Adversary-Aware Learning Techniques and Trends in Cybersecurity 2020
DOI: 10.1007/978-3-030-55692-1_4
|View full text |Cite
|
Sign up to set email alerts
|

Adversarial Machine Learning in Text: A Case Study of Phishing Email Detection with RCNN Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…In addition to text analysis for the detection of phishing, other areas of application for statistics in cybersecurity include network analysis, threat reports, the detection of malware, intrusion detection, and analysing the behaviour of users to detect insider threats. Since attackers are constantly trying to defeat defensive filters, an interesting direction for future research is adversarial machine learning 4 . This includes attack generation and techniques for building robust models.…”
Section: Next Stepsmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition to text analysis for the detection of phishing, other areas of application for statistics in cybersecurity include network analysis, threat reports, the detection of malware, intrusion detection, and analysing the behaviour of users to detect insider threats. Since attackers are constantly trying to defeat defensive filters, an interesting direction for future research is adversarial machine learning 4 . This includes attack generation and techniques for building robust models.…”
Section: Next Stepsmentioning
confidence: 99%
“…Since attackers are constantly trying to defeat defensive filters, an interesting direction for future research is adversarial machine learning. 4 This includes attack generation and techniques for building robust models.…”
Section: Next Stepsmentioning
confidence: 99%