Adversarial Robustness for Machine Learning Cyber Defenses Using Log Data.
Kai SteversonJonathan M. MullinMetin B. AhiskaliPublished in: CoRR (2020)
Keyphrases
- log data
- machine learning
- machine learning systems
- log files
- web log data
- search result
- machine learning algorithms
- web access
- data mining techniques
- data mining
- query suggestion
- log analysis
- knowledge discovery
- search logs
- active learning
- user sessions
- network security
- information retrieval
- knowledge acquisition
- massive amounts
- query intent