Demystifying the Transferability of Adversarial Attacks in Computer Networks.
Ehsan NowrooziMauro ContiYassine MekdadMohammad Hajian BerenjestanakiAbdeslam El FergouguiPublished in: CoRR (2021)
Keyphrases
- computer networks
- security problems
- network security
- network traffic
- intrusion detection system
- network management
- countermeasures
- computer systems
- multi agent
- packet switched
- intrusion detection
- communication networks
- computer network security
- computer networking
- watermarking scheme
- real world
- database
- dos attacks
- network monitoring
- k means
- database systems
- data sets