サイバーセキュリティ

Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey

Authors: Mu Zhu, Ahmed H. Anwar, Zelin Wan, Jin-Hee Cho, Charles Kamhoua, Munindar P. Singh | Published: 2021-01-21 | Updated: 2021-05-08
ゲーム理論
サイバーセキュリティ
防御的欺瞞

Machine Learning in Generation, Detection, and Mitigation of Cyberattacks in Smart Grid: A Survey

Authors: Nur Imtiazul Haque, Md Hasan Shahriar, Md Golam Dastgir, Anjan Debnath, Imtiaz Parvez, Arif Sarwat, Mohammad Ashiqur Rahman | Published: 2020-09-01
FDI攻撃検出手法
サイバーセキュリティ
深層学習技術

SynGAN: Towards Generating Synthetic Network Attacks using GANs

Authors: Jeremy Charlier, Aman Singh, Gaston Ormazabal, Radu State, Henning Schulzrinne | Published: 2019-08-26
DDoS攻撃
サイバーセキュリティ
フレームワーク

Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking

Authors: Yunhan Jia, Yantao Lu, Junjie Shen, Qi Alfred Chen, Zhenyu Zhong, Tao Wei | Published: 2019-05-27 | Updated: 2019-05-30
サイバーセキュリティ
トラッキング手法
敵対的攻撃手法

Devil in the Detail: Attack Scenarios in Industrial Applications

Authors: Simon D. Duque Anton, Alexander Hafner, Hans Dieter Schotten | Published: 2019-05-24
サイバーセキュリティ
プロセス環境
攻撃タイプ

Modern Problems Require Modern Solutions: Hybrid Concepts for Industrial Intrusion Detection

Authors: Simon D. Duque Anton, Mathias Strufe, Hans Dieter Schotten | Published: 2019-05-15 | Updated: 2019-05-16
ITセキュリティの課題
サイバーセキュリティ
侵入検知システム

Anomaly Detection in Cyber Network Data Using a Cyber Language Approach

Authors: Bartley D. Richardson, Benjamin J. Radford, Shawn E. Davis, Keegan Hines, David Pekarek | Published: 2018-08-15
サイバーセキュリティ
データセット評価
トラフィック特性分析

Detection based Defense against Adversarial Examples from the Steganalysis Point of View

Authors: Jiayang Liu, Weiming Zhang, Yiwei Zhang, Dongdong Hou, Yujia Liu, Hongyue Zha, Nenghai Yu | Published: 2018-06-21 | Updated: 2018-12-24
サイバーセキュリティ
敵対的サンプルの検知
敵対的訓練

Effect of Hyper-Parameter Optimization on the Deep Learning Model Proposed for Distributed Attack Detection in Internet of Things Environment

Authors: Md Mohaimenuzzaman, Zahraa Said Abdallah, Joarder Kamruzzaman, Bala Srinivasan | Published: 2018-06-19
サイバーセキュリティ
深層学習技術

Securing Majority-Attack In Blockchain Using Machine Learning And Algorithmic Game Theory: A Proof of Work

Authors: Somdip Dey | Published: 2018-06-14
サイバーセキュリティ
不正取引
攻撃の分類