August 2019
Intermediate to advanced
342 pages
9h 35m
English
In Chapter 4, Malware Threat Detection, we thoroughly analyzed the advantages deriving from the implementation of malware detectors using ML algorithms.
In Chapter 8, GANs – Attacks and Defenses, we also showed how it is possible to use GANs to deceive these detectors.
We said that the attack methods based on GANs can be distinguished as follows:
Even in ...
Read now
Unlock full access