Bitte benutzen Sie diese Kennung, um auf die Ressource zu verweisen:
https://dspace.chmnu.edu.ua/jspui/handle/123456789/1173
Langanzeige der Metadaten
DC Element | Wert | Sprache |
---|---|---|
dc.contributor.author | Striuk, O. S. | - |
dc.contributor.author | Kondratenko, Y. P. | - |
dc.date.accessioned | 2023-06-13T06:04:00Z | - |
dc.date.available | 2023-06-13T06:04:00Z | - |
dc.date.issued | 2023 | - |
dc.identifier.issn | 1860949X | - |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85153380058&doi=10.1007%2f978-3-031-25759-9_18&partnerID=40&m | - |
dc.identifier.uri | https://link.springer.com/chapter/10.1007/978-3-031-25759-9_18 | - |
dc.identifier.uri | https://dspace.chmnu.edu.ua/jspui/handle/123456789/1173 | - |
dc.description | Striuk, O. S., Kondratenko, Y. P. (2023) Generative Adversarial Networks in Cybersecurity : Analysis and Response Studies in Computational Intelligence, 1087, pp. 373-388. DOI: 10.1007/978-3-031-25759-9_18. | uk_UA |
dc.description.abstract | Cybersecurity is one of the key problems of the twenty-first century, as the digital environment has already become equally important to the real world, and in some situations, perhaps, even surpasses it. Especially when it comes to classified data or information with limited access. The main challenge for cybersecurity is a timely and adequate response to any type of threat since every day there are more and more malicious scenarios for compromising information technology data. For cyber-attack defense algorithms to be effective, it is important to maintain a high level of awareness of the widest range of state-of-the-art threat types and malicious technologies. Machine learning and AI in general are considered as both a helpful tool and a threat. Generative adversarial networks (GANs) and their modifications can pose a serious threat to the entire field and thus should be properly and thoroughly researched, especially in light of the fact that GANs can be used to improve known attack types so that even AI-based detection system cannot identify them. The purpose of this article is a comprehensive analysis and structuring of existing GAN methodologies, with the subsequent development of approaches for an adequate response to potential threats. | uk_UA |
dc.language.iso | en | uk_UA |
dc.publisher | Springer Science and Business Media | uk_UA |
dc.subject | Artificial intelligence | uk_UA |
dc.subject | AL | uk_UA |
dc.subject | Cybersecurity | uk_UA |
dc.subject | Deep learning | uk_UA |
dc.subject | DL | uk_UA |
dc.subject | Generative adversarial networks | uk_UA |
dc.subject | GAN | uk_UA |
dc.subject | Information security | uk_UA |
dc.subject | Machine learning | uk_UA |
dc.subject | ML | uk_UA |
dc.title | Generative Adversarial Networks in Cybersecurity : Analysis and Response | uk_UA |
dc.type | Book chapter | uk_UA |
Enthalten in den Sammlungen: | Публікації науково-педагогічних працівників ЧНУ імені Петра Могили у БД Scopus |
Dateien zu dieser Ressource:
Datei | Beschreibung | Größe | Format | |
---|---|---|---|---|
Striuk O. S., Kondratenko Y. P..pdf | 63.6 kB | Adobe PDF | Öffnen/Anzeigen |
Alle Ressourcen in diesem Repository sind urheberrechtlich geschützt, soweit nicht anderweitig angezeigt.