The Attack Generator: A Systematic Approach Towards Constructing Adversarial Attacks.
Felix AssionPeter SchlichtFlorens GreßnerWiebke GüntherFabian HügerNico M. SchmidtUmair RasheedPublished in: CoRR (2019)
Keyphrases
- countermeasures
- attack detection
- malicious users
- differential power analysis
- malicious attacks
- denial of service attacks
- attack scenarios
- security risks
- ddos attacks
- cyber attacks
- power analysis
- fault injection
- block cipher
- data corruption
- dos attacks
- network intrusion
- detecting malicious
- network intrusions
- injection attacks
- network attacks
- security vulnerabilities
- phishing attacks
- malicious activities
- intrusion detection system
- information security
- security measures
- insider attacks
- java card
- digital watermark
- normal traffic
- distributed denial of service attacks
- multi agent
- intrusion detection
- network anomaly detection
- denial of service
- detect malicious
- malicious nodes
- information leakage
- smart card
- cyber security
- identity theft
- attack graphs
- alert correlation
- security threats
- computer security
- network security
- digital images