Picture for William J. Buchanan

William J. Buchanan

Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT

Add code
Apr 26, 2021
Figure 1 for Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT
Figure 2 for Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT
Figure 3 for Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT
Figure 4 for Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT
Viaarxiv icon

Privacy and Trust Redefined in Federated Machine Learning

Add code
Mar 30, 2021
Figure 1 for Privacy and Trust Redefined in Federated Machine Learning
Figure 2 for Privacy and Trust Redefined in Federated Machine Learning
Figure 3 for Privacy and Trust Redefined in Federated Machine Learning
Figure 4 for Privacy and Trust Redefined in Federated Machine Learning
Viaarxiv icon

An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks

Add code
Jan 10, 2021
Figure 1 for An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks
Figure 2 for An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks
Figure 3 for An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks
Figure 4 for An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks
Viaarxiv icon

Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach

Add code
May 13, 2020
Figure 1 for Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach
Figure 2 for Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach
Viaarxiv icon