Sensitive Samples Revisited: Detecting Neural Network Attacks Using Constraint Solvers.
Amel Nestor DocenaThomas WahlTrevor PearceYunsi FeiPublished in: SCSS (2021)
Keyphrases
- network attacks
- constraint solvers
- intrusion detection
- network intrusion detection
- constraint solving
- constraint solver
- constraint satisfaction problems
- network security
- constraint programming
- set bounds propagation
- neural network
- intrusion detection system
- combinatorial problems
- solving problems
- constraint satisfaction
- constraint propagation
- metaheuristic
- state space
- search algorithm
- objective function
- information systems