|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 71 occurrences of 40 keywords
|
|
|
Results
Found 75 publication records. Showing 75 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Arunesh Sinha, Yan Li 0075, Lujo Bauer |
What you want is not what you get: predicting sharing policies for text-based content on facebook. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: AISec'13, Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Co-located with CCS 2013, Berlin, Germany, November 4, 2013, pp. 13-24, 2013, ACM, 978-1-4503-2488-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Battista Biggio, Ignazio Pillai, Samuel Rota Bulò, Davide Ariu, Marcello Pelillo, Fabio Roli |
Is data clustering in adversarial settings secure? ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: AISec'13, Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Co-located with CCS 2013, Berlin, Germany, November 4, 2013, pp. 87-98, 2013, ACM, 978-1-4503-2488-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hugo Gascon, Fabian Yamaguchi, Daniel Arp, Konrad Rieck |
Structural detection of android malware using embedded call graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: AISec'13, Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Co-located with CCS 2013, Berlin, Germany, November 4, 2013, pp. 45-54, 2013, ACM, 978-1-4503-2488-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Konrad Rieck |
Off the beaten path: machine learning for offensive security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: AISec'13, Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Co-located with CCS 2013, Berlin, Germany, November 4, 2013, pp. 1-2, 2013, ACM, 978-1-4503-2488-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | David Stevens, Daniel Lowd |
On the hardness of evading combinations of linear classifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: AISec'13, Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Co-located with CCS 2013, Berlin, Germany, November 4, 2013, pp. 77-86, 2013, ACM, 978-1-4503-2488-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jeremiah Blocki, Manuel Blum 0001, Anupam Datta |
GOTCHA password hackers! ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: AISec'13, Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Co-located with CCS 2013, Berlin, Germany, November 4, 2013, pp. 25-34, 2013, ACM, 978-1-4503-2488-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Eitan Menahem, Yuval Elovici, Nir Amar, Gabi Nakibly |
ACTIDS: an active strategy for detecting and localizing network attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: AISec'13, Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Co-located with CCS 2013, Berlin, Germany, November 4, 2013, pp. 55-66, 2013, ACM, 978-1-4503-2488-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Christian Wressnegger, Guido Schwenk, Daniel Arp, Konrad Rieck |
A close look on n-grams in intrusion detection: anomaly detection vs. classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: AISec'13, Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Co-located with CCS 2013, Berlin, Germany, November 4, 2013, pp. 67-76, 2013, ACM, 978-1-4503-2488-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad-Reza Sadeghi, Blaine Nelson, Christos Dimitrakakis, Elaine Shi (eds.) |
AISec'13, Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Co-located with CCS 2013, Berlin, Germany, November 4, 2013 ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![ACM, 978-1-4503-2488-5 The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
1 | Alex Kantchelian, Sadia Afroz 0001, Ling Huang, Aylin Caliskan Islam, Brad Miller, Michael Carl Tschantz, Rachel Greenstadt, Anthony D. Joseph, J. D. Tygar |
Approaches to adversarial drift. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: AISec'13, Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Co-located with CCS 2013, Berlin, Germany, November 4, 2013, pp. 99-110, 2013, ACM, 978-1-4503-2488-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Anna Leontjeva, Moisés Goldszmidt, Yinglian Xie, Fang Yu 0002, Martín Abadi |
Early security classification of skype users via machine learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: AISec'13, Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Co-located with CCS 2013, Berlin, Germany, November 4, 2013, pp. 35-44, 2013, ACM, 978-1-4503-2488-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | David Mandell Freeman |
Using naive bayes to detect spammy names in social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: AISec'13, Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Co-located with CCS 2013, Berlin, Germany, November 4, 2013, pp. 3-12, 2013, ACM, 978-1-4503-2488-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Blake Anderson, Curtis B. Storlie, Terran Lane |
Improving malware classification: bridging the static/dynamic gap. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012, pp. 3-14, 2012, ACM, 978-1-4503-1664-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Guofei Gu |
Machine learning meets social networking security: detecting and analyzing malicious social networks for fun and profit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012, pp. 1-2, 2012, ACM, 978-1-4503-1664-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jung-Wei Chou, Shou-De Lin, Chen-Mou Cheng |
On the effectiveness of using state-of-the-art machine learning techniques to launch cryptographic distinguishing attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012, pp. 105-110, 2012, ACM, 978-1-4503-1664-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Alex Kantchelian, Justin Ma, Ling Huang, Sadia Afroz 0001, Anthony D. Joseph, J. D. Tygar |
Robust detection of comment spam using entropy rate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012, pp. 59-70, 2012, ACM, 978-1-4503-1664-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Christopher T. Symons, Justin M. Beaver |
Nonparametric semi-supervised learning for network intrusion detection: combining performance improvements with realistic in-situ training. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012, pp. 49-58, 2012, ACM, 978-1-4503-1664-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ting Yu 0001, V. N. Venkatakrishan, Apu Kapadia (eds.) |
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012 ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![ACM, 978-1-4503-1664-4 The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Tammo Krueger, Hugo Gascon, Nicole Krämer 0002, Konrad Rieck |
Learning stateful models for network honeypots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012, pp. 37-48, 2012, ACM, 978-1-4503-1664-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yukiko Sawaya, Ayumu Kubota, Akira Yamada 0001 |
Understanding the time-series behavioral characteristics of evolutionally advanced email spammers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012, pp. 71-80, 2012, ACM, 978-1-4503-1664-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Guido Schwenk, Alexander Bikadorov, Tammo Krueger, Konrad Rieck |
Autonomous learning for detection of JavaScript attacks: vision or reality? ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012, pp. 93-104, 2012, ACM, 978-1-4503-1664-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Hoi Le Thi, Reihaneh Safavi-Naini |
An information theoretic framework for web inference detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012, pp. 25-36, 2012, ACM, 978-1-4503-1664-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Anshuman Singh, Andrew Walenstein, Arun Lakhotia |
Tracking concept drift in malware families. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012, pp. 81-92, 2012, ACM, 978-1-4503-1664-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kristof Schütt, Marius Kloft, Alexander Bikadorov, Konrad Rieck |
Early detection of malicious behavior in JavaScript code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012, pp. 15-24, 2012, ACM, 978-1-4503-1664-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sandeep Karanth, Srivatsan Laxman, Prasad Naldurg, Ramarathnam Venkatesan, John Lambert, Jinwook Shin |
ZDVUE: prioritization of javascript attacks to discover new vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011, pp. 31-42, 2011, ACM, 978-1-4503-1003-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Meltem Sönmez Turan |
Evolutionary construction of de bruijn sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011, pp. 81-86, 2011, ACM, 978-1-4503-1003-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Davide Ariu, Giorgio Giacinto, Fabio Roli |
Machine learning in computer forensics (and the lessons learned from machine learning in computer security). ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011, pp. 99-104, 2011, ACM, 978-1-4503-1003-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Benoit Morel |
Artificial intelligence and the future of cybersecurity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011, pp. 93-98, 2011, ACM, 978-1-4503-1003-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Qifan Wang, Luo Si |
A robust one-class bayesian approach for masquerade detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011, pp. 111-112, 2011, ACM, 978-1-4503-1003-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Do-kyum Kim, Marti Motoyama, Geoffrey M. Voelker, Lawrence K. Saul |
Topic modeling of freelance job postings to monitor web service abuse. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011, pp. 11-20, 2011, ACM, 978-1-4503-1003-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sajad Shirali-Shahreza, Mohammad Hassan Shirali-Shahreza |
Categorizing CAPTCHA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011, pp. 107-108, 2011, ACM, 978-1-4503-1003-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sajad Shirali-Shahreza, Mohammad Hassan Shirali-Shahreza |
Accessibility of CAPTCHA methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011, pp. 109-110, 2011, ACM, 978-1-4503-1003-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Lakshmanan Nataraj, Vinod Yegneswaran, Phillip A. Porras, Jian Zhang 0004 |
A comparative assessment of malware classification using binary texture analysis and dynamic analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011, pp. 21-30, 2011, ACM, 978-1-4503-1003-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Anshuman Singh, Sumi Singh, Andrew Walenstein, Arun Lakhotia |
On deployable adversarial classification models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011, pp. 113-114, 2011, ACM, 978-1-4503-1003-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sushma Nagesh Bannur, Lawrence K. Saul, Stefan Savage |
Judging a site by its content: learning the textual, structural, and visual features of malicious web pages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011, pp. 1-10, 2011, ACM, 978-1-4503-1003-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Loai Zomlot, Sathya Chandran Sundaramurthy, Kui Luo, Xinming Ou, Siva Raj Rajagopalan |
Prioritizing intrusion analysis using Dempster-Shafer theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011, pp. 59-70, 2011, ACM, 978-1-4503-1003-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yan Chen, Alvaro A. Cárdenas, Rachel Greenstadt, Benjamin I. P. Rubinstein (eds.) |
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011 ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![ACM, 978-1-4503-1003-1 The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Blaine Nelson, Battista Biggio, Pavel Laskov |
Understanding the risk factors of learning in adversarial environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011, pp. 87-92, 2011, ACM, 978-1-4503-1003-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Carlos Sarraute, Gerardo Richarte, Jorge Lucángeli Obes |
An algorithm to find optimal attack paths in nondeterministic scenarios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011, pp. 71-80, 2011, ACM, 978-1-4503-1003-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | David A. Cock |
Exploitation as an inference problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011, pp. 105-106, 2011, ACM, 978-1-4503-1003-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ling Huang, Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, J. D. Tygar |
Adversarial machine learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011, pp. 43-58, 2011, ACM, 978-1-4503-1003-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Markus Huber 0001, Martin Mulazzani, Sebastian Schrittwieser, Edgar R. Weippl |
Cheap and automated socio-technical attacks based on social networking sites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010, pp. 61-64, 2010, ACM, 978-1-4503-0088-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | David W. Richardson, Steven D. Gribble, Tadayoshi Kohno |
The limits of automatic OS fingerprint generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010, pp. 24-34, 2010, ACM, 978-1-4503-0088-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Pranav Krishnamoorthy, Matthew K. Wright |
Towards modeling the behavior of physical intruders in a region monitored by a wireless sensor network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010, pp. 1-7, 2010, ACM, 978-1-4503-0088-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jacob Beal, Jonathan Webb, Michael Atighetchi |
Adjustable autonomy for cross-domain entitlement decisions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010, pp. 65-71, 2010, ACM, 978-1-4503-0088-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Li Pu, Boi Faltings, Qiang Yang 0001, Derek Hao Hu |
Relational network-service clustering analysis with set evidences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010, pp. 35-44, 2010, ACM, 978-1-4503-0088-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zorana Bankovic, Juan Carlos Vallejo, Pedro Malagón, Álvaro Araujo, José Manuel Moya |
Eliminating routing protocol anomalies in wireless sensor networks using AI techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010, pp. 8-13, 2010, ACM, 978-1-4503-0088-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Juola, Darren Vescovi |
Empirical evaluation of authorship obfuscation using JGAAP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010, pp. 14-18, 2010, ACM, 978-1-4503-0088-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Markus Miettinen, N. Asokan |
Towards security policy decisions based on context profiling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010, pp. 19-23, 2010, ACM, 978-1-4503-0088-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Taghrid Samak, Ehab Al-Shaer |
Synthetic security policy generation via network traffic clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010, pp. 45-53, 2010, ACM, 978-1-4503-0088-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Rachel Greenstadt (eds.) |
Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010 ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![ACM, 978-1-4503-0088-9 The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Aaron Blum, Brad Wardman, Thamar Solorio, Gary Warner |
Lexical feature based phishing URL detection using online learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010, pp. 54-60, 2010, ACM, 978-1-4503-0088-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Michael E. Locasto, Salvatore J. Stolfo |
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009, pp. 39-46, 2009, ACM, 978-1-60558-781-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anomaly detection, concept drift, model update |
1 | Jessica Staddon |
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009, pp. 11-14, 2009, ACM, 978-1-60558-781-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
linkedin, data mining, privacy, social network, policy |
1 | George Danezis |
Inferring privacy policies for social networking services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009, pp. 5-10, 2009, ACM, 978-1-60558-781-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cohesive groups, privacy, social networks |
1 | Su Chang, Thomas E. Daniels |
P2P botnet detection using behavior clustering & statistical tests. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009, pp. 23-30, 2009, ACM, 978-1-60558-781-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
machine learning, network security, anomaly detection |
1 | Dirk Balfanz, Jessica Staddon (eds.) |
Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009 ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![ACM, 978-1-60558-781-3 The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
1 | Nico Görnitz, Marius Kloft, Konrad Rieck, Ulf Brefeld |
Active learning for network intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009, pp. 47-54, 2009, ACM, 978-1-60558-781-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
machine learning, intrusion detection, network security, anomaly detection, active learning, support vector data description |
1 | Rachel Greenstadt, Sadia Afroz 0001, Michael Brennan |
Mixed-initiative security agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009, pp. 35-38, 2009, ACM, 978-1-60558-781-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, artificial intelligence, mixed initiative |
1 | Faraz Ahmed, Haider Hameed, M. Zubair Shafiq, Muddassar Farooq |
Using spatio-temporal information in API calls with machine learning algorithms for malware detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009, pp. 55-62, 2009, ACM, 978-1-60558-781-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
api calls, machine learning algorithms, markov chain, malware detection |
1 | Pavel Laskov, Marius Kloft |
A framework for quantitative security analysis of machine learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009, pp. 1-4, 2009, ACM, 978-1-60558-781-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
adversarial learning, centroid anomaly detection, machine learning, intrusion detection, computer security |
1 | Tad Hogg |
Security challenges for reputation mechanisms using online social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009, pp. 31-34, 2009, ACM, 978-1-60558-781-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
social networks, reputation, user-generated content |
1 | Markus Jakobsson |
Captcha-free throttling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009, pp. 15-22, 2009, ACM, 978-1-60558-781-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cookie theft, dns poisoning, usability, access, malware, scripting, cloning, captcha, throttle |
1 | Yan Zhou, W. Meador Inge |
Malware detection using adaptive data compression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008, pp. 53-60, 2008, ACM, 978-1-60558-291-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
statistical data compression, machine learning, malware detection |
1 | Patrick Gage Kelley, Paul Hankes Drielsma, Norman M. Sadeh, Lorrie Faith Cranor |
User-controllable learning of security and privacy policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008, pp. 11-18, 2008, ACM, 978-1-60558-291-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security and privacy policies, user-controllable learning, usable security |
1 | Christopher W. Clifton |
Opportunities for private and secure machine learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008, pp. 31-32, 2008, ACM, 978-1-60558-291-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, privacy, artificial intelligence |
1 | Marius Kloft, Ulf Brefeld, Patrick Düssel, Christian Gehl, Pavel Laskov |
Automatic feature selection for anomaly detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008, pp. 71-76, 2008, ACM, 978-1-60558-291-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
machine learning, feature selection, intrusion detection, network security, anomaly detection, multiple kernel learning, support vector data description |
1 | Dirk Balfanz, Jessica Staddon (eds.) |
Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008 ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![ACM, 978-1-60558-291-7 The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
1 | Urko Zurutuza, Roberto Uribeetxeberria, Diego Zamboni |
A data mining approach for analysis of worm activity through automatic signature generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008, pp. 61-70, 2008, ACM, 978-1-60558-291-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
automatic signature generation, malware identification, data mining, intrusion detection, honeypots |
1 | Josep Lluis Berral, Nicolás Poggi, Javier Alonso 0001, Ricard Gavaldà, Jordi Torres, Manish Parashar |
Adaptive distributed mechanism against flooding network attacks based on machine learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008, pp. 43-50, 2008, ACM, 978-1-60558-291-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
DDOS, machine learning, intrusion detection, cooperative, autonomic computing, flooding attacks |
1 | Marco Barreno, Peter L. Bartlett, Fuching Jack Chi, Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, Udam Saini, J. Doug Tygar |
Open problems in the security of learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008, pp. 19-26, 2008, ACM, 978-1-60558-291-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
adversarial learning, secure learning, machine learning, computer security, security metrics |
1 | Carl E. Landwehr |
Cyber security and artificial intelligence: from fixing the plumbing to smart water. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008, pp. 51-52, 2008, ACM, 978-1-60558-291-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, privacy, artificial intelligence |
1 | Waseem Daher, Ran Canetti |
POSH: a generalized captcha with security applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008, pp. 1-10, 2008, ACM, 978-1-60558-291-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
puzzles, password security |
1 | Krishnendu Chatterjee, Luca de Alfaro, Ian Pye |
Robust content-driven reputation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008, pp. 33-42, 2008, ACM, 978-1-60558-291-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
wikipedia, reputation, user-generated content |
1 | Rachel Greenstadt, Jacob Beal |
Cognitive security for personal devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008, pp. 27-30, 2008, ACM, 978-1-60558-291-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security automation, authentication, artificial intelligence, biometrics |
Displaying result #1 - #75 of 75 (100 per page; Change: )
|
|