The Attack Generator: A Systematic Approach Towards Constructing Adversarial Attacks.
Felix AssionPeter SchlichtFlorens GreßnerWiebke GüntherFabian HügerNico M. SchmidtUmair RasheedPublished in: CVPR Workshops (2019)
Keyphrases
- countermeasures
- malicious users
- attack detection
- malicious attacks
- differential power analysis
- data corruption
- ddos attacks
- power analysis
- denial of service attacks
- attack scenarios
- cyber attacks
- network attacks
- dos attacks
- security risks
- fault injection
- block cipher
- injection attacks
- normal traffic
- denial of service
- security measures
- information security
- detecting malicious
- phishing attacks
- network intrusion detection
- security vulnerabilities
- intrusion detection
- digital watermark
- defense mechanisms
- network intrusion
- network traffic
- misuse detection
- multi agent
- insider attacks
- information leakage
- java card
- watermarking scheme
- security protocols
- pseudorandom
- web applications
- intrusion detection system
- malicious nodes
- network intrusions
- smart card
- distributed denial of service attacks