Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey Authors: Mu Zhu, Ahmed H. Anwar, Zelin Wan, Jin-Hee Cho, Charles Kamhoua, Munindar P. Singh | Published: 2021-01-21 | Updated: 2021-05-08 Game TheoryCybersecurityDefensive Deception 2021.01.21 2025.05.28 Literature Database
Machine Learning in Generation, Detection, and Mitigation of Cyberattacks in Smart Grid: A Survey Authors: Nur Imtiazul Haque, Md Hasan Shahriar, Md Golam Dastgir, Anjan Debnath, Imtiaz Parvez, Arif Sarwat, Mohammad Ashiqur Rahman | Published: 2020-09-01 FDI Attack Detection MethodsCybersecurityDeep Learning Technology 2020.09.01 2025.05.28 Literature Database
SynGAN: Towards Generating Synthetic Network Attacks using GANs Authors: Jeremy Charlier, Aman Singh, Gaston Ormazabal, Radu State, Henning Schulzrinne | Published: 2019-08-26 DDoS AttackCybersecurityFramework 2019.08.26 2025.05.28 Literature Database
Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking Authors: Yunhan Jia, Yantao Lu, Junjie Shen, Qi Alfred Chen, Zhenyu Zhong, Tao Wei | Published: 2019-05-27 | Updated: 2019-05-30 CybersecurityTracking MethodAdversarial Attack Methods 2019.05.27 2025.05.28 Literature Database
Devil in the Detail: Attack Scenarios in Industrial Applications Authors: Simon D. Duque Anton, Alexander Hafner, Hans Dieter Schotten | Published: 2019-05-24 CybersecurityProcess EnvironmentAttack Type 2019.05.24 2025.05.28 Literature Database
Modern Problems Require Modern Solutions: Hybrid Concepts for Industrial Intrusion Detection Authors: Simon D. Duque Anton, Mathias Strufe, Hans Dieter Schotten | Published: 2019-05-15 | Updated: 2019-05-16 Challenges in IT SecurityCybersecurityIntrusion Detection System 2019.05.15 2025.05.28 Literature Database
Anomaly Detection in Cyber Network Data Using a Cyber Language Approach Authors: Bartley D. Richardson, Benjamin J. Radford, Shawn E. Davis, Keegan Hines, David Pekarek | Published: 2018-08-15 CybersecurityDataset evaluationTraffic Characteristic Analysis 2018.08.15 2025.05.28 Literature Database
Detection based Defense against Adversarial Examples from the Steganalysis Point of View Authors: Jiayang Liu, Weiming Zhang, Yiwei Zhang, Dongdong Hou, Yujia Liu, Hongyue Zha, Nenghai Yu | Published: 2018-06-21 | Updated: 2018-12-24 CybersecurityAdversarial Example DetectionAdversarial Training 2018.06.21 2025.05.28 Literature Database
Effect of Hyper-Parameter Optimization on the Deep Learning Model Proposed for Distributed Attack Detection in Internet of Things Environment Authors: Md Mohaimenuzzaman, Zahraa Said Abdallah, Joarder Kamruzzaman, Bala Srinivasan | Published: 2018-06-19 CybersecurityDeep Learning Technology 2018.06.19 2025.05.28 Literature Database
Securing Majority-Attack In Blockchain Using Machine Learning And Algorithmic Game Theory: A Proof of Work Authors: Somdip Dey | Published: 2018-06-14 CybersecurityFraudulent TransactionTaxonomy of Attacks 2018.06.14 2025.05.28 Literature Database