共 52 条
[1]
Abaid Z, 2017, 2017 IEEE 16TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), P375
[2]
Abraham B, 2018, IEEE IJCNN
[3]
Alazab M., 2011, Ninth Australasian Data Mining Confer-ence AusDM 2011 Conferences in Research and Practice in Information Tech-nology CRPIT, V121, P171
[5]
DeepDGA: Adversarially-Tuned Domain Generation and Detection
[J].
AISEC'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY,
2016,
:13-21
[6]
Apruzzese G., 2018, P IEEE 17 INT S NETW, P1
[7]
Addressing Adversarial Attacks Against Security Systems Based on Machine Learning
[J].
2019 11TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON): SILENT BATTLE,
2019,
:383-400
[8]
Apruzzese G, 2018, INT CONF CYBER CONFL, P371, DOI 10.23919/CYCON.2018.8405026
[10]
Backes M., 2016, arXiv preprint arXiv:1606.04435, DOI DOI 10.1111/IJFS.12415