SynGAN: Towards Generating Synthetic Network Attacks using GANs Authors: Jeremy Charlier, Aman Singh, Gaston Ormazabal, Radu State, Henning Schulzrinne | Published: 2019-08-26 DDoS AttackCybersecurityFramework 2019.08.26 2025.05.28 Literature Database
Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking Authors: Yunhan Jia, Yantao Lu, Junjie Shen, Qi Alfred Chen, Zhenyu Zhong, Tao Wei | Published: 2019-05-27 | Updated: 2019-05-30 CybersecurityTracking MethodAdversarial Attack Methods 2019.05.27 2025.05.28 Literature Database
Devil in the Detail: Attack Scenarios in Industrial Applications Authors: Simon D. Duque Anton, Alexander Hafner, Hans Dieter Schotten | Published: 2019-05-24 CybersecurityProcess EnvironmentAttack Type 2019.05.24 2025.05.28 Literature Database
Modern Problems Require Modern Solutions: Hybrid Concepts for Industrial Intrusion Detection Authors: Simon D. Duque Anton, Mathias Strufe, Hans Dieter Schotten | Published: 2019-05-15 | Updated: 2019-05-16 Challenges in IT SecurityCybersecurityIntrusion Detection System 2019.05.15 2025.05.28 Literature Database
Anomaly Detection in Cyber Network Data Using a Cyber Language Approach Authors: Bartley D. Richardson, Benjamin J. Radford, Shawn E. Davis, Keegan Hines, David Pekarek | Published: 2018-08-15 CybersecurityDataset evaluationTraffic Characteristic Analysis 2018.08.15 2025.05.28 Literature Database
Detection based Defense against Adversarial Examples from the Steganalysis Point of View Authors: Jiayang Liu, Weiming Zhang, Yiwei Zhang, Dongdong Hou, Yujia Liu, Hongyue Zha, Nenghai Yu | Published: 2018-06-21 | Updated: 2018-12-24 CybersecurityAdversarial Example DetectionAdversarial Training 2018.06.21 2025.05.28 Literature Database
Effect of Hyper-Parameter Optimization on the Deep Learning Model Proposed for Distributed Attack Detection in Internet of Things Environment Authors: Md Mohaimenuzzaman, Zahraa Said Abdallah, Joarder Kamruzzaman, Bala Srinivasan | Published: 2018-06-19 CybersecurityDeep Learning Technology 2018.06.19 2025.05.28 Literature Database
Securing Majority-Attack In Blockchain Using Machine Learning And Algorithmic Game Theory: A Proof of Work Authors: Somdip Dey | Published: 2018-06-14 CybersecurityFraudulent TransactionTaxonomy of Attacks 2018.06.14 2025.05.28 Literature Database
Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus Authors: William Fleshman, Edward Raff, Richard Zak, Mark McLean, Charles Nicholas | Published: 2018-06-12 CybersecurityTaxonomy of AttacksAdversarial Learning 2018.06.12 2025.05.28 Literature Database
An Efficient Flow-based Multi-level Hybrid Intrusion Detection System for Software-Defined Networks Authors: Majd Latah, Levent Toker | Published: 2018-06-11 FDI Attack Detection MethodsCybersecurityTaxonomy of Attacks 2018.06.11 2025.05.28 Literature Database