Hybrid adversarial defense: : Merging honeypots and traditional security methods
Abstract
References
Index Terms
- Hybrid adversarial defense: Merging honeypots and traditional security methods1
Recommendations
Hybrid cyber defense strategies using Honey-X: A survey
AbstractThe development and adoption of network technologies reshape our daily life; however, network-connected devices have become popular targets of cybercrimes. Honey-X-based cyber defense technologies, like honeypots, honeynets, and honeytokens, can ...
GUARD: Graph Universal Adversarial Defense
CIKM '23: Proceedings of the 32nd ACM International Conference on Information and Knowledge ManagementGraph convolutional networks (GCNs) have been shown to be vulnerable to small adversarial perturbations, which becomes a severe threat and largely limits their applications in security-critical scenarios. To mitigate such a threat, considerable research ...
Adversarial Ranking Attack and Defense
Computer Vision – ECCV 2020AbstractDeep Neural Network (DNN) classifiers are vulnerable to adversarial attack, where an imperceptible perturbation could result in misclassification. However, the vulnerability of DNN-based image ranking systems remains under-explored. In this paper, ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
IOS Press
Netherlands
Publication History
Author Tags
Qualifiers
- Research-article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
View options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in