Sign in

Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain.

Ishai RosenbergAsaf ShabtaiYuval EloviciLior Rokach
Published in: ACM Comput. Surv. (2021)
Keyphrases
  • machine learning
  • cyber security
  • real world
  • data mining
  • data analysis
  • intrusion detection
  • decision trees
  • mobile devices
  • control system
  • knowledge discovery
  • transfer learning