共 49 条
[1]
Anderson J.P., Computer security threat monitoring and surveillance, (1980)
[2]
Kemmerer R.A., Vigna G., Intrusion detection: a brief history and overview, Computer, 35, 4, pp. supl27-supl30, (2002)
[3]
Innella P., The evolution of intrusion detection systems, Tetrad Digit Integr, pp. 1-15, (2001)
[4]
Li A.Z.D., A brief history of machine learning in cybersecurity, (2022)
[5]
Othman S.M., Ba-Alwi F.M., Alsohybe N.T., Al-Hashida A.Y., Intrusion detection model using machine learning algorithm on big data environment, J Big Data, (2018)
[6]
Dalvi N., Domingos P., Sanghai S., Verma D., Adversarial classification, Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 99-108, (2004)
[7]
Biggio B., Corona I., Maiorca D., Nelson B., Srndic N., Laskov P., Giacinto G., Roli F., Evasion attacks against machine learning at test time, Advanced information systems engineering, pp. 387-402, (2013)
[8]
Carlini N., Wagner D., Towards evaluating the robustness of neural networks, IEEE Symp Secur Priv (SP), (2017)
[9]
Goodfellow I.J., Shlens J., Szegedy C., Explaining and harnessing adversarial examples, 3Rd International Conference on Learning Representations (ICLR), ICLR, (2015)
[10]
Papernot N., McDaniel P., Goodfellow I. Transferability in machine learning: From phenomena to black-box attacks using adversarial samples, 2016. Arxiv Preprint Arxiv, (1605)