サイバーセキュリティ

SynGAN: Towards Generating Synthetic Network Attacks using GANs

Authors: Jeremy Charlier, Aman Singh, Gaston Ormazabal, Radu State, Henning Schulzrinne | Published: 2019-08-26
DDoS攻撃
サイバーセキュリティ
フレームワーク

Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking

Authors: Yunhan Jia, Yantao Lu, Junjie Shen, Qi Alfred Chen, Zhenyu Zhong, Tao Wei | Published: 2019-05-27 | Updated: 2019-05-30
サイバーセキュリティ
トラッキング手法
敵対的攻撃手法

Devil in the Detail: Attack Scenarios in Industrial Applications

Authors: Simon D. Duque Anton, Alexander Hafner, Hans Dieter Schotten | Published: 2019-05-24
サイバーセキュリティ
プロセス環境
攻撃タイプ

Modern Problems Require Modern Solutions: Hybrid Concepts for Industrial Intrusion Detection

Authors: Simon D. Duque Anton, Mathias Strufe, Hans Dieter Schotten | Published: 2019-05-15 | Updated: 2019-05-16
ITセキュリティの課題
サイバーセキュリティ
侵入検知システム

Anomaly Detection in Cyber Network Data Using a Cyber Language Approach

Authors: Bartley D. Richardson, Benjamin J. Radford, Shawn E. Davis, Keegan Hines, David Pekarek | Published: 2018-08-15
サイバーセキュリティ
データセット評価
トラフィック特性分析

Detection based Defense against Adversarial Examples from the Steganalysis Point of View

Authors: Jiayang Liu, Weiming Zhang, Yiwei Zhang, Dongdong Hou, Yujia Liu, Hongyue Zha, Nenghai Yu | Published: 2018-06-21 | Updated: 2018-12-24
サイバーセキュリティ
敵対的サンプルの検知
敵対的訓練

Effect of Hyper-Parameter Optimization on the Deep Learning Model Proposed for Distributed Attack Detection in Internet of Things Environment

Authors: Md Mohaimenuzzaman, Zahraa Said Abdallah, Joarder Kamruzzaman, Bala Srinivasan | Published: 2018-06-19
サイバーセキュリティ
深層学習技術

Securing Majority-Attack In Blockchain Using Machine Learning And Algorithmic Game Theory: A Proof of Work

Authors: Somdip Dey | Published: 2018-06-14
サイバーセキュリティ
不正取引
攻撃の分類

Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus

Authors: William Fleshman, Edward Raff, Richard Zak, Mark McLean, Charles Nicholas | Published: 2018-06-12
サイバーセキュリティ
攻撃の分類
敵対的学習

An Efficient Flow-based Multi-level Hybrid Intrusion Detection System for Software-Defined Networks

Authors: Majd Latah, Levent Toker | Published: 2018-06-11
FDI攻撃検出手法
サイバーセキュリティ
攻撃の分類