Computer Sciences

A deep learning technique to generate DNS amplification attacks

Deep learning techniques have recently proved to be highly promising for detecting cybersecurity attacks and determining their nature. Concurrently, many cybercriminals have been devising new attacks aimed at interfering ...

Security

A model that can help inexperienced users identify phishing emails

Phishing attacks are cyber-attacks through which criminals trick users into sending them money and sensitive information, or into installing malware on their computer, by sending them deceptive emails or messages. As these ...

Computer Sciences

A new feature selection technique for intrusion detection systems

Network-based technologies have become increasingly widespread, and they are now being used by countless individuals, professionals, and businesses worldwide. Despite their advantages, most network-based systems are highly ...

Computer Sciences

A method to protect audio classifiers against adversarial attacks

In recent years, machine learning algorithms have attained remarkable results in a variety of tasks, including the classification of both images and audio files. A class of algorithms that has proven to be particularly promising ...

Computer Sciences

A model to determine the impact of DDoS attacks using Twitter data

Distributed denial of service (DDoS) attacks, which are designed to prevent legitimate users from accessing specific network systems, have become increasingly common over the past decade or so. These attacks make services ...

page 1 from 28

Attacker

In some sports, an attacker is a specific type of player, usually one whose role involves aggressive play. Heavy attackers are usually placed up front so they can score some points for the team.

In football, attackers are also referred to as strikers.

This text uses material from Wikipedia, licensed under CC BY-SA