Mobility, 4(1), 65-68.
6.Iavich, M., Gnatyuk, S., Odarchenko, R., Bocu, R., Simonov, S. (2021). The Novel System of Attacks Detection in 5G. In: Barolli, L., Woungang, I., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2021. Lecture Notes in Networks and Systems, vol 226. Springer, Cham. https://doi.org/10.1007/978-3-030-75075-6_47
7.Iavich, M., Iashvili, G., Gnatyuk, S., Tolbatov, A., Mirtskhulava, L. (2021). Efficient and Secure Digital Signature Scheme for Post Quantum Epoch. In: Lopata, A., Gudonienė, D., Butkienė, R. (eds) Information and Software Technologies. ICIST 2021. Communications in Computer and Information Science, vol 1486. Springer, Cham. https://doi.org/10.1007/978-3-030-88304-1_15