Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches.
Long ChengSalman AhmedHans LiljestrandThomas NymanHaipeng CaiTrent JaegerN. AsokanDanfeng (Daphne) YaoPublished in: ACM Trans. Priv. Secur. (2021)
Keyphrases
- database
- data sets
- data sources
- data collection
- data processing
- data mining techniques
- image data
- small number
- input data
- data analysis
- training data
- website
- search engine
- synthetic data
- experimental data
- raw data
- original data
- complex data
- probability distribution
- data structure
- machine learning
- intrusion detection
- data objects