共 108 条
[51]
Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2019, 100
:779-796
[53]
Adversarial Machine Learning - Industry Perspectives
[J].
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2020),
2020,
:69-75
[54]
Black Box Attacks on Deep Anomaly Detectors
[J].
14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019),
2019,
[55]
Characterization of Tor Traffic using Time based Features
[J].
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY,
2017,
:253-262
[56]
Li Pan, 2018, IEEE INT C COMMUNICA
[57]
Cracking Classifiers for Evasion: A Case Study on the Google's Phishing Pages Filter
[J].
PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'16),
2016,
:345-356
[59]
IDSGAN: Generative Adversarial Networks for Attack Generation Against Intrusion Detection
[J].
ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2022, PT III,
2022, 13282
:79-91