<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>I. Rosenberg, A. Shabtai, Y. Elovici, L. Rokach, Adversarial machine learning attacks and defense
methods in the cyber security domain, ACM Comput. Surv.</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.1145/3453158</article-id>
      <title-group>
        <article-title>Feasibility of MLOps-based healthcare pipelines in ensuring the Cybersecurity Framework</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Antonio Robustelli</string-name>
          <email>antonio.robustelli2@unibo.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alberto Marfoglia</string-name>
          <email>alberto.marfoglia2@unibo.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Christian D'Errico</string-name>
          <email>christian.derrico2@unibo.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sabato Mellone</string-name>
          <email>sabato.mellone@unibo.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Antonella Carbonaro</string-name>
          <email>antonella.carbonaro@unibo.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science and Engineering, University of Bologna</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Electrical, Electronic and Information Engineering “Guglielmo Marconi”, University of Bologna</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2021</year>
      </pub-date>
      <volume>54</volume>
      <issue>2021</issue>
      <fpage>318</fpage>
      <lpage>323</lpage>
      <abstract>
        <p>The recent advances in Artificial Intelligence (AI) are radically transforming the healthcare sector. Implementing the related solutions presents significant challenges, ranging from managing data quality and heterogeneity to compliance with stringent regulations (e.g., GDPR and HIPAA). In this context, MLOps emerges as a crucial solution to address these issues through a set of practices and tools. As a result, MLOps-based pipelines play a pivotal role in the efective management of Machine Learning (ML) models, which is vital to support diagnostic and prognostic activities. On the other hand, the development of healthcare systems should also consider several cybersecurity aspects required by the same regulations. To this end, the Cybersecurity Framework (CSF) 2.0, developed by the National Institute of Standards and Technology (NIST), describes updated guidelines to mitigate cybersecurity risks. Therefore, adopting MLOps with the support of the CSF represents an essential step for enabling the transition of ML models to enabled devices and improving the security of healthcare systems. For this reason, in this work, we present the high-level architecture of an MLOps pipeline employed by the DARE (DigitAl lifelong pRevEntion) foundation. Moreover, we also analyze its feasibility in satisfying CSF requirements, with particular emphasis on those related to data security, detection, and recovery.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;MLOps pipeline</kwd>
        <kwd>CSF</kwd>
        <kwd>Healthcare</kwd>
        <kwd>Machine Learning</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        In recent years, Artificial Intelligence (AI) and Machine Learning (ML) have revolutionized the healthcare
sector, providing powerful tools to face complex challenges. For instance, many ML-based models
were increasingly experimented to assist physicians in a wide range of activities, such as disease
diagnosis [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ], treatment personalization [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ], and patient monitoring [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ]. However, despite the
excellent results obtained, most of the attempts to employ ML-based approaches have not overcome the
prototypical status [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. This generally happens because the transition of ML prototypes to ML-enabled
medical devices represents a complex process due to the numerous and strict existing regulations (e.g.,
GDPR and HIPAA) [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Moreover, this transition requires a complex interdisciplinary endeavour in
which data scientists need to collaborate with software engineers, operations teams, domain experts,
and end users to build a successful product [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        For this reason, new ML engineering practices, known under the terminology of Machine Learning
Operations (MLOps), are emerging to support this transition [
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ]. Consistent with the principles of
DevOps (Development Operations), MLOps aims to bring automation to the development workflow
of ML-enabled systems by streamlining the ML models’ lifecycle [
        <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
        ]. To this end, MLOps can
enhance operational eficiency, allowing teams to focus on innovation and strategic goals rather than
repetitive tasks [
        <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
        ]. Furthermore, the MLOps scalability enables organizations to manage large
datasets and release models more easily [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Consequently, MLOps-based pipelines have gained a
strong interest in the healthcare industry, in which the correct management of the models’ lifecycle is
essential to support diagnostic and prognostic activities [
        <xref ref-type="bibr" rid="ref17 ref18">17, 18</xref>
        ].
      </p>
      <p>
        However, despite being crucial in healthcare, only some cybersecurity aspects have been relatively
investigated [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. Instead, a further efort should concern the exploitation of MLOps to make the related
development environments more compliant with the most notable security frameworks. Moreover, the
increasing complexity and spread of cyber threats force organizations to adopt even more advanced
mitigation strategies. For instance, model inversion attacks represent one of the pressing threats due
to their ability to exploit model outputs and, through several reverse engineering steps, reconstruct
training data or make inferences on them [
        <xref ref-type="bibr" rid="ref20">20, 21</xref>
        ]. Consequently, the deployment of ML models also
requires reliable mechanisms of Role-Based Access Control (RBAC), in which each user can access only
to specific data or artifacts, and be logged during the model’s lifecycle [22].
      </p>
      <p>In response to these challenges, the Cybersecurity Framework (CSF) 2.0, defined by the National
Institute of Standards and Technology (NIST), provides updated guidelines to address security challenges
in an ever-evolving technological landscape [23]. The CSF is a strategic tool to protect digital assets,
enhance stakeholder trust, and improve the organizational’s resilience. Since each organization presents
unique risks, varying risk tolerances, specific missions, and desired objectives, the CSF does not embrace
a one-size-fits-all approach. Instead, it recommends its implementation by employing several emerging
technologies and solutions [23].</p>
      <p>Therefore, adopting MLOps with the support of the CSF represents an essential investment to help
the transition of ML-based models to enabled devices. Moreover, their employment also improves the
security of healthcare organizations like DARE (DigitAl lifelong pRevEntion) [24], a foundation financed
by the Italian Ministry for University &amp; Research (MUR) to foster collaboration between healthcare,
academia, industry, and policymakers. In detail, DARE aims to become a national reference for digital
prevention technologies, enhance health promotion, and enable lifelong prevention. To achieve such
goals, DARE needs a compliant infrastructure capable of hosting diferent research studies, managing
healthcare data securely, and developing reliable AI models.</p>
      <p>For this reason, in order to study the feasibility of MLOps pipelines in ensuring several cybersecurity
aspects, we first define a high-level MLOps pipeline employed by the DARE foundation. Then, by
adopting the CSF, we analyze its validity in ensuring diferent requirements, with particular emphasis
on those related to data security, detection, and recovery.</p>
      <p>The main contributions of this work can be summarized as follows:
1. We define the high-level architecture of an MLOps pipeline employed in a healthcare foundation;
2. We adopt the CSF to analyze the pipeline’s feasibility in ensuring diferent requirements, namely
data security, detection, and recovery.</p>
      <p>The remainder of the paper is organized as follows. Sec. 2 will present the related works on MLOps
pipelines employed in healthcare scenarios. Sec. 3 will report an overview of the CSF’s structure
and MLOps. Then, Sec. 4 will define the architecture of our MLOps pipeline employed for the DARE
foundation. Finally, Sec. 5 will analyze the feasibility of the pipeline in ensuring CSF requirements,
while Sec. 6 will present the conclusions and future work.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related Works</title>
      <p>
        Several studies have explored the application of MLOps frameworks in healthcare with the aim of
enhancing the development, deployment, and management of ML models in clinical settings [
        <xref ref-type="bibr" rid="ref10 ref11">25, 10, 11</xref>
        ].
These contributions are essential for bridging the gap between prototypical research and practical
implementation in such domains, which are typically highly regulated [
        <xref ref-type="bibr" rid="ref8">8, 26</xref>
        ]. MLOps practices can
thus provide crucial benefits such as reproducibility, maintainability, trackability, and regulatory
compliance [
        <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
        ].
      </p>
      <p>
        To this end, A. Basile et al. [27] have proposed a comprehensive MLOps pipeline by integrating
many famous tools for version control, experiment tracking, and continuous monitoring. Instead, V.
Moskalenko et al. [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] have introduced several practices designed to enhance the robustness of medical
diagnostic systems. In detail, they have implemented additional pipeline stages to face prevalent issues
related to healthcare environments, such as the risks associated with adversarial attacks, fault injections,
and distribution shifts.
      </p>
      <p>Moreover, an additional efort has been made by implementing several MLOps-based tools, such
as that proposed by A. Krishnan et al. [28]. In detail, they have developed CyclOps, an open-source
framework to address the fragmented nature of ML tools in healthcare units. The achieved results,
derived by predicting in-hospital and decompensation mortality, have proven the efectiveness of
CyclOps in ensuring the adaptability, scalability, and reliability of the developed ML models. Similar
outcomes have been shown by Advanced Notebook (ADVN), a tool proposed by G. Danciu et al. [29] to
standardize data ingestion and manage ML models in two major EU projects: iHELP and RETENTION.
In such studies, the authors have employed ADVN to predict the risk of pancreatic cancer using urinary
biomarkers (in iHELP) and estimate heart failure survival (in RETENTION). The related use cases
have highlighted the versatility of ADVM in handling various medical challenges and improving the
development process. Finally, T. Granlund et al. [30] have employed Oravizio, a CE-certified software
used in joint replacement surgery risk assessments, to demonstrate how MLOps can ensure data privacy
laws and regulatory standards without compromising performance. To accomplish this, the authors
have designed a continuous training pipeline to automate data validation, model re-training, and the
generation of regulatory-compliant reports.</p>
      <p>
        However, as shown in Tab. 1, only some cybersecurity aspects have been relatively investigated [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
Instead, since the adoption of CSF with MLOps represents an essential investment to support the
transition of ML-based models to enabled devices, this study aims to analyze the feasibility of MLOps
healthcare pipelines in ensuring several cybersecurity requirements.
      </p>
      <p>
        Feature
V. Moskalenko et al. [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]
– Enhance the robustness of
      </p>
      <p>medical diagnostic systems
G. Danciu et al. [29]
T. Granlund et al. [30]
– Integration of ADVN to manage</p>
      <p>data ingestion and ML models
– Continuous generation of</p>
      <p>regulatory-compliant reports
Our proposal
– Adoption of the CSF 2.0</p>
      <p>Gap &amp; Novelty
✗ No use of well-known cybersecurity</p>
      <p>techniques or protocols
✓ Analyze risks like adversarial attacks,</p>
      <p>fault injections, and distribution shifts
✗ No cybersecurity analysis is done</p>
      <p>(just some considerations)
✓ Employ anonymized data
✗ No cybersecurity analysis is done</p>
      <p>(just some considerations)
✓ Ensure data privacy laws and</p>
      <p>regulatory standards
✓ Feasibility analysis of data security,
detection, and recovery</p>
    </sec>
    <sec id="sec-3">
      <title>3. Background</title>
      <p>This section provides an overview of the fundamental concepts related to the proposed pipeline. For
this reason, we first recall the structure of CSF and the related Functions. Then, we briefly summarize
the main characteristics of MLOps, which represent the adopted framework.</p>
      <sec id="sec-3-1">
        <title>3.1. The Cybersecurity Framework 2.0</title>
        <p>The Cybersecurity Framework (CSF) 2.0, defined by NIST, is designed to help organizations of all
sizes and sectors to manage and reduce their cybersecurity risks [23]. Since each organization has
diferent risks and desired objectives, the CSF does not embrace a one-size-fits-all approach. Instead,
the way how organizations implement CSF can vary and involve diferent emerging solutions. For this
reason, the CSF describes the cybersecurity outcomes and requirements for a broad audience, including
executives, managers, and practitioners, regardless of their cybersecurity expertise. As shown in Fig. 1,
such outcomes are mapped into a dedicated list known as Core, and which consists of 6 Functions,
namely Govern (GV), Identify (ID), Protect (PR), Detect (DT), Respond (RS), and Recover (RC).</p>
        <p>These outcomes do not represent a checklist of actions to perform but, instead, high-level requirements
that an organization should ensure in relationship with its use cases. In detail, each Function is divided
into Categories that represent a subset of cybersecurity outcomes. Finally, subcategories further divide
each Category into more specific outcomes. Fig. 2 reports the Categories associated with each Function
and the related identifiers.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Machine Learning Operations</title>
        <p>
          The acronym MLOps (Machine Learning Operations) represents the evolution of DevOps (Development
Operations) practices applied to the lifecycle of ML models [
          <xref ref-type="bibr" rid="ref12 ref15">12, 15</xref>
          ]. MLOps ofers significant advantages
by streamlining and automating the complex lifecycle of ML models [
          <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
          ]. For instance, MLOps
enhances operational eficiency, allowing teams to focus on innovation and strategic goals rather than
repetitive tasks [
          <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
          ]. MLOps ensures that models are continuously updated, tested, and monitored for
optimal performance [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. Moreover, it minimizes risks, performance degradation, and data drift [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ],
enabling organizations to manage large datasets and released models [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ].
        </p>
        <p>Therefore, MLOps focuses on all aspects of ML models, from the requirement analysis to monitoring in
production. In detail, the lifecycle involves several stages, each closely tied to monitoring, maintenance,
and continuous updates. In MLOps, the lifecycle does not end with the initial training phase but
extends to ongoing management and optimization, enhancing the model’s ability to adapt to dynamic
changes. Also, the employment of a Continuous Integration and Continuous Delivery (CI/CD) approach
significantly contributes to the model’s stability and reliability over time [31].</p>
        <p>However, due to the growth of cybersecurity threats, it has become essential for MLOps to manage
security aspects. In such cases, the adopted terminology is known as SecMLOps or MLSecOps [22].
Although it is dificult to identify a common and widely accepted definition, we can refer to that provided
by B. Ghosh [32]. In detail, he defined MLSecOps as “implementing and managing a set of processes,
tools, and best practices that are designed to secure machine learning models and the systems that
support them. It aims to address the unique challenges of securing ML models at scale.”</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. The proposed MLOps pipeline</title>
      <p>
        As previously mentioned, the integration of MLOps represents a crucial step towards adopting safe,
reliable, and efective ML-based approaches, which are increasingly experimented in the healthcare
domain to assist physicians in a wide range of activities, such as disease diagnosis [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ], treatment
personalization [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ], and patient monitoring [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ]. However, despite the excellent results, these
approaches require rigorous management to ensure data quality, model robustness, and compliance
with privacy and security regulations [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. For this reason, we first present the high-level architecture of
a pipeline employed in a real healthcare foundation. Then, we introduce the MLOps development cycle
inside our pipeline by mapping the related steps. For clarity, since it would be out of the scope of this
work, the provided definition refers only to a high-level architecture. Consequently, we do not report a
technical definition of the pipeline, but remand to [
        <xref ref-type="bibr" rid="ref17">17, 27, 33</xref>
        ] for more detailed implementations.
      </p>
      <sec id="sec-4-1">
        <title>4.1. High-Level Architecture</title>
        <p>The proposed pipeline aims to securely manage healthcare data and deploy reliable AI models while
ensuring adherence to regulatory and ethical standards. Therefore, intending to provide a compliant
infrastructure capable of hosting diferent research studies for the DARE foundation [ 24], we structured
our pipeline into the following steps shown in Fig. 3:
1. Data Collection: data are systematically gathered from multiple sources, including table data,
DICOM medical imaging files, and other structured or unstructured datasets. Furthermore, this
step incorporates rigorous provenance tracking to ensure compliance with consent protocols and
legal approvals before data ingestion;
2. Data Processing: once gathered, data undergoes comprehensive processing activities to ensure
its suitability for the research goals. In detail, this step involves systematic cleaning and
transformation procedures to enhance the data quality and consistency, addressing also issues related
to missing values and inaccuracies. The processed data is thus standardized and aligned with
established clinical frameworks, including Fast Healthcare Interoperability Resources (FHIR) and
Observational Medical Outcomes Partnership (OMOP), to facilitate seamless interoperability;
3. Model Management: next, the processed data are pèriodically organized and stored within a
data lake infrastructure, which is capable of handling several data formats. To this end, the Model
Management integrates relational databases, Picture Archiving and Communication Systems
(PACS), and servers that adhere to widely recognized clinical standards. This step also incorporates
mechanisms for controlled data retention, avoiding unnecessary storage prolongation. However,
the primary aim of this step is the development of AI and ML models. For this reason, these
models leverage the processed data to extract relevant insights for the decision-making activities;
4. Results Visualization: finally, the developed models are deployed inside real healthcare
applications to face diferent tasks. For this reason, it is crucial to monitor the related performance
by tracking each execution along with the associated input configurations. Consequently, the
pipeline must also incorporate specific monitoring tools, such as interactive dashboards and
decision-support systems. These tools become pivotal in providing a comprehensive visualization
of the results, enabling physicians and AI experts to assess the models’ performance.</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. The role of MLOps</title>
        <p>
          During our experience inside the DARE foundation, we encountered several challenges related to the
development environment. To face them and be compliant with existing regulations, we thought that
MLOps was the best solution to ensure high-quality data and release safe models. For instance, thanks
to its CI/CD nature, MLOps can monitor the related outcomes by providing accurate prediction tools
for the diagnostic and prognostic processes [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ].
        </p>
        <p>
          Therefore, starting from the healthcare pipeline shown in Fig. 3, we continue its definition by
explaining the role played by MLOps. To this end, we first describe the main MLOps steps. Then, we
conceptually map such steps over our pipeline and show how MLOps fully supports the entire workflow.
According to the definition provided by Moskalenko et al. [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ], the MLOps development cycle, however
complex it is, can be summarized in the following steps shown in Fig. 4:
        </p>
        <p>According to the given definitions, these steps are overlappable with those shown in Fig. 3. More
precisely, Data Preparation covers the same roles as Data Collection. They are responsible for data
collection, cleaning, and transformation that may come from diferent healthcare scenarios. Follows the
Model Development step, which covers some functions of Data Processing and Model Management.
Thanks to the most famous MLOps platforms (i.e., MLflow [ 38] and ClearML [39]), Model Development
ensures that the collected data are continuously stored and monitored. Similarly, the Model Deployment
step also covers some functions of Data Processing and Model Management. In detail, it rigorously
manages models in production by following a CI/CD logic. For this reason, the stored data do not
represent only those coming from patients but also those related to models (e.g., provided outputs,
considered hyperparameters, and tracked metrics). Finally, the Performance Monitoring and Results
Visualization steps aim to monitor the models’ drift and data quality through dedicated graphical
interfaces, as well as the data related to new patients (i.e., those not considered during the training
process). Ultimately, adopting an MLOps framework not only supports the development of a healthcare
pipeline but also provides additional benefits for the involved models.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Ensure the CSF requirements</title>
      <p>This section aims to examine the feasibility of MLOps in ensuring CSF requirements. To this end, starting
from the defined pipeline, we show how MLOps can enable one of the most important Categories of
the Protect (PR) Function, namely Data Security. Then, we also highlight that our pipeline ensures
other CSF Categories, focusing on those related to Detect (DT) and Recover (RC) Functions. For each
Category, we report the related results through checklist tables containing the Subcategory ID (ID),
the Subcategory definition (Definition), and the ensure type (i.e., direct, indirect, and no). Notice that
we derived such tables by faithfully following those reported by CSF [23]. Furthermore, we use the
term direct for those requirements that MLOps ensures, together with best practices, without further
implementation steps. Instead, with indirect, we refer to all those requirements in which MLOps needs
to interface with additional implementations or unrelated tools.</p>
      <sec id="sec-5-1">
        <title>5.1. MLOps in ensuring Data Security</title>
        <p>
          With reference to Fig. 2, we start our discussion by showing how MLOps can ensure Data Security (DS).
To this end, we assume that our pipeline complies with all cybersecurity best practices (i.e., efectively
implements and employs communication protocols, access controls, and encryption techniques) [
          <xref ref-type="bibr" rid="ref19">19,
42</xref>
          ]. Inadequate data protection measures can lead to unauthorized access to sensitive information,
resulting in potential legal and financial consequences. Not surprisingly, one of the primary concerns is
represented by data breaches, which can occur in diferent stages [ 43]. For this reason, the following
assumption also provides a fertile ground for MLOps to collect, process, and store data securely. From a
practical point of view, this means employing the CI/CD nature to encrypt sensitive data during all
lifecycle (i.e., at rest, in transit, and in use) and conduct regular audits to monitor compliance with data
protection regulations [43].
        </p>
        <p>
          For this reason, as shown in Tab. 2, MLOps allows the consistent management of data with risk
management strategies [23], by directly ensuring confidentiality, integrity, and availability throughout
the development cycle (see PR.DS-01, PR.DS-02, and PR.DS-10). As discussed in Sec. 4, the role played
by MLOps becomes more pivotal because it forces organizations to adopt a multi-dimensional approach
that includes a range of advanced techniques and tools [43], such as MLFlow [38], DVC [35], and
Great Expectations [37]. All this is possible because these tools give MLOps pipelines the fundamental
ability to track any aspect (i.e., data, hyperparameters, metrics, and models) [44], minimize performance
degradation, and manage data drift [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]. As a result, the following ability also makes the creation of
uniquely identified and rigorously maintained backups (see PR.DS-11). Therefore, we can state that the
application of MLOps within our pipeline can directly ensure the DS requirements reported in Tab. 2.
        </p>
        <p>ID
PR.DS-01
PR.DS-02
PR.DS-10
PR.DS-11</p>
        <p>Definition</p>
        <p>The confidentiality, integrity, and
availability of data-at-rest are protected</p>
        <p>The confidentiality, integrity, and
availability of data-in-transit are protected</p>
        <p>The confidentiality, integrity, and
availability of data-in-use are protected</p>
        <p>Backups of data are created,
protected, maintained, and tested</p>
      </sec>
      <sec id="sec-5-2">
        <title>5.2. MLOps compared to other CSF Functions</title>
        <p>Subsequently, by adopting the same methodology, we also focused on the remaining Functions (i.e.,
Govern - GV, Identify - ID, Detect - DT, Respond - RS, and Recover - RC). With reference to Fig. 2, the
results of this iterative process have highlighted interesting evidence for some Categories of DT and RC
Functions. Concerning DT, we have found some correspondences in the Continuous Monitoring (CM)
Category. As shown in Tab. 3, CM defines some requirements for ensuring that assets are monitored
to find anomalies, indicators of compromise, and other potentially adverse events [ 23]. Among the
requirements identified with DE.CM, only two are indirectly ensured: DE.CM-01 and DE.CM-09. More
precisely, the ability to monitor models in production allows to count the number of interactions made.
For instance, during a Denial-of-Service (DoS) attack, there could be numerous "unnecessary" requests
aimed at saturating the responsiveness of the hosting asset. Therefore, by employing dedicated user
interfaces, such as those implemented with Prometheus [40] and Grafana [41], it is possible to monitor
networks and the related services (see DE.CM-01) by considering the number of requests, the received
inputs, and the provided outputs. Consequently, together with the ability to record any experimental
aspect, this also allows MLOps to monitor runtime environments and the employed data (see DE.CM-09).</p>
        <p>Instead, for the RC Function, we have found some correspondences in the Incident Recovery Plan
Execution (RP) Category. As shown in Tab. 4, RP defines some requirements for the correct restoration
activities, which are performed to ensure the operational availability of systems and services afected by
cybersecurity incidents [23]. Among the requirements identified with RC.RP, only three are indirectly
ensured: RC.RP-01, RC.RP-02, and RC.RP-03. More precisely, thanks again to its ability to record any
aspect of the development lifecycle, MLOps indirectly generates backups of the employed dataset
and models. Such backups can be useful when the recovery portion of the incident response plan is
executed (see RC.RP-01). Moreover, this ability also supports the selection, prioritization, and execution
of recovery actions (see RC.RP-02). For example, running a pipeline’s step rather than or before another.
Finally, with the support of some notable technologies (e.g., DVC [35], Deepchecks [36], and Great
Expectations [37]), MLOps can verify the backup integrity before the recovery (see RC.RP-03).
DE.CM-01
DE.CM-02
DE.CM-03
DE.CM-06
DE.CM-09</p>
        <p>Definition
Networks and network services
are monitored to find potentially</p>
        <p>adverse events
The physical environment is
monitored to find potentially</p>
        <p>adverse events
Personnel activity and technology
usage are monitored to find
potentially adverse events
External service provider activities and
services are monitored to find</p>
        <p>potentially adverse events
Computing hardware and software,
runtime environments, and their
data are monitored to find
potentially adverse events
ID
RC.RP-01
RC.RP-02
RC.RP-03
RC.RP-04
RC.RP-05
RC.RP-06</p>
        <p>Definition</p>
        <p>The recovery portion of the incident
response plan is executed once initiated</p>
        <p>from the incident response process
Recovery actions are selected, scoped,</p>
        <p>prioritized, and performed
The integrity of backups and other
restoration assets is verified before using</p>
        <p>them for restoration</p>
        <p>Critical mission functions and
cybersecurity risk management are considered
to establish post-incident operational norms
The integrity of restored assets is verified,
systems and services are restored, and
normal operating status is confirmed
The end of incident recovery is declared
based on criteria, and incident-related
documentation is completed
indirect
no
no
no
indirect
Ensure type
indirect
indirect
indirect
no
no
no</p>
        <p>Despite the contribution highlighted in this work, it appears that the proposed MLOps pipeline
ensures only a few requirements (i.e., Subcategories). However, according to the definition provided by
CSF, this aspect does not necessarily represent a limitation. Regardless of the size or importance of the
organization concerned, the CSF should be used in conjunction with other resources (e.g., frameworks,
standards, guidelines, and leading practices) to manage cybersecurity risks as well as possible [23].
Moreover, from a practical point of view, it is impossible to cover all cybersecurity aspects by employing
only one technology [45]. Therefore, on the basis of the discussed outcomes, we consider essential to
investigate the remaining CSF Functions (i.e., those not covered) by considering diferent scenarios or
enhanced frameworks (e.g., the Machine Learning Security Operations [46]). Finally, the feasibility of
MLOps pipelines should be evaluated with respect to legal requirements, such as those defined by the
AI Act [47] and European Regulation (2017/745) [48].</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusions and Future Work</title>
      <p>Implementing Machine Learning (ML) models for healthcare scenarios represents a challenging activity,
ranging from data quality management to compliance with stringent regulations. In this context,
MLOps pipelines emerge as promising solutions for managing the lifecycle of developed models, which
is vital for diagnostic and prognostic activities. On the other hand, the development of healthcare
systems should also consider several cybersecurity aspects strictly related to such regulations. In
response to these additional challenges, the Cybersecurity Framework (CSF) 2.0, defined by the National
Institute of Standards and Technology (NIST), provides updated guidelines to address security issues in
an ever-evolving technological landscape. For this reason, we investigated the feasibility of MLOps
pipelines in ensuring the requirements defined by CSF. To this end, we first presented an overview of
the fundamental concepts employed, namely the CSF-related structure (i.e., Functions and Categories)
and the main characteristics of MLOps. Then, based on our experience with the DARE foundation, we
presented the high-level architecture of a healthcare MLOps pipeline. Finally, by adopting the CSF, we
discussed the feasibility of our pipeline in ensuring Data Security, which represents one of the most
important Categories of the Protect (PR) Function. Moreover, by iteratively analyzing the remaining
CSF Functions, we have also highlighted that MLOps might indirectly ensure other CSF Categories,
with particular emphasis on those of Detect (DT) and Recover (RC).</p>
      <p>However, due to the numerous, heterogeneous, and high-level requirements defined in CSF, it is
impossible to cover all related aspects in the following study. For this reason, we will investigate MLOps
pipelines and their benefits by considering other healthcare scenarios. This first contribution will allow
us to analyze the remaining CSF Functions. Moreover, to improve the achieved outcomes, we will also
combine enhanced frameworks, such as Machine Learning Security Operations (MLSecOps), with the
implementations of real use cases. Finally, since we presented a pipeline employed by a real healthcare
foundation, we will also analyze the feasibility of MLOps in ensuring legal requirements, such as those
defined by the AI Act and European Regulation (2017/745).</p>
    </sec>
    <sec id="sec-7">
      <title>Acknowledgments</title>
      <p>This study was partially supported by the Italian Ministry of University and Research under PNRR-PNC
Project PNC0000002 “DARE—Digital Lifelong Prevention” (CUP: B53C22006450001).</p>
    </sec>
    <sec id="sec-8">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the authors used ChatGPT, Grammarly in order to: Grammar and
spelling check, Paraphrase and reword. After using this tool/service, the authors reviewed and edited
the content as needed and take full responsibility for the publication’s content.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>M. M. Ahsan</surname>
            ,
            <given-names>S. A.</given-names>
          </string-name>
          <string-name>
            <surname>Luna</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          <string-name>
            <surname>Siddique</surname>
          </string-name>
          ,
          <article-title>Machine-learning-based disease diagnosis: A comprehensive review</article-title>
          ,
          <source>Healthcare</source>
          (
          <year>2022</year>
          ). doi:
          <volume>10</volume>
          .3390/healthcare10030541.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>G.</given-names>
            <surname>Battineni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. G.</given-names>
            <surname>Sagaro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Chinatalapudi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Amenta</surname>
          </string-name>
          ,
          <article-title>Applications of machine learning predictive models in the chronic disease diagnosis (</article-title>
          <year>2020</year>
          ). doi:
          <volume>10</volume>
          .3390/jpm10020021.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>D.</given-names>
            <surname>Bertsimas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Orfanoudaki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. B.</given-names>
            <surname>Weiner</surname>
          </string-name>
          ,
          <article-title>Personalized treatment for coronary artery disease patients: a machine learning approach (</article-title>
          <year>2020</year>
          ).
          <source>doi:10.1007/s10729-020-09522-4.</source>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>B.</given-names>
            <surname>Schwartz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z. D.</given-names>
            <surname>Cohen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. A.</given-names>
            <surname>Rubel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Zimmermann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W. W.</given-names>
            <surname>Wittmann</surname>
          </string-name>
          , W. Lutz,
          <article-title>Personalized treatment selection in routine care: Integrating machine learning and statistical algorithms to recommend cognitive behavioral or psychodynamic therapy</article-title>
          ,
          <source>Psychotherapy Research</source>
          (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>P. N.</given-names>
            <surname>Ramkumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. S.</given-names>
            <surname>Haeberle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Ramanathan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W. A.</given-names>
            <surname>Cantrell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Navarro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Mont</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bloomfield</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. M.</given-names>
            <surname>Patterson</surname>
          </string-name>
          ,
          <article-title>Remote patient monitoring using mobile health for total knee arthroplasty: Validation of a wearable and machine learning-based surveillance platform</article-title>
          ,
          <source>The Journal of Arthroplasty</source>
          <volume>34</volume>
          (
          <year>2019</year>
          )
          <fpage>2253</fpage>
          -
          <lpage>2259</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.arth.
          <year>2019</year>
          .
          <volume>05</volume>
          .021.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Rghioui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Lloret</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Sendra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Oumnad</surname>
          </string-name>
          ,
          <article-title>A smart architecture for diabetic patient monitoring using machine learning algorithms</article-title>
          ,
          <source>Healthcare</source>
          <volume>8</volume>
          (
          <year>2020</year>
          ). doi:
          <volume>10</volume>
          .3390/healthcare8030348.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>L. E.</given-names>
            <surname>Lwakatare</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Raj</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Crnkovic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Bosch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. H.</given-names>
            <surname>Olsson</surname>
          </string-name>
          ,
          <article-title>Large-scale machine learning systems in real-world industrial settings: A review of challenges and solutions</article-title>
          , Information and Software
          <string-name>
            <surname>Technology</surname>
          </string-name>
          (
          <year>2020</year>
          ). doi:
          <volume>10</volume>
          .1016/j.infsof.
          <year>2020</year>
          .
          <volume>106368</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>E.</given-names>
            <surname>Petersen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Potdevin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Mohammadi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Zidowitz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Breyer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Nowotka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Henn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Pechmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Leucker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Rostalski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Herzog</surname>
          </string-name>
          ,
          <article-title>Responsible and regulatory conform machine learning for medicine: A survey of challenges and solutions (</article-title>
          <year>2022</year>
          ). doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2022</year>
          .
          <volume>3178382</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>Vänskä</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.-K. Kemell</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Mikkonen</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Abrahamsson</surname>
          </string-name>
          ,
          <article-title>Continuous software engineering practices in AI/ML development past the narrow lens of MLOps: Adoption challenges</article-title>
          , e-Informatica
          <source>Software Engineering Journal</source>
          <volume>18</volume>
          (
          <year>2024</year>
          )
          <article-title>240102</article-title>
          . doi:
          <volume>10</volume>
          .37190/e-inf240102.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>F.</given-names>
            <surname>Calefato</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Quaranta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Lanubile</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Kalinowski, Assessing the use of automl for datadriven software engineering</article-title>
          ,
          <source>2023 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)</source>
          (
          <year>2023</year>
          )
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>F.</given-names>
            <surname>Lanubile</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Calefato</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Quaranta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Amoruso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Fumarola</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Filannino</surname>
          </string-name>
          ,
          <article-title>Towards productizing ai/ml models: An industry perspective from data scientists</article-title>
          ,
          <source>in: 2021 IEEE/ACM 1st Workshop on AI Engineering (WAIN)</source>
          ,
          <year>2021</year>
          . doi:
          <volume>10</volume>
          .1109/WAIN52551.
          <year>2021</year>
          .
          <volume>00027</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>M. M. John</surname>
            ,
            <given-names>H. H.</given-names>
          </string-name>
          <string-name>
            <surname>Olsson</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Bosch</surname>
          </string-name>
          ,
          <article-title>Towards mlops: A framework and maturity model</article-title>
          ,
          <source>in: 2021 47th Euromicro Conference on Software Engineering and Advanced Applications (SEAA)</source>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>B. M. A.</given-names>
            <surname>Matsui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. H.</given-names>
            <surname>Goya</surname>
          </string-name>
          , Mlops:
          <article-title>Five steps to guide its efective implementation</article-title>
          ,
          <source>in: 2022 1st International Conference on AI Engineering (CAIN)</source>
          ,
          <year>2022</year>
          . doi:
          <volume>10</volume>
          .1145/3522664.3528611.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>I.</given-names>
            <surname>Karamitsos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Albarhami</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Apostolopoulos</surname>
          </string-name>
          ,
          <article-title>Applying devops practices of continuous automation for machine learning</article-title>
          ,
          <source>Information</source>
          <volume>11</volume>
          (
          <year>2020</year>
          ). doi:
          <volume>10</volume>
          .3390/info11070363.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>P. S. U.</given-names>
            <surname>Shah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Ahmad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. O.</given-names>
            <surname>Beg</surname>
          </string-name>
          ,
          <article-title>Towards mlops: A devops tools recommender system for machine learning system (</article-title>
          <year>2024</year>
          ). URL: https://api.semanticscholar.org/CorpusID:267759567.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>T.</given-names>
            <surname>Mboweni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Masombuka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Dongmo</surname>
          </string-name>
          ,
          <article-title>A systematic review of machine learning devops</article-title>
          , in: 2022 International Conference on Electrical,
          <source>Computer and Energy Technologies (ICECET)</source>
          ,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>V.</given-names>
            <surname>Moskalenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Kharchenko</surname>
          </string-name>
          ,
          <article-title>Resilience-aware mlops for ai-based medical diagnostic system</article-title>
          ,
          <source>Frontiers in Public Health</source>
          <volume>12</volume>
          (
          <year>2024</year>
          ). doi:
          <volume>10</volume>
          .3389/fpubh.
          <year>2024</year>
          .
          <volume>1342937</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>M.</given-names>
            <surname>Reddy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Dattaprakash</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kammath</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Manokaran</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Be</surname>
          </string-name>
          ,
          <article-title>Application of mlops in prediction of lifestyle diseases</article-title>
          ,
          <source>ECS Transactions 107</source>
          (
          <year>2022</year>
          )
          <article-title>1191</article-title>
          . doi:
          <volume>10</volume>
          .1149/10701.1191ecst.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>T.</given-names>
            <surname>Ahmad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Adnan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Rafi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Akbar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Anwar</surname>
          </string-name>
          ,
          <article-title>Mlops-enabled security strategies for nextgeneration operational technologies</article-title>
          ,
          <source>in: Proc. of the 28th International Conference on Evaluation and Assessment in Software Engineering, EASE '24</source>
          ,
          <year>2024</year>
          . doi:
          <volume>10</volume>
          .1145/3661167.3661283.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>M.</given-names>
            <surname>Fredrikson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Jha</surname>
          </string-name>
          , T. Ristenpart,
          <article-title>Model inversion attacks that exploit confidence information and basic countermeasures</article-title>
          ,
          <source>in: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15</source>
          ,
          <year>2015</year>
          . doi:
          <volume>10</volume>
          .1145/2810103.2813677.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>