Evasion

In network security, evasion is bypassing an information security device in order to deliver an exploit, attack, or other form of malware to a target… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1970-2018
0204019702018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
In security-sensitive applications, the success of machine learning depends on a thorough vetting of their resistance to… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
1425 
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Tax evasion, by its very nature, is difficult to observe. We quantify the effects of tax rates on tax evasion by examining the… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2003
Highly Cited
2003
A critical problem faced by a Network Intrusion Detection System (NIDS) is that of ambiguity. The NIDS cannot always determine… (More)
  • figure 1.1
  • figure 1.2
  • figure 2.1
  • figure 5.1
  • figure 5.2
Is this relevant?
Highly Cited
2001
Highly Cited
2001
  • Michael G. ALLINGHAM
  • 2001
Theoretical analysis of the connection between taxation and risktaking has mainly been concerned with the effect of taxes on… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
A fundamental problem for network intrusion detection systems is the ability of a skilled attacker to evade detection by… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1999
Highly Cited
1999
In this paper we develop a probabilistic framework for pursuit-evasion games. We propose a “greedy” policy to control a swarm of… (More)
  • figure 1
Is this relevant?
Highly Cited
1999
Highly Cited
1999
This paper addresses the problem of planning the motion of one or more pursuers in a polygonal environment to eventually \see" an… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1998
Highly Cited
1998
  • Thomas H Ptacek, Timothy N Newsham
  • 1998
All currently available network intrusion detection ID systems rely upon a mechanism of data collection passive protocol analysis… (More)
Is this relevant?
Highly Cited
1997
Highly Cited
1997
This paper addresses the problem of planning the motion of one or more pursuers in a polygonal environment to eventually \see" an… (More)
Is this relevant?