Evasion (network security)

Known as: Evasion 
In network security, evasion is bypassing an information security device in order to deliver an exploit, attack, or other form of malware to a target… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
The deployment of multiple robots for achieving a common goal helps to improve the performance, efficiency, and/or robustness in… (More)
  • figure 1
  • figure 2
  • table I
  • table II
  • table III
Is this relevant?
Highly Cited
2016
Highly Cited
2016
Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Learning-based classifiers are increasingly used for detection of various forms of malicious data. However, if they are deployed… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
Highly Cited
2013
Highly Cited
2013
In security-sensitive applications, the success of machine learning depends on a thorough vetting of their resistance to… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
We consider the problem of having a team of Unmanned Aerial Vehicles (UAV) and Unmanned Ground Vehicles (UGV) pursue a second… (More)
  • figure 1
  • figure 2
  • table I
  • table II
  • figure 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
We analyze a randomized pursuit-evasion game on graphs. Thi game is played by two players, ahunterand arabbit. LetG be any… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2002
Highly Cited
2002
B7-H1, a recently described member of the B7 family of costimulatory molecules, is thought to be involved in the regulation of… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2001
Highly Cited
2001
  • Michael G. ALLINGHAM, Agnar SANDMO
  • 2001
Theoretical analysis of the connection between taxation and risktaking has mainly been concerned with the effect of taxes on… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
A fundamentalproblemfor network intrusiondetectionsystemsis the ability of a skilled attacker to evadedetectionby exploiting… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1998
Highly Cited
1998
All currently available network intrusion detection (ID) systems rely upon a mechanism of data collection---passive protocol… (More)
Is this relevant?