Login / Signup
Adversarial examples for network intrusion detection systems.
Ryan Sheatsley
Nicolas Papernot
Michael J. Weisman
Gunjan Verma
Patrick D. McDaniel
Published in:
J. Comput. Secur. (2022)
Keyphrases
</>
network intrusion detection systems
neural network
intrusion detection system
training examples
real time
network intrusion
intrusion detection
databases
classification accuracy
data mining techniques
social network analysis