Please use this identifier to cite or link to this item: https://dspace.chmnu.edu.ua/jspui/handle/123456789/1173
Full metadata record
DC FieldValueLanguage
dc.contributor.authorStriuk, O. S.-
dc.contributor.authorKondratenko, Y. P.-
dc.date.accessioned2023-06-13T06:04:00Z-
dc.date.available2023-06-13T06:04:00Z-
dc.date.issued2023-
dc.identifier.issn1860949X-
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85153380058&doi=10.1007%2f978-3-031-25759-9_18&partnerID=40&m-
dc.identifier.urihttps://link.springer.com/chapter/10.1007/978-3-031-25759-9_18-
dc.identifier.urihttps://dspace.chmnu.edu.ua/jspui/handle/123456789/1173-
dc.descriptionStriuk, O. S., Kondratenko, Y. P. (2023) Generative Adversarial Networks in Cybersecurity : Analysis and Response Studies in Computational Intelligence, 1087, pp. 373-388. DOI: 10.1007/978-3-031-25759-9_18.uk_UA
dc.description.abstractCybersecurity is one of the key problems of the twenty-first century, as the digital environment has already become equally important to the real world, and in some situations, perhaps, even surpasses it. Especially when it comes to classified data or information with limited access. The main challenge for cybersecurity is a timely and adequate response to any type of threat since every day there are more and more malicious scenarios for compromising information technology data. For cyber-attack defense algorithms to be effective, it is important to maintain a high level of awareness of the widest range of state-of-the-art threat types and malicious technologies. Machine learning and AI in general are considered as both a helpful tool and a threat. Generative adversarial networks (GANs) and their modifications can pose a serious threat to the entire field and thus should be properly and thoroughly researched, especially in light of the fact that GANs can be used to improve known attack types so that even AI-based detection system cannot identify them. The purpose of this article is a comprehensive analysis and structuring of existing GAN methodologies, with the subsequent development of approaches for an adequate response to potential threats.uk_UA
dc.language.isoenuk_UA
dc.publisherSpringer Science and Business Mediauk_UA
dc.subjectArtificial intelligenceuk_UA
dc.subjectALuk_UA
dc.subjectCybersecurityuk_UA
dc.subjectDeep learninguk_UA
dc.subjectDLuk_UA
dc.subjectGenerative adversarial networksuk_UA
dc.subjectGANuk_UA
dc.subjectInformation securityuk_UA
dc.subjectMachine learninguk_UA
dc.subjectMLuk_UA
dc.titleGenerative Adversarial Networks in Cybersecurity : Analysis and Responseuk_UA
dc.typeBook chapteruk_UA
Appears in Collections:Публікації науково-педагогічних працівників ЧНУ імені Петра Могили у БД Scopus

Files in This Item:
File Description SizeFormat 
Striuk O. S., Kondratenko Y. P..pdf63.6 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.