Security Evaluation of Adversarial Applications |
||||
|
|
||||
|
||||
BibTeX: |
||||
|
@article{IJIRSTV2I10089, |
||||
Abstract: |
||||
|
Security Evaluation system is used in adversarial applications, like biometric authentication, network intrusion detection, and spam filtering. The system is used to control physical access for high-security facilities The existing system in which data can be control by humans to execute their operation. In Adversarial Applications it prevents unauthorized person to gain access in account, system use the secure key for authentication purpose, also it only uploads the text file which are not harmful file for user account. The system scans the file and if it is harmful prevent it from uploading and send the report to system. In spam Filtering it converts all bad words into the good words. Reported results show that the system can provide a more secure platform for adversarial environments. |
||||
Keywords: |
||||
|
adversarial classification, Pattern classification, performance evaluation, robustness evaluation, security evaluation |
||||



