Review on the Feasibility of Adversarial Evasion Attacks and Defenses for Network Intrusion Detection Systems. Debicha, I., Cochez, B., Kenaza, T., Debatty, T., Dricot, J., & Mees, W. CoRR, 2023. Link Paper bibtex @article{journals/corr/abs-2303-07003,
added-at = {2023-03-16T00:00:00.000+0100},
author = {Debicha, Islam and Cochez, Benjamin and Kenaza, Tayeb and Debatty, Thibault and Dricot, Jean-Michel and Mees, Wim},
biburl = {https://www.bibsonomy.org/bibtex/2a026196db75c3a6d43148ce738604f31/dblp},
ee = {https://doi.org/10.48550/arXiv.2303.07003},
interhash = {de253eeff47ae3f2f4aacce7effa1e95},
intrahash = {a026196db75c3a6d43148ce738604f31},
journal = {CoRR},
keywords = {dblp},
timestamp = {2024-04-08T22:52:25.000+0200},
title = {Review on the Feasibility of Adversarial Evasion Attacks and Defenses for Network Intrusion Detection Systems.},
url = {http://dblp.uni-trier.de/db/journals/corr/corr2303.html#abs-2303-07003},
volume = {abs/2303.07003},
year = 2023
}
Downloads: 0
{"_id":"uMv2NCznwEdzNaqTt","bibbaseid":"debicha-cochez-kenaza-debatty-dricot-mees-reviewonthefeasibilityofadversarialevasionattacksanddefensesfornetworkintrusiondetectionsystems-2023","author_short":["Debicha, I.","Cochez, B.","Kenaza, T.","Debatty, T.","Dricot, J.","Mees, W."],"bibdata":{"bibtype":"article","type":"article","added-at":"2023-03-16T00:00:00.000+0100","author":[{"propositions":[],"lastnames":["Debicha"],"firstnames":["Islam"],"suffixes":[]},{"propositions":[],"lastnames":["Cochez"],"firstnames":["Benjamin"],"suffixes":[]},{"propositions":[],"lastnames":["Kenaza"],"firstnames":["Tayeb"],"suffixes":[]},{"propositions":[],"lastnames":["Debatty"],"firstnames":["Thibault"],"suffixes":[]},{"propositions":[],"lastnames":["Dricot"],"firstnames":["Jean-Michel"],"suffixes":[]},{"propositions":[],"lastnames":["Mees"],"firstnames":["Wim"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/2a026196db75c3a6d43148ce738604f31/dblp","ee":"https://doi.org/10.48550/arXiv.2303.07003","interhash":"de253eeff47ae3f2f4aacce7effa1e95","intrahash":"a026196db75c3a6d43148ce738604f31","journal":"CoRR","keywords":"dblp","timestamp":"2024-04-08T22:52:25.000+0200","title":"Review on the Feasibility of Adversarial Evasion Attacks and Defenses for Network Intrusion Detection Systems.","url":"http://dblp.uni-trier.de/db/journals/corr/corr2303.html#abs-2303-07003","volume":"abs/2303.07003","year":"2023","bibtex":"@article{journals/corr/abs-2303-07003,\n added-at = {2023-03-16T00:00:00.000+0100},\n author = {Debicha, Islam and Cochez, Benjamin and Kenaza, Tayeb and Debatty, Thibault and Dricot, Jean-Michel and Mees, Wim},\n biburl = {https://www.bibsonomy.org/bibtex/2a026196db75c3a6d43148ce738604f31/dblp},\n ee = {https://doi.org/10.48550/arXiv.2303.07003},\n interhash = {de253eeff47ae3f2f4aacce7effa1e95},\n intrahash = {a026196db75c3a6d43148ce738604f31},\n journal = {CoRR},\n keywords = {dblp},\n timestamp = {2024-04-08T22:52:25.000+0200},\n title = {Review on the Feasibility of Adversarial Evasion Attacks and Defenses for Network Intrusion Detection Systems.},\n url = {http://dblp.uni-trier.de/db/journals/corr/corr2303.html#abs-2303-07003},\n volume = {abs/2303.07003},\n year = 2023\n}\n\n","author_short":["Debicha, I.","Cochez, B.","Kenaza, T.","Debatty, T.","Dricot, J.","Mees, W."],"key":"journals/corr/abs-2303-07003","id":"journals/corr/abs-2303-07003","bibbaseid":"debicha-cochez-kenaza-debatty-dricot-mees-reviewonthefeasibilityofadversarialevasionattacksanddefensesfornetworkintrusiondetectionsystems-2023","role":"author","urls":{"Link":"https://doi.org/10.48550/arXiv.2303.07003","Paper":"http://dblp.uni-trier.de/db/journals/corr/corr2303.html#abs-2303-07003"},"keyword":["dblp"],"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"http://www.bibsonomy.org/bib/author/cochez?items=1000","dataSources":["jRiMQcLQ4TWHSS6Mc"],"keywords":["dblp"],"search_terms":["review","feasibility","adversarial","evasion","attacks","defenses","network","intrusion","detection","systems","debicha","cochez","kenaza","debatty","dricot","mees"],"title":"Review on the Feasibility of Adversarial Evasion Attacks and Defenses for Network Intrusion Detection Systems.","year":2023}