The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "AISec"( http://dblp.L3S.de/Venues/AISec )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ccs

Publication years (Num. hits)
2008-2009 (23) 2010-2011 (28) 2012-2013 (24)
Publication types (Num. hits)
inproceedings(69) proceedings(6)
Venues (Conferences, Journals, ...)
AISec(75)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 71 occurrences of 40 keywords

Results
Found 75 publication records. Showing 75 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Arunesh Sinha, Yan Li 0075, Lujo Bauer What you want is not what you get: predicting sharing policies for text-based content on facebook. Search on Bibsonomy AISec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Battista Biggio, Ignazio Pillai, Samuel Rota Bulò, Davide Ariu, Marcello Pelillo, Fabio Roli Is data clustering in adversarial settings secure? Search on Bibsonomy AISec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hugo Gascon, Fabian Yamaguchi, Daniel Arp, Konrad Rieck Structural detection of android malware using embedded call graphs. Search on Bibsonomy AISec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Konrad Rieck Off the beaten path: machine learning for offensive security. Search on Bibsonomy AISec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1David Stevens, Daniel Lowd On the hardness of evading combinations of linear classifiers. Search on Bibsonomy AISec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jeremiah Blocki, Manuel Blum 0001, Anupam Datta GOTCHA password hackers! Search on Bibsonomy AISec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Eitan Menahem, Yuval Elovici, Nir Amar, Gabi Nakibly ACTIDS: an active strategy for detecting and localizing network attacks. Search on Bibsonomy AISec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Christian Wressnegger, Guido Schwenk, Daniel Arp, Konrad Rieck A close look on n-grams in intrusion detection: anomaly detection vs. classification. Search on Bibsonomy AISec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ahmad-Reza Sadeghi, Blaine Nelson, Christos Dimitrakakis, Elaine Shi (eds.) AISec'13, Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Co-located with CCS 2013, Berlin, Germany, November 4, 2013 Search on Bibsonomy AISec The full citation details ... 2013 DBLP  BibTeX  RDF
1Alex Kantchelian, Sadia Afroz 0001, Ling Huang, Aylin Caliskan Islam, Brad Miller, Michael Carl Tschantz, Rachel Greenstadt, Anthony D. Joseph, J. D. Tygar Approaches to adversarial drift. Search on Bibsonomy AISec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Anna Leontjeva, Moisés Goldszmidt, Yinglian Xie, Fang Yu 0002, Martín Abadi Early security classification of skype users via machine learning. Search on Bibsonomy AISec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1David Mandell Freeman Using naive bayes to detect spammy names in social networks. Search on Bibsonomy AISec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Blake Anderson, Curtis B. Storlie, Terran Lane Improving malware classification: bridging the static/dynamic gap. Search on Bibsonomy AISec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Guofei Gu Machine learning meets social networking security: detecting and analyzing malicious social networks for fun and profit. Search on Bibsonomy AISec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jung-Wei Chou, Shou-De Lin, Chen-Mou Cheng On the effectiveness of using state-of-the-art machine learning techniques to launch cryptographic distinguishing attacks. Search on Bibsonomy AISec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Alex Kantchelian, Justin Ma, Ling Huang, Sadia Afroz 0001, Anthony D. Joseph, J. D. Tygar Robust detection of comment spam using entropy rate. Search on Bibsonomy AISec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Christopher T. Symons, Justin M. Beaver Nonparametric semi-supervised learning for network intrusion detection: combining performance improvements with realistic in-situ training. Search on Bibsonomy AISec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ting Yu 0001, V. N. Venkatakrishan, Apu Kapadia (eds.) Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012 Search on Bibsonomy AISec The full citation details ... 2012 DBLP  BibTeX  RDF
1Tammo Krueger, Hugo Gascon, Nicole Krämer 0002, Konrad Rieck Learning stateful models for network honeypots. Search on Bibsonomy AISec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yukiko Sawaya, Ayumu Kubota, Akira Yamada 0001 Understanding the time-series behavioral characteristics of evolutionally advanced email spammers. Search on Bibsonomy AISec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Guido Schwenk, Alexander Bikadorov, Tammo Krueger, Konrad Rieck Autonomous learning for detection of JavaScript attacks: vision or reality? Search on Bibsonomy AISec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hoi Le Thi, Reihaneh Safavi-Naini An information theoretic framework for web inference detection. Search on Bibsonomy AISec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Anshuman Singh, Andrew Walenstein, Arun Lakhotia Tracking concept drift in malware families. Search on Bibsonomy AISec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kristof Schütt, Marius Kloft, Alexander Bikadorov, Konrad Rieck Early detection of malicious behavior in JavaScript code. Search on Bibsonomy AISec The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sandeep Karanth, Srivatsan Laxman, Prasad Naldurg, Ramarathnam Venkatesan, John Lambert, Jinwook Shin ZDVUE: prioritization of javascript attacks to discover new vulnerabilities. Search on Bibsonomy AISec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Meltem Sönmez Turan Evolutionary construction of de bruijn sequences. Search on Bibsonomy AISec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Davide Ariu, Giorgio Giacinto, Fabio Roli Machine learning in computer forensics (and the lessons learned from machine learning in computer security). Search on Bibsonomy AISec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Benoit Morel Artificial intelligence and the future of cybersecurity. Search on Bibsonomy AISec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Qifan Wang, Luo Si A robust one-class bayesian approach for masquerade detection. Search on Bibsonomy AISec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Do-kyum Kim, Marti Motoyama, Geoffrey M. Voelker, Lawrence K. Saul Topic modeling of freelance job postings to monitor web service abuse. Search on Bibsonomy AISec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sajad Shirali-Shahreza, Mohammad Hassan Shirali-Shahreza Categorizing CAPTCHA. Search on Bibsonomy AISec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sajad Shirali-Shahreza, Mohammad Hassan Shirali-Shahreza Accessibility of CAPTCHA methods. Search on Bibsonomy AISec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Lakshmanan Nataraj, Vinod Yegneswaran, Phillip A. Porras, Jian Zhang 0004 A comparative assessment of malware classification using binary texture analysis and dynamic analysis. Search on Bibsonomy AISec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Anshuman Singh, Sumi Singh, Andrew Walenstein, Arun Lakhotia On deployable adversarial classification models. Search on Bibsonomy AISec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sushma Nagesh Bannur, Lawrence K. Saul, Stefan Savage Judging a site by its content: learning the textual, structural, and visual features of malicious web pages. Search on Bibsonomy AISec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Loai Zomlot, Sathya Chandran Sundaramurthy, Kui Luo, Xinming Ou, Siva Raj Rajagopalan Prioritizing intrusion analysis using Dempster-Shafer theory. Search on Bibsonomy AISec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yan Chen, Alvaro A. Cárdenas, Rachel Greenstadt, Benjamin I. P. Rubinstein (eds.) Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011 Search on Bibsonomy AISec The full citation details ... 2011 DBLP  BibTeX  RDF
1Blaine Nelson, Battista Biggio, Pavel Laskov Understanding the risk factors of learning in adversarial environments. Search on Bibsonomy AISec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Carlos Sarraute, Gerardo Richarte, Jorge Lucángeli Obes An algorithm to find optimal attack paths in nondeterministic scenarios. Search on Bibsonomy AISec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1David A. Cock Exploitation as an inference problem. Search on Bibsonomy AISec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ling Huang, Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, J. D. Tygar Adversarial machine learning. Search on Bibsonomy AISec The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Markus Huber 0001, Martin Mulazzani, Sebastian Schrittwieser, Edgar R. Weippl Cheap and automated socio-technical attacks based on social networking sites. Search on Bibsonomy AISec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1David W. Richardson, Steven D. Gribble, Tadayoshi Kohno The limits of automatic OS fingerprint generation. Search on Bibsonomy AISec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Pranav Krishnamoorthy, Matthew K. Wright Towards modeling the behavior of physical intruders in a region monitored by a wireless sensor network. Search on Bibsonomy AISec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jacob Beal, Jonathan Webb, Michael Atighetchi Adjustable autonomy for cross-domain entitlement decisions. Search on Bibsonomy AISec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Li Pu, Boi Faltings, Qiang Yang 0001, Derek Hao Hu Relational network-service clustering analysis with set evidences. Search on Bibsonomy AISec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Zorana Bankovic, Juan Carlos Vallejo, Pedro Malagón, Álvaro Araujo, José Manuel Moya Eliminating routing protocol anomalies in wireless sensor networks using AI techniques. Search on Bibsonomy AISec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Patrick Juola, Darren Vescovi Empirical evaluation of authorship obfuscation using JGAAP. Search on Bibsonomy AISec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Markus Miettinen, N. Asokan Towards security policy decisions based on context profiling. Search on Bibsonomy AISec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Taghrid Samak, Ehab Al-Shaer Synthetic security policy generation via network traffic clustering. Search on Bibsonomy AISec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Rachel Greenstadt (eds.) Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010 Search on Bibsonomy AISec The full citation details ... 2010 DBLP  BibTeX  RDF
1Aaron Blum, Brad Wardman, Thamar Solorio, Gary Warner Lexical feature based phishing URL detection using online learning. Search on Bibsonomy AISec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Michael E. Locasto, Salvatore J. Stolfo Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes. Search on Bibsonomy AISec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anomaly detection, concept drift, model update
1Jessica Staddon Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy. Search on Bibsonomy AISec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF linkedin, data mining, privacy, social network, policy
1George Danezis Inferring privacy policies for social networking services. Search on Bibsonomy AISec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cohesive groups, privacy, social networks
1Su Chang, Thomas E. Daniels P2P botnet detection using behavior clustering & statistical tests. Search on Bibsonomy AISec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF machine learning, network security, anomaly detection
1Dirk Balfanz, Jessica Staddon (eds.) Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009 Search on Bibsonomy AISec The full citation details ... 2009 DBLP  BibTeX  RDF
1Nico Görnitz, Marius Kloft, Konrad Rieck, Ulf Brefeld Active learning for network intrusion detection. Search on Bibsonomy AISec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF machine learning, intrusion detection, network security, anomaly detection, active learning, support vector data description
1Rachel Greenstadt, Sadia Afroz 0001, Michael Brennan Mixed-initiative security agents. Search on Bibsonomy AISec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, artificial intelligence, mixed initiative
1Faraz Ahmed, Haider Hameed, M. Zubair Shafiq, Muddassar Farooq Using spatio-temporal information in API calls with machine learning algorithms for malware detection. Search on Bibsonomy AISec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF api calls, machine learning algorithms, markov chain, malware detection
1Pavel Laskov, Marius Kloft A framework for quantitative security analysis of machine learning. Search on Bibsonomy AISec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF adversarial learning, centroid anomaly detection, machine learning, intrusion detection, computer security
1Tad Hogg Security challenges for reputation mechanisms using online social networks. Search on Bibsonomy AISec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF social networks, reputation, user-generated content
1Markus Jakobsson Captcha-free throttling. Search on Bibsonomy AISec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cookie theft, dns poisoning, usability, access, malware, scripting, cloning, captcha, throttle
1Yan Zhou, W. Meador Inge Malware detection using adaptive data compression. Search on Bibsonomy AISec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF statistical data compression, machine learning, malware detection
1Patrick Gage Kelley, Paul Hankes Drielsma, Norman M. Sadeh, Lorrie Faith Cranor User-controllable learning of security and privacy policies. Search on Bibsonomy AISec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security and privacy policies, user-controllable learning, usable security
1Christopher W. Clifton Opportunities for private and secure machine learning. Search on Bibsonomy AISec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, privacy, artificial intelligence
1Marius Kloft, Ulf Brefeld, Patrick Düssel, Christian Gehl, Pavel Laskov Automatic feature selection for anomaly detection. Search on Bibsonomy AISec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF machine learning, feature selection, intrusion detection, network security, anomaly detection, multiple kernel learning, support vector data description
1Dirk Balfanz, Jessica Staddon (eds.) Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008 Search on Bibsonomy AISec The full citation details ... 2008 DBLP  BibTeX  RDF
1Urko Zurutuza, Roberto Uribeetxeberria, Diego Zamboni A data mining approach for analysis of worm activity through automatic signature generation. Search on Bibsonomy AISec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF automatic signature generation, malware identification, data mining, intrusion detection, honeypots
1Josep Lluis Berral, Nicolás Poggi, Javier Alonso 0001, Ricard Gavaldà, Jordi Torres, Manish Parashar Adaptive distributed mechanism against flooding network attacks based on machine learning. Search on Bibsonomy AISec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF DDOS, machine learning, intrusion detection, cooperative, autonomic computing, flooding attacks
1Marco Barreno, Peter L. Bartlett, Fuching Jack Chi, Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, Udam Saini, J. Doug Tygar Open problems in the security of learning. Search on Bibsonomy AISec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF adversarial learning, secure learning, machine learning, computer security, security metrics
1Carl E. Landwehr Cyber security and artificial intelligence: from fixing the plumbing to smart water. Search on Bibsonomy AISec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, privacy, artificial intelligence
1Waseem Daher, Ran Canetti POSH: a generalized captcha with security applications. Search on Bibsonomy AISec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF puzzles, password security
1Krishnendu Chatterjee, Luca de Alfaro, Ian Pye Robust content-driven reputation. Search on Bibsonomy AISec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF wikipedia, reputation, user-generated content
1Rachel Greenstadt, Jacob Beal Cognitive security for personal devices. Search on Bibsonomy AISec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security automation, authentication, artificial intelligence, biometrics
Displaying result #1 - #75 of 75 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license