文献データベース

Malware Evasion Attack and Defense

Authors: Yonghong Huang, Utkarsh Verma, Celeste Fralick, Gabriel Infante-Lopez, Brajesh Kumarz, Carl Woodward | Published: 2019-04-07 | Updated: 2019-04-16
マルウェア検出
敵対的サンプル
敵対的攻撃検出

Reframing Threat Detection: Inside esINSIDER

Authors: M. Arthur Munson, Jason Kichen, Dustin Hillard, Ashley Fidler, Peiter Zatko | Published: 2019-04-07
データの起源と変遷
内部ネットワーク偵察
異常検知手法

A Compendium on Network and Host based Intrusion Detection Systems

Authors: Rahul-Vigneswaran K, Prabaharan Poornachandran, Soman KP | Published: 2019-04-06
機械学習アルゴリズム
機械学習の応用
深層学習手法

A Conceptual Architecture for Contractual Data Sharing in a Decentralised Environment

Authors: Iain Barclay, Alun Preece, Ian Taylor, Dinesh Verma | Published: 2019-04-05
データの起源と変遷
データ依存性
機械学習の応用

Minimum Uncertainty Based Detection of Adversaries in Deep Neural Networks

Authors: Fatemeh Sheikholeslami, Swayambhoo Jain, Georgios B. Giannakis | Published: 2019-04-05 | Updated: 2020-10-15
敵対的攻撃
機械学習アルゴリズム
深層学習手法

Malware Detection using Machine Learning and Deep Learning

Authors: Hemant Rathore, Swati Agarwal, Sanjay K. Sahay, Mohit Sewak | Published: 2019-04-04
機械学習アルゴリズム
機械学習の応用
深層学習手法

White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks

Authors: Yotam Gil, Yoav Chai, Or Gorodissky, Jonathan Berant | Published: 2019-04-04
敵対的攻撃
機械学習アルゴリズム
機械学習の応用

Understanding the efficacy, reliability and resiliency of computer vision techniques for malware detection and future research directions

Authors: Li Chen | Published: 2019-04-03
マルウェア検出
将来の研究
深層学習技術

HopSkipJumpAttack: A Query-Efficient Decision-Based Attack

Authors: Jianbo Chen, Michael I. Jordan, Martin J. Wainwright | Published: 2019-04-03 | Updated: 2020-04-28
敵対的サンプル
敵対的攻撃
距離評価手法

Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices

Authors: Asanka Sayakkara, Nhien-An Le-Khac, Mark Scanlon | Published: 2019-04-03
IoT特有の脅威
信号処理手法
機械学習アルゴリズム