Picture for Nour Moustafa

Nour Moustafa

A Cyber Threat Intelligence Sharing Scheme based on Federated Learning for Network Intrusion Detection

Add code
Nov 04, 2021
Figure 1 for A Cyber Threat Intelligence Sharing Scheme based on Federated Learning for Network Intrusion Detection
Figure 2 for A Cyber Threat Intelligence Sharing Scheme based on Federated Learning for Network Intrusion Detection
Figure 3 for A Cyber Threat Intelligence Sharing Scheme based on Federated Learning for Network Intrusion Detection
Figure 4 for A Cyber Threat Intelligence Sharing Scheme based on Federated Learning for Network Intrusion Detection
Viaarxiv icon

Feature Extraction for Machine Learning-based Intrusion Detection in IoT Networks

Add code
Aug 28, 2021
Figure 1 for Feature Extraction for Machine Learning-based Intrusion Detection in IoT Networks
Figure 2 for Feature Extraction for Machine Learning-based Intrusion Detection in IoT Networks
Figure 3 for Feature Extraction for Machine Learning-based Intrusion Detection in IoT Networks
Figure 4 for Feature Extraction for Machine Learning-based Intrusion Detection in IoT Networks
Viaarxiv icon

Security and Privacy for Artificial Intelligence: Opportunities and Challenges

Add code
Feb 09, 2021
Figure 1 for Security and Privacy for Artificial Intelligence: Opportunities and Challenges
Figure 2 for Security and Privacy for Artificial Intelligence: Opportunities and Challenges
Figure 3 for Security and Privacy for Artificial Intelligence: Opportunities and Challenges
Figure 4 for Security and Privacy for Artificial Intelligence: Opportunities and Challenges
Viaarxiv icon

Mitigating the Impact of Adversarial Attacks in Very Deep Networks

Add code
Dec 08, 2020
Figure 1 for Mitigating the Impact of Adversarial Attacks in Very Deep Networks
Figure 2 for Mitigating the Impact of Adversarial Attacks in Very Deep Networks
Figure 3 for Mitigating the Impact of Adversarial Attacks in Very Deep Networks
Figure 4 for Mitigating the Impact of Adversarial Attacks in Very Deep Networks
Viaarxiv icon

A Deep Marginal-Contrastive Defense against Adversarial Attacks on 1D Models

Add code
Dec 08, 2020
Figure 1 for A Deep Marginal-Contrastive Defense against Adversarial Attacks on 1D Models
Figure 2 for A Deep Marginal-Contrastive Defense against Adversarial Attacks on 1D Models
Figure 3 for A Deep Marginal-Contrastive Defense against Adversarial Attacks on 1D Models
Figure 4 for A Deep Marginal-Contrastive Defense against Adversarial Attacks on 1D Models
Viaarxiv icon

Densely Connected Residual Network for Attack Recognition

Add code
Aug 05, 2020
Figure 1 for Densely Connected Residual Network for Attack Recognition
Figure 2 for Densely Connected Residual Network for Attack Recognition
Figure 3 for Densely Connected Residual Network for Attack Recognition
Figure 4 for Densely Connected Residual Network for Attack Recognition
Viaarxiv icon

Enhancing network forensics with particle swarm and deep learning: The particle deep framework

Add code
May 02, 2020
Figure 1 for Enhancing network forensics with particle swarm and deep learning: The particle deep framework
Figure 2 for Enhancing network forensics with particle swarm and deep learning: The particle deep framework
Figure 3 for Enhancing network forensics with particle swarm and deep learning: The particle deep framework
Figure 4 for Enhancing network forensics with particle swarm and deep learning: The particle deep framework
Viaarxiv icon