Using Machine Learning Algorithms and Honeypot Systems to Detect Adversarial Attacks on Intrusion Detection Systems
Crossref DOI link: https://doi.org/10.3103/S014641162470086X
Published Online: 2025-03-14
Published Print: 2024-12
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Yugai, P. E.
Moskvin, D. A.
Text and Data Mining valid from 2024-12-01
Version of Record valid from 2024-12-01
Article History
Received: 5 October 2023
Revised: 26 October 2023
Accepted: 31 October 2023
First Online: 14 March 2025
CONFLICT OF INTEREST
: The authors of this work declare that they have no conflicts of interest.