Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/aisec2008.bht:"
@inproceedings{DBLP:conf/ccs/BarrenoBCJNRST08, author = {Marco Barreno and Peter L. Bartlett and Fuching Jack Chi and Anthony D. Joseph and Blaine Nelson and Benjamin I. P. Rubinstein and Udam Saini and J. Doug Tygar}, editor = {Dirk Balfanz and Jessica Staddon}, title = {Open problems in the security of learning}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008}, pages = {19--26}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456377.1456382}, doi = {10.1145/1456377.1456382}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BarrenoBCJNRST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BerralPAGTP08, author = {Josep Lluis Berral and Nicol{\'{a}}s Poggi and Javier Alonso and Ricard Gavald{\`{a}} and Jordi Torres and Manish Parashar}, editor = {Dirk Balfanz and Jessica Staddon}, title = {Adaptive distributed mechanism against flooding network attacks based on machine learning}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008}, pages = {43--50}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456377.1456389}, doi = {10.1145/1456377.1456389}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BerralPAGTP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChatterjeeAP08, author = {Krishnendu Chatterjee and Luca de Alfaro and Ian Pye}, editor = {Dirk Balfanz and Jessica Staddon}, title = {Robust content-driven reputation}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008}, pages = {33--42}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456377.1456387}, doi = {10.1145/1456377.1456387}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChatterjeeAP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Clifton08, author = {Christopher W. Clifton}, editor = {Dirk Balfanz and Jessica Staddon}, title = {Opportunities for private and secure machine learning}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008}, pages = {31--32}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456377.1456385}, doi = {10.1145/1456377.1456385}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Clifton08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DaherC08, author = {Waseem Daher and Ran Canetti}, editor = {Dirk Balfanz and Jessica Staddon}, title = {{POSH:} a generalized captcha with security applications}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008}, pages = {1--10}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456377.1456379}, doi = {10.1145/1456377.1456379}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DaherC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GreenstadtB08, author = {Rachel Greenstadt and Jacob Beal}, editor = {Dirk Balfanz and Jessica Staddon}, title = {Cognitive security for personal devices}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008}, pages = {27--30}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456377.1456383}, doi = {10.1145/1456377.1456383}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GreenstadtB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KelleyDSC08, author = {Patrick Gage Kelley and Paul Hankes Drielsma and Norman M. Sadeh and Lorrie Faith Cranor}, editor = {Dirk Balfanz and Jessica Staddon}, title = {User-controllable learning of security and privacy policies}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008}, pages = {11--18}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456377.1456380}, doi = {10.1145/1456377.1456380}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KelleyDSC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KloftBDGL08, author = {Marius Kloft and Ulf Brefeld and Patrick D{\"{u}}ssel and Christian Gehl and Pavel Laskov}, editor = {Dirk Balfanz and Jessica Staddon}, title = {Automatic feature selection for anomaly detection}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008}, pages = {71--76}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456377.1456395}, doi = {10.1145/1456377.1456395}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KloftBDGL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Landwehr08, author = {Carl E. Landwehr}, editor = {Dirk Balfanz and Jessica Staddon}, title = {Cyber security and artificial intelligence: from fixing the plumbing to smart water}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008}, pages = {51--52}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456377.1456391}, doi = {10.1145/1456377.1456391}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Landwehr08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhouI08, author = {Yan Zhou and W. Meador Inge}, editor = {Dirk Balfanz and Jessica Staddon}, title = {Malware detection using adaptive data compression}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008}, pages = {53--60}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456377.1456393}, doi = {10.1145/1456377.1456393}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhouI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZurutuzaUZ08, author = {Urko Zurutuza and Roberto Uribeetxeberria and Diego Zamboni}, editor = {Dirk Balfanz and Jessica Staddon}, title = {A data mining approach for analysis of worm activity through automatic signature generation}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008}, pages = {61--70}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456377.1456394}, doi = {10.1145/1456377.1456394}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZurutuzaUZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2008aisec, editor = {Dirk Balfanz and Jessica Staddon}, title = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008}, publisher = {{ACM}}, year = {2008}, isbn = {978-1-60558-291-7}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2008aisec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.