Generating optimal attack paths in generative adversarial phishing
Phishing attacks have witnessed a rapid increase thanks to the matured social engineering
techniques, COVID-19 pandemic, and recently adversarial deep learning techniques. Even
though adversarial phishing attacks are recent, attackers are crafting such attacks by
considering context, testing different attack paths, then selecting paths that can evade
machine learning phishing detectors. This research proposes an approach that generates
adversarial phishing attacks by finding optimal subsets of features that lead to higher …
techniques, COVID-19 pandemic, and recently adversarial deep learning techniques. Even
though adversarial phishing attacks are recent, attackers are crafting such attacks by
considering context, testing different attack paths, then selecting paths that can evade
machine learning phishing detectors. This research proposes an approach that generates
adversarial phishing attacks by finding optimal subsets of features that lead to higher …
Generating Optimal Attack Paths in Generative Adversarial Phishing.................... 19 Rayah Alqurashi, Ahmed Aleroud, Ahmad Saifan, Mohammad Alsmadi and Izzat …
M Sikora, R Fujdiak, J Misurec - scholar.archive.org
… Adversarial Machine Learning … Attack Detection and Analysis Analysis and detection of
application-independent slow Denial of Service cyber attacks . . . 25 Marek Sikora, Radek
Fujdiak and Jiri Misurec …
application-independent slow Denial of Service cyber attacks . . . 25 Marek Sikora, Radek
Fujdiak and Jiri Misurec …
Showing the best results for this search. See all results