{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:17:51Z","timestamp":1743027471230,"version":"3.40.3"},"publisher-location":"Cham","reference-count":93,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031150296"},{"type":"electronic","value":"9783031150302"}],"license":[{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-15030-2_6","type":"book-chapter","created":{"date-parts":[[2022,12,7]],"date-time":"2022-12-07T10:04:03Z","timestamp":1670407443000},"page":"125-145","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Offensive Machine Learning Methods and the Cyber Kill Chain"],"prefix":"10.1007","author":[{"given":"Hannu","family":"Turtiainen","sequence":"first","affiliation":[]},{"given":"Andrei","family":"Costin","sequence":"additional","affiliation":[]},{"given":"Alex","family":"Polyakov","sequence":"additional","affiliation":[]},{"given":"Timo","family":"H\u00e4m\u00e4l\u00e4inen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,1]]},"reference":[{"key":"6_CR1","unstructured":"Abbate, P.: Internet Crime Report 2020. Tech. rep., Federal Bureau of Investigation (2021). https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2020_IC3Report.pdf"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Al-Hababi, A., Tokgoz, S.C.: Man-in-the-middle attacks to detect and identify services in encrypted network flows using machine learning. In: 3rd International Conference on Advanced Communication Technologies and Networking (CommNet). IEEE, Piscataway (2020)","DOI":"10.1109\/CommNet49926.2020.9199617"},{"key":"6_CR3","unstructured":"Alhuzali, A., Gjomemo, R., Eshete, B., Venkatakrishnan, V.: {NAVEX}: precise and scalable exploit generation for dynamic web applications. In: 27th {USENIX} Security Symposium (2018)"},{"key":"6_CR4","doi-asserted-by":"publisher","first-page":"101635","DOI":"10.1016\/j.cose.2019.101635","volume":"88","author":"FH Alqahtani","year":"2020","unstructured":"Alqahtani, F.H., Alsulaiman, F.A.: Is image-based CAPTCHA secure against attacks based on machine learning? An experimental study. Comput. Secur. 88, 101635 (2020)","journal-title":"Comput. Secur."},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Anderson, H.S., Woodbridge, J., Filar, B.: DeepDGA: adversarially-tuned domain generation and detection. In: ACM Workshop on Artificial Intelligence and Security. ACM, New York (2016)","DOI":"10.1145\/2996758.2996767"},{"key":"6_CR6","unstructured":"Antonakakis et al., M.: Understanding the Mirai Botnet. In: 26th USENIX Security Symposium. USENIX Association (2017)"},{"issue":"2","key":"6_CR7","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/2560217.2560219","volume":"57","author":"T Avgerinos","year":"2014","unstructured":"Avgerinos, T., Cha, S.K., Rebert, A., Schwartz, E.J., Woo, M., Brumley, D.: Automatic exploit generation. Communications of the ACM 57(2), 74\u201384 (2014)","journal-title":"Communications of the ACM"},{"key":"6_CR8","unstructured":"Bahnsen, A.C., Torroledo, I., Camacho, L.D., Villegas, S.: DeepPhish: simulating malicious AI. In: APWG Symposium on Electronic Crime Research (eCrime) (2018)"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Behzadan, V., Munir, A.: Vulnerability of deep reinforcement learning to policy induction attacks (2017). https:\/\/arxiv.org\/abs\/1701.04143","DOI":"10.1007\/978-3-319-62416-7_19"},{"key":"6_CR10","unstructured":"Brewster, T.: Fraudsters Cloned Company Director\u2019s Voice In $35 Million Bank Heist, Police Find (2021). https:\/\/www.forbes.com\/sites\/thomasbrewster\/2021\/10\/14\/huge-bank-fraud-uses-deep-fake-voice-tech-to-steal-millions\/?sh=1456cb187559"},{"key":"6_CR11","unstructured":"Brundage, M., Avin, S., Clark, J., Toner, H., Eckersley, P., Garfinkel, B., Dafoe, A., Scharre, P., Zeitzoff, T., Filar, B., et al.: The malicious use of artificial intelligence: forecasting, prevention, and mitigation (2018). https:\/\/arxiv.org\/abs\/1802.07228"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Chomiak-Orsa, I., Rot, A., Blaicke, B.: Artificial intelligence in cybersecurity: the use of AI along the cyber kill chain. In: International Conference on Computational Collective Intelligence. Springer, Berlin (2019)","DOI":"10.1007\/978-3-030-28374-2_35"},{"issue":"9","key":"6_CR13","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/MC.2017.3571053","volume":"50","author":"H Chung","year":"2017","unstructured":"Chung, H., Iorga, M., Voas, J., Lee, S.: Alexa, can I trust you? IEEE Comput. Mag. 50(9), 100\u2013104 (2017)","journal-title":"IEEE Comput. Mag."},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Chung, K., Kalbarczyk, Z.T., Iyer, R.K.: Availability attacks on computing systems through alteration of environmental control: smart malware approach. In: 10th ACM\/IEEE International Conference on Cyber-Physical Systems. ACM, New York (2019)","DOI":"10.1145\/3302509.3311041"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Conti, M., De Gaspari, F., Mancini, L.V.: Know your enemy: stealth configuration-information gathering in SDN. In: International Conference on Green, Pervasive, and Cloud Computing. Springer, Berlin (2017)","DOI":"10.1007\/978-3-319-57186-7_29"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Costin, A.: Security of CCTV and video surveillance systems: threats, vulnerabilities, attacks, and mitigations. In: 6th International Workshop on Trustworthy Embedded Devices (TrustED) (2016)","DOI":"10.1145\/2995289.2995290"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Cruz-Perez, C., Starostenko, O., Uceda-Ponga, F., Alarcon-Aquino, V., Reyes-Cabrera, L.: Breaking reCAPTCHAs with unpredictable collapse: heuristic character segmentation and recognition. In: Mexican Conference on Pattern Recognition. Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-31149-9_16"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Dalvi, N., Domingos, P., Sanghai, S., Verma, D.: Adversarial classification. In: 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2004)","DOI":"10.1145\/1014052.1014066"},{"key":"6_CR19","unstructured":"Darktrace: Darktrace Cyber AI Analyst: Autonomous Investigations (White Paper)"},{"key":"6_CR20","unstructured":"Descript: Lyrebird AI. https:\/\/www.descript.com\/lyrebird"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Fang, M., Damer, N., Kirchbuchner, F., Kuijper, A.: Real Masks and Fake Faces: On the Masked Face Presentation Attack Detection (2021). https:\/\/arxiv.org\/abs\/2103.01546","DOI":"10.1016\/j.patcog.2021.108398"},{"issue":"2","key":"6_CR22","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0228439","volume":"15","author":"Y Fang","year":"2020","unstructured":"Fang, Y., Liu, Y., Huang, C., Liu, L.: FastEmbed: predicting vulnerability exploitation possibility based on ensemble machine learning algorithm. PLOS ONE 15(2), e0228439 (2020)","journal-title":"PLOS ONE"},{"key":"6_CR23","unstructured":"Flaticon.com: (2021). https:\/\/www.flaticon.com\/"},{"issue":"4","key":"6_CR24","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1007\/s11023-020-09548-1","volume":"30","author":"L Floridi","year":"2020","unstructured":"Floridi, L., Chiriatti, M.: GPT-3: Its nature, scope, limits, and consequences. Minds Mach. 30(4), 681\u2013694 (2020)","journal-title":"Minds Mach."},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Fredrikson, M., Jha, S., Ristenpart, T.: Model inversion attacks that exploit confidence information and basic countermeasures. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (2015)","DOI":"10.1145\/2810103.2813677"},{"key":"6_CR26","unstructured":"Gitlin, J.M.: Hacking street signs with stickers could confuse self-driving cars (2017). https:\/\/arstechnica.com\/cars\/2017\/09\/hacking-street-signs-with-stickers-could-confuse-self-driving-cars\/"},{"key":"6_CR27","unstructured":"Gong, N.Z., Liu, B.: You are who you know and how you behave: attribute inference attacks via users\u2019 social friends and behaviors. In: 25th {USENIX} Security Symposium (2016)"},{"key":"6_CR28","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples (2014). https:\/\/arxiv.org\/abs\/1412.6572"},{"key":"6_CR29","unstructured":"Google: What is reCAPTCHA? https:\/\/www.google.com\/recaptcha\/about\/"},{"key":"6_CR30","doi-asserted-by":"crossref","unstructured":"Gossweiler, R., Kamvar, M., Baluja, S.: What\u2019s up captcha? A captcha based on image orientation. In: 18th International Conference on World Wide Web (2009)","DOI":"10.1145\/1526709.1526822"},{"key":"6_CR31","doi-asserted-by":"crossref","unstructured":"Grieco, G., Grinblat, G.L., Uzal, L., Rawat, S., Feist, J., Mounier, L.: Toward large-scale vulnerability discovery using machine learning. In: 6th ACM Conference on Data and Application Security and Privacy (2016)","DOI":"10.1145\/2857705.2857720"},{"key":"6_CR32","unstructured":"Gu, T., Dolan-Gavitt, B., Garg, S.: BadNets: Identifying vulnerabilities in the machine learning model supply chain (2017). https:\/\/arxiv.org\/abs\/1708.06733"},{"key":"6_CR33","doi-asserted-by":"crossref","unstructured":"Guri, M., Bykhovsky, D.: air-jumper: covert air-gap exfiltration\/infiltration via security cameras & infrared (IR). Comput. Secur. 82, 15\u201329 (2019)","DOI":"10.1016\/j.cose.2018.11.004"},{"key":"6_CR34","unstructured":"Guri, M., Kachlon, A., Hasson, O., Kedma, G., Mirsky, Y., Elovici, Y.: Gsmem: data exfiltration from air-gapped computers over {GSM} frequencies. In: 24th {USENIX} Security Symposium (2015)"},{"key":"6_CR35","doi-asserted-by":"crossref","unstructured":"Guri, M., Kedma, G., Kachlon, A., Elovici, Y.: AirHopper: bridging the air-gap between isolated networks and mobile phones using radio frequencies. In: 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE). IEEE, Piscataway (2014)","DOI":"10.1109\/MALWARE.2014.6999418"},{"key":"6_CR36","doi-asserted-by":"crossref","unstructured":"Guri, M., Zadov, B., Elovici, Y.: LED-it-GO: leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED. In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, Berlin (2017)","DOI":"10.1007\/978-3-319-60876-1_8"},{"key":"6_CR37","unstructured":"HackTheBox: A Massive Hacking Playground. https:\/\/www.hackthebox.eu\/"},{"key":"6_CR38","doi-asserted-by":"crossref","unstructured":"Hitaj, B., Gasti, P., Ateniese, G., Perez-Cruz, F.: Passgan: a deep learning approach for password guessing. In: International Conference on Applied Cryptography and Network Security. Springer, Berlin (2019)","DOI":"10.1007\/978-3-030-21568-2_11"},{"key":"6_CR39","unstructured":"Hong, S., Kaya, Y., Modoranu, I.V., Dumitra\u015f, T.: A Panda? No, It\u2019s a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Inference (2020). https:\/\/arxiv.org\/abs\/2010.02432"},{"key":"6_CR40","unstructured":"Hu, W., Tan, Y.: Generating adversarial malware examples for black-box attacks based on GAN (2017). https:\/\/arxiv.org\/abs\/1702.05983"},{"key":"6_CR41","doi-asserted-by":"crossref","unstructured":"Huang, S.K., Huang, M.H., Huang, P.Y., Lai, C.W., Lu, H.L., Leong, W.M.: Crax: software crash analysis for automatic exploit generation by modeling attacks as symbolic continuations. In: IEEE 6th International Conference on Software Security and Reliability. IEEE, Piscataway (2012)","DOI":"10.1109\/SERE.2012.20"},{"issue":"1","key":"6_CR42","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1109\/TR.2014.2299198","volume":"63","author":"SK Huang","year":"2014","unstructured":"Huang, S.K., Huang, M.H., Huang, P.Y., Lu, H.L., Lai, C.W.: Software crash analysis for automatic exploit generation on binary programs. IEEE Trans. Reliab. 63(1), 270\u2013289 (2014)","journal-title":"IEEE Trans. Reliab."},{"key":"6_CR43","first-page":"80","volume":"1","author":"EM Hutchins","year":"2011","unstructured":"Hutchins, E.M., Cloppert, M.J., Amin, R.M., et al.: Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Leading Issues Inform. Warfare Secur. Res. 1, 80 (2011)","journal-title":"Leading Issues Inform. Warfare Secur. Res."},{"key":"6_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3372823","volume":"53","author":"N Kaloudi","year":"2020","unstructured":"Kaloudi, N., Li, J.: The AI-based cyber threat landscape: a survey. ACM Comput. Surv. 53, 1\u201334 (2020)","journal-title":"ACM Comput. Surv."},{"key":"6_CR45","doi-asserted-by":"crossref","unstructured":"Khan, S.A., Khan, W., Hussain, A.: Phishing attacks and websites classification using machine learning and multiple datasets (a comparative analysis). In: International Conference on Intelligent Computing. Springer, Berlin (2020). https:\/\/arxiv.org\/abs\/2101.02552","DOI":"10.1007\/978-3-030-60796-8_26"},{"key":"6_CR46","doi-asserted-by":"crossref","unstructured":"Khurana, N., Mittal, S., Piplai, A., Joshi, A.: Preventing poisoning attacks on AI based threat intelligence systems. In: IEEE 29th International Workshop on Machine Learning for Signal Processing (MLSP). IEEE, Piscataway (2019)","DOI":"10.1109\/MLSP.2019.8918803"},{"key":"6_CR47","unstructured":"Knabl, G.: Machine Learning-Driven Password Lists. Ph.D. Thesis (2018)"},{"key":"6_CR48","doi-asserted-by":"crossref","unstructured":"Kos, J., Fischer, I., Song, D.: Adversarial examples for generative models (2017). https:\/\/arxiv.org\/abs\/1702.06832","DOI":"10.1109\/SPW.2018.00014"},{"key":"6_CR49","doi-asserted-by":"publisher","first-page":"19","DOI":"10.3390\/technologies7010019","volume":"7","author":"SD Kotey","year":"2019","unstructured":"Kotey, S.D., Tchao, E.T., Gadze, J.D.: On distributed denial of service current defense schemes. Technologies 7, 19 (2019)","journal-title":"Technologies"},{"key":"6_CR50","doi-asserted-by":"publisher","first-page":"1286","DOI":"10.3390\/app10041286","volume":"10","author":"K Lee","year":"2020","unstructured":"Lee, K., Yim, K.: Cybersecurity threats based on machine learning-based offensive technique for password authentication. Appl. Sci. 10, 1286 (2020)","journal-title":"Appl. Sci."},{"key":"6_CR51","doi-asserted-by":"publisher","first-page":"1462","DOI":"10.1631\/FITEE.1800573","volume":"19","author":"JH Li","year":"2018","unstructured":"Li, J.H.: Cyber security meets artificial intelligence: a survey. Front. Inform. Technol. Electron. Eng. 19, 1462\u20131474 (2018)","journal-title":"Front. Inform. Technol. Electron. Eng."},{"key":"6_CR52","unstructured":"Lin, Z., Shi, Y., Xue, Z.: Idsgan: Generative adversarial networks for attack generation against intrusion detection (2018). https:\/\/arxiv.org\/abs\/1809.02077"},{"key":"6_CR53","doi-asserted-by":"crossref","unstructured":"Liu, Y., Ma, S., Aafer, Y., Lee, W.C., Zhai, J., Wang, W., Zhang, X.: Trojaning attack on neural networks (2017)","DOI":"10.14722\/ndss.2018.23291"},{"key":"6_CR54","unstructured":"Lockheed Martin Corporation: Gaining the advantageapplying cyber kill chain\"Equation missing\"  methodology to network defense. https:\/\/www.lockheedmartin.com\/content\/dam\/lockheed-martin\/rms\/documents\/cyber\/Gaining_the_Advantage_Cyber_Kill_Chain.pdf"},{"key":"6_CR55","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.3390\/s20072084","volume":"20","author":"J Maestre Vidal","year":"2020","unstructured":"Maestre Vidal, J., Sotelo Monge, M.A.: Obfuscation of malicious behaviors for thwarting masquerade detection systems based on locality features. Sensors 20, 2084 (2020)","journal-title":"Sensors"},{"key":"6_CR56","unstructured":"Manky, D.: Rise of the \u2018Hivenet\u2019: Botnets That Think for Themselves (2018). https:\/\/www.darkreading.com\/vulnerabilities-threats\/rise-of-the-hivenet-botnets-that-think-for-themselves"},{"key":"6_CR57","doi-asserted-by":"publisher","first-page":"35403","DOI":"10.1109\/ACCESS.2020.2974752","volume":"8","author":"N Martins","year":"2020","unstructured":"Martins, N., Cruz, J.M., Cruz, T., Abreu, P.H.: Adversarial machine learning applied to intrusion and malware scenarios: a systematic review. IEEE Access 8, 35403\u201335419 (2020)","journal-title":"IEEE Access"},{"key":"6_CR58","unstructured":"Mirsky, Y., Demontis, A., Kotak, J., Shankar, R., Gelei, D., Yang, L., Zhang, X., Lee, W., Elovici, Y., Biggio, B.: The Threat of Offensive AI to Organizations (2021). https:\/\/arxiv.org\/abs\/2106.15764"},{"key":"6_CR59","unstructured":"Narayanan, A., Shmatikov, V.: How to break anonymity of the netflix prize dataset (2006). https:\/\/arxiv.org\/abs\/cs\/0610105"},{"key":"6_CR60","doi-asserted-by":"crossref","unstructured":"Novo, C., Morla, R.: Flow-based detection and proxy-based evasion of encrypted malware c2 traffic. In: 13th ACM Workshop on Artificial Intelligence and Security (2020)","DOI":"10.1145\/3411508.3421379"},{"key":"6_CR61","doi-asserted-by":"crossref","unstructured":"Oh, S.J., Schiele, B., Fritz, M.: Towards reverse-engineering black-box neural networks. In: Explainable AI: Interpreting, Explaining and Visualizing Deep Learning. Springer, Berlin (2019)","DOI":"10.1007\/978-3-030-28954-6_7"},{"key":"6_CR62","unstructured":"van den Oord, A., Dieleman, S., Zen, H., Simonyan, K., Vinyals, O., Graves, A., Kalchbrenner, N., Senior, A., Kavukcuoglu, K.: WaveNet: A Generative Model for Raw Audio (2016). https:\/\/arxiv.org\/abs\/1609.03499"},{"key":"6_CR63","doi-asserted-by":"publisher","first-page":"2640","DOI":"10.1109\/TIFS.2017.2718479","volume":"12","author":"M Osadchy","year":"2017","unstructured":"Osadchy, M., Hernandez-Castro, J., Gibson, S., Dunkelman, O., P\u00e9rez-Cabo, D.: No bot expects the DeepCAPTCHA! Introducing immutable adversarial examples, with applications to CAPTCHA generation. IEEE Trans. Inform. Forensics Secur. 12, 2640\u20132653 (2017)","journal-title":"IEEE Trans. Inform. Forensics Secur."},{"key":"6_CR64","doi-asserted-by":"publisher","first-page":"1988","DOI":"10.1109\/COMST.2018.2883147","volume":"21","author":"F Pacheco","year":"2018","unstructured":"Pacheco, F., Exposito, E., Gineste, M., Baudoin, C., Aguilar, J.: Towards the deployment of machine learning solutions in network traffic classification: a systematic survey. IEEE Commun. Surv. Tutorials 21, 1988\u20132014 (2018)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"6_CR65","unstructured":"PimEyes: PimEyes: Face Recognition Search Engine and Reverse Image Search. https:\/\/pimeyes.com\/en"},{"key":"6_CR66","unstructured":"Polyakov, A.: Machine learning for cybercriminals 101 (2018). https:\/\/towardsdatascience.com\/machine-learning-for-cybercriminals-a46798a8c268"},{"key":"6_CR67","unstructured":"Polyakov, A.: Ai security and adversarial machine learning 101 (2019). https:\/\/towardsdatascience.com\/ai-and-ml-security-101-6af8026675ff"},{"key":"6_CR68","doi-asserted-by":"crossref","unstructured":"Ringberg, H., Soule, A., Rexford, J., Diot, C.: Sensitivity of PCA for traffic anomaly detection. In: ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems (2007)","DOI":"10.1145\/1254882.1254895"},{"key":"6_CR69","doi-asserted-by":"crossref","unstructured":"Rubinstein, B.I., Nelson, B., Huang, L., Joseph, A.D., Lau, S.h., Rao, S., Taft, N., Tygar, J.: Stealthy poisoning attacks on PCA-based anomaly detectors. ACM SIGMETRICS Perform. Eval. Rev. 37, 73\u201374 (2009)","DOI":"10.1145\/1639562.1639592"},{"key":"6_CR70","unstructured":"Schwarzschild, A., Goldblum, M., Gupta, A., Dickerson, J.P., Goldstein, T.: Just how toxic is data poisoning? A unified benchmark for backdoor and data poisoning attacks. In: International Conference on Machine Learning. PMLR (2021)"},{"key":"6_CR71","first-page":"1","volume":"37","author":"J Seymour","year":"2016","unstructured":"Seymour, J., Tully, P.: Weaponizing data science for social engineering: automated e2e spear phishing on twitter. BlackHat USA 37, 1\u201339 (2016)","journal-title":"BlackHat USA"},{"key":"6_CR72","unstructured":"Seymour, J., Tully, P.: Generative models for spear phishing posts on social media (2018). https:\/\/arxiv.org\/abs\/1802.05196"},{"key":"6_CR73","doi-asserted-by":"crossref","unstructured":"Shafiq, M., Yu, X., Laghari, A.A., Yao, L., Karn, N.K., Abdessamia, F.: Network traffic classification techniques and comparative analysis using machine learning algorithms. In: 2nd IEEE International Conference on Computer and Communications (ICCC). IEEE, Piscataway (2016)","DOI":"10.1109\/CompComm.2016.7925139"},{"key":"6_CR74","doi-asserted-by":"crossref","unstructured":"Sharif, M., Bhagavatula, S., Bauer, L., Reiter, M.K.: Accessorize to a crime: real and stealthy attacks on state-of-the-art face recognition. In: ACM SIGSAC Conference on Computer and Communications Security (2016)","DOI":"10.1145\/2976749.2978392"},{"key":"6_CR75","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP). IEEE, Piscataway (2017)","DOI":"10.1109\/SP.2017.41"},{"key":"6_CR76","doi-asserted-by":"crossref","unstructured":"Shu, D., Leslie, N.O., Kamhoua, C.A., Tucker, C.S.: Generative adversarial attacks against intrusion detection systems using active learning. In: 2nd ACM Workshop on Wireless Security and Machine Learning (2020)","DOI":"10.1145\/3395352.3402618"},{"key":"6_CR77","doi-asserted-by":"crossref","unstructured":"Sitawarin, C., Wagner, D.: On the robustness of deep k-nearest neighbors (2019). http:\/\/arxiv.org\/abs\/1903.08333v1","DOI":"10.1109\/SPW.2019.00014"},{"key":"6_CR78","unstructured":"Sivakorn, S., Polakis, J., Keromytis, A.D.: I\u2019m not a human: breaking the Google reCAPTCHA. BlackHat (2016)"},{"key":"6_CR79","unstructured":"Stoecklin, M.P.: Deeplocker: how AI can power a stealthy new breed of malware. Secur. Intell. 8 (2018)"},{"key":"6_CR80","unstructured":"Stone, G., Talbert, D., Eberle, W.: Using ai\/machine learning for reconnaissance activities during network penetration testing. In: International Conference on Cyber Warfare and Security. Academic Conferences International Limited (2021)"},{"key":"6_CR81","first-page":"1869","volume":"5","author":"T Subramaniam","year":"2010","unstructured":"Subramaniam, T., Jalab, H.A., Taqa, A.Y.: Overview of textual anti-spam filtering techniques. Int. J. Phys. Sci. 5, 1869\u20131882 (2010)","journal-title":"Int. J. Phys. Sci."},{"key":"6_CR82","unstructured":"Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., Fergus, R.: Intriguing properties of neural networks (2013). https:\/\/arxiv.org\/abs\/1312.6199"},{"key":"6_CR83","unstructured":"The MITRE Corporation: MITRE ATT&CK Matrix for Enterprise. https:\/\/attack.mitre.org\/"},{"key":"6_CR84","unstructured":"Tong, L., Yu, S., Alfeld, S., Vorobeychik, Y.: Adversarial regression with multiple learners (2018). https:\/\/arxiv.org\/abs\/1806.02256"},{"key":"6_CR85","doi-asserted-by":"crossref","unstructured":"Valea, O., Opri\u015fa, C.: Towards pentesting automation using the metasploit framework. In: IEEE 16th International Conference on Intelligent Computer Communication and Processing (ICCP). IEEE, Piscataway (2020)","DOI":"10.1109\/ICCP51029.2020.9266234"},{"key":"6_CR86","doi-asserted-by":"crossref","unstructured":"Wang, M., Su, P., Li, Q., Ying, L., Yang, Y., Feng, D.: Automatic polymorphic exploit generation for software vulnerabilities. In: International Conference on Security and Privacy in Communication Systems. Springer, Berlin (2013)","DOI":"10.1007\/978-3-319-04283-1_14"},{"key":"6_CR87","unstructured":"Wichers, D., Williams, J.: OWASP TOP-10 2017. OWASP Foundation (2017)"},{"key":"6_CR88","doi-asserted-by":"crossref","unstructured":"Yadav, T., Rao, A.M.: Technical aspects of cyber kill chain. In: International Symposium on Security in Computing and Communication. Springer, Berlin (2015)","DOI":"10.1007\/978-3-319-22915-7_40"},{"key":"6_CR89","first-page":"102722","volume":"57","author":"MM Yamin","year":"2021","unstructured":"Yamin, M.M., Ullah, M., Ullah, H., Katt, B.: Weaponized AI for cyber attacks. J. Inform. Secur. Appl. 57, 102722 (2021)","journal-title":"J. Inform. Secur. Appl."},{"key":"6_CR90","doi-asserted-by":"crossref","unstructured":"Yim, K.: A new noise mingling approach to protect the authentication password. In: International Conference on Complex, Intelligent and Software Intensive Systems (2010)","DOI":"10.1109\/CISIS.2010.185"},{"key":"6_CR91","doi-asserted-by":"publisher","first-page":"2010","DOI":"10.3390\/app9102010","volume":"9","author":"N Yu","year":"2019","unstructured":"Yu, N., Darling, K.: A low-cost approach to crack python CAPTCHAs using AI-based chosen-plaintext attack. Appl. Sci. 9, 2010 (2019)","journal-title":"Appl. Sci."},{"key":"6_CR92","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.1109\/SURV.2013.031413.00127","volume":"15","author":"ST Zargar","year":"2013","unstructured":"Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (ddos) flooding attacks. IEEE Commun. Surv. Tutorials 15, 2046\u20132069 (2013)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"6_CR93","unstructured":"Zhang, R., Chen, X., Lu, J., Wen, S., Nepal, S., Xiang, Y.: Using AI to hack IA: a new stealthy spyware against voice assistance functions in smart phones (2018). https:\/\/arxiv.org\/abs\/1805.06187"}],"container-title":["Artificial Intelligence and Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15030-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,7]],"date-time":"2022-12-07T10:11:37Z","timestamp":1670407897000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15030-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,1]]},"ISBN":["9783031150296","9783031150302"],"references-count":93,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15030-2_6","relation":{},"subject":[],"published":{"date-parts":[[2022,8,1]]},"assertion":[{"value":"1 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}