Search dblp for Publications

export results for "toc:db/conf/ccs/aisec2008.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ccs/BarrenoBCJNRST08,
  author       = {Marco Barreno and
                  Peter L. Bartlett and
                  Fuching Jack Chi and
                  Anthony D. Joseph and
                  Blaine Nelson and
                  Benjamin I. P. Rubinstein and
                  Udam Saini and
                  J. Doug Tygar},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Open problems in the security of learning},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {19--26},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456377.1456382},
  doi          = {10.1145/1456377.1456382},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BarrenoBCJNRST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BerralPAGTP08,
  author       = {Josep Lluis Berral and
                  Nicol{\'{a}}s Poggi and
                  Javier Alonso and
                  Ricard Gavald{\`{a}} and
                  Jordi Torres and
                  Manish Parashar},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Adaptive distributed mechanism against flooding network attacks based
                  on machine learning},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {43--50},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456377.1456389},
  doi          = {10.1145/1456377.1456389},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BerralPAGTP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChatterjeeAP08,
  author       = {Krishnendu Chatterjee and
                  Luca de Alfaro and
                  Ian Pye},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Robust content-driven reputation},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {33--42},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456377.1456387},
  doi          = {10.1145/1456377.1456387},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChatterjeeAP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Clifton08,
  author       = {Christopher W. Clifton},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Opportunities for private and secure machine learning},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {31--32},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456377.1456385},
  doi          = {10.1145/1456377.1456385},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Clifton08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DaherC08,
  author       = {Waseem Daher and
                  Ran Canetti},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {{POSH:} a generalized captcha with security applications},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456377.1456379},
  doi          = {10.1145/1456377.1456379},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DaherC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GreenstadtB08,
  author       = {Rachel Greenstadt and
                  Jacob Beal},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Cognitive security for personal devices},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {27--30},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456377.1456383},
  doi          = {10.1145/1456377.1456383},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GreenstadtB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KelleyDSC08,
  author       = {Patrick Gage Kelley and
                  Paul Hankes Drielsma and
                  Norman M. Sadeh and
                  Lorrie Faith Cranor},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {User-controllable learning of security and privacy policies},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {11--18},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456377.1456380},
  doi          = {10.1145/1456377.1456380},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KelleyDSC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KloftBDGL08,
  author       = {Marius Kloft and
                  Ulf Brefeld and
                  Patrick D{\"{u}}ssel and
                  Christian Gehl and
                  Pavel Laskov},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Automatic feature selection for anomaly detection},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {71--76},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456377.1456395},
  doi          = {10.1145/1456377.1456395},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KloftBDGL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Landwehr08,
  author       = {Carl E. Landwehr},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Cyber security and artificial intelligence: from fixing the plumbing
                  to smart water},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {51--52},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456377.1456391},
  doi          = {10.1145/1456377.1456391},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Landwehr08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhouI08,
  author       = {Yan Zhou and
                  W. Meador Inge},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Malware detection using adaptive data compression},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {53--60},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456377.1456393},
  doi          = {10.1145/1456377.1456393},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhouI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZurutuzaUZ08,
  author       = {Urko Zurutuza and
                  Roberto Uribeetxeberria and
                  Diego Zamboni},
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {A data mining approach for analysis of worm activity through automatic
                  signature generation},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {61--70},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456377.1456394},
  doi          = {10.1145/1456377.1456394},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZurutuzaUZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2008aisec,
  editor       = {Dirk Balfanz and
                  Jessica Staddon},
  title        = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2008, Alexandria, VA, USA, October 27, 2008},
  publisher    = {{ACM}},
  year         = {2008},
  isbn         = {978-1-60558-291-7},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2008aisec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics