pith. sign in

A systematic literature review on advanced persistent threat behaviors and its detec- tion strategy.Journal of Cybersecurity, 10(1):tyad023, January 2024

1 Pith paper cite this work. Polarity classification is still indexing.

1 Pith paper citing it

fields

cs.CR 1

years

2026 1

verdicts

UNVERDICTED 1

representative citing papers

The Role of Learning in Attacking ML-based Network Intrusion Detection

cs.CR · 2026-02-10 · unverdicted · novelty 6.0

Reinforcement learning agents achieve up to 58.1% attack success on ML network intrusion detectors at 0.31 ms per attack, delivering over 1000X higher throughput than gradient-based methods while working directly on non-differentiable models.

citing papers explorer

Showing 1 of 1 citing paper.

  • The Role of Learning in Attacking ML-based Network Intrusion Detection cs.CR · 2026-02-10 · unverdicted · none · ref 7

    Reinforcement learning agents achieve up to 58.1% attack success on ML network intrusion detectors at 0.31 ms per attack, delivering over 1000X higher throughput than gradient-based methods while working directly on non-differentiable models.