Search dblp for Publications

export results for "toc:db/conf/ccs/aisec2013.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ccs/BiggioPBAPR13,
  author    = {Battista Biggio and
               Ignazio Pillai and
               Samuel Rota Bul{\`{o}} and
               Davide Ariu and
               Marcello Pelillo and
               Fabio Roli},
  editor    = {Ahmad{-}Reza Sadeghi and
               Blaine Nelson and
               Christos Dimitrakakis and
               Elaine Shi},
  title     = {Is data clustering in adversarial settings secure?},
  booktitle = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
               and Security, Co-located with {CCS} 2013, Berlin, Germany, November
               4, 2013},
  pages     = {87--98},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2517312.2517321},
  doi       = {10.1145/2517312.2517321},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/BiggioPBAPR13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BlockiBD13,
  author    = {Jeremiah Blocki and
               Manuel Blum and
               Anupam Datta},
  editor    = {Ahmad{-}Reza Sadeghi and
               Blaine Nelson and
               Christos Dimitrakakis and
               Elaine Shi},
  title     = {{GOTCHA} password hackers!},
  booktitle = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
               and Security, Co-located with {CCS} 2013, Berlin, Germany, November
               4, 2013},
  pages     = {25--34},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2517312.2517319},
  doi       = {10.1145/2517312.2517319},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/BlockiBD13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Freeman13,
  author    = {David Mandell Freeman},
  editor    = {Ahmad{-}Reza Sadeghi and
               Blaine Nelson and
               Christos Dimitrakakis and
               Elaine Shi},
  title     = {Using naive bayes to detect spammy names in social networks},
  booktitle = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
               and Security, Co-located with {CCS} 2013, Berlin, Germany, November
               4, 2013},
  pages     = {3--12},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2517312.2517314},
  doi       = {10.1145/2517312.2517314},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/Freeman13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GasconYAR13,
  author    = {Hugo Gascon and
               Fabian Yamaguchi and
               Daniel Arp and
               Konrad Rieck},
  editor    = {Ahmad{-}Reza Sadeghi and
               Blaine Nelson and
               Christos Dimitrakakis and
               Elaine Shi},
  title     = {Structural detection of android malware using embedded call graphs},
  booktitle = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
               and Security, Co-located with {CCS} 2013, Berlin, Germany, November
               4, 2013},
  pages     = {45--54},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2517312.2517315},
  doi       = {10.1145/2517312.2517315},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/GasconYAR13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KantchelianAHIMTGJT13,
  author    = {Alex Kantchelian and
               Sadia Afroz and
               Ling Huang and
               Aylin Caliskan Islam and
               Brad Miller and
               Michael Carl Tschantz and
               Rachel Greenstadt and
               Anthony D. Joseph and
               J. D. Tygar},
  editor    = {Ahmad{-}Reza Sadeghi and
               Blaine Nelson and
               Christos Dimitrakakis and
               Elaine Shi},
  title     = {Approaches to adversarial drift},
  booktitle = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
               and Security, Co-located with {CCS} 2013, Berlin, Germany, November
               4, 2013},
  pages     = {99--110},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2517312.2517320},
  doi       = {10.1145/2517312.2517320},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ccs/KantchelianAHIMTGJT13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LeontjevaGXYA13,
  author    = {Anna Leontjeva and
               Mois{\'{e}}s Goldszmidt and
               Yinglian Xie and
               Fang Yu and
               Mart{\'{\i}}n Abadi},
  editor    = {Ahmad{-}Reza Sadeghi and
               Blaine Nelson and
               Christos Dimitrakakis and
               Elaine Shi},
  title     = {Early security classification of skype users via machine learning},
  booktitle = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
               and Security, Co-located with {CCS} 2013, Berlin, Germany, November
               4, 2013},
  pages     = {35--44},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2517312.2517322},
  doi       = {10.1145/2517312.2517322},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/LeontjevaGXYA13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MenahemEAN13,
  author    = {Eitan Menahem and
               Yuval Elovici and
               Nir Amar and
               Gabi Nakibly},
  editor    = {Ahmad{-}Reza Sadeghi and
               Blaine Nelson and
               Christos Dimitrakakis and
               Elaine Shi},
  title     = {{ACTIDS:} an active strategy for detecting and localizing network
               attacks},
  booktitle = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
               and Security, Co-located with {CCS} 2013, Berlin, Germany, November
               4, 2013},
  pages     = {55--66},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2517312.2517323},
  doi       = {10.1145/2517312.2517323},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/MenahemEAN13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Rieck13,
  author    = {Konrad Rieck},
  editor    = {Ahmad{-}Reza Sadeghi and
               Blaine Nelson and
               Christos Dimitrakakis and
               Elaine Shi},
  title     = {Off the beaten path: machine learning for offensive security},
  booktitle = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
               and Security, Co-located with {CCS} 2013, Berlin, Germany, November
               4, 2013},
  pages     = {1--2},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2517312.2517313},
  doi       = {10.1145/2517312.2517313},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/Rieck13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SinhaLB13,
  author    = {Arunesh Sinha and
               Yan Li and
               Lujo Bauer},
  editor    = {Ahmad{-}Reza Sadeghi and
               Blaine Nelson and
               Christos Dimitrakakis and
               Elaine Shi},
  title     = {What you want is not what you get: predicting sharing policies for
               text-based content on facebook},
  booktitle = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
               and Security, Co-located with {CCS} 2013, Berlin, Germany, November
               4, 2013},
  pages     = {13--24},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2517312.2517317},
  doi       = {10.1145/2517312.2517317},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/SinhaLB13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/StevensL13,
  author    = {David Stevens and
               Daniel Lowd},
  editor    = {Ahmad{-}Reza Sadeghi and
               Blaine Nelson and
               Christos Dimitrakakis and
               Elaine Shi},
  title     = {On the hardness of evading combinations of linear classifiers},
  booktitle = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
               and Security, Co-located with {CCS} 2013, Berlin, Germany, November
               4, 2013},
  pages     = {77--86},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2517312.2517318},
  doi       = {10.1145/2517312.2517318},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/StevensL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WressneggerSAR13,
  author    = {Christian Wressnegger and
               Guido Schwenk and
               Daniel Arp and
               Konrad Rieck},
  editor    = {Ahmad{-}Reza Sadeghi and
               Blaine Nelson and
               Christos Dimitrakakis and
               Elaine Shi},
  title     = {A close look on \emph{n}-grams in intrusion detection: anomaly detection
               vs. classification},
  booktitle = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
               and Security, Co-located with {CCS} 2013, Berlin, Germany, November
               4, 2013},
  pages     = {67--76},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2517312.2517316},
  doi       = {10.1145/2517312.2517316},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/WressneggerSAR13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2013aisec,
  editor    = {Ahmad{-}Reza Sadeghi and
               Blaine Nelson and
               Christos Dimitrakakis and
               Elaine Shi},
  title     = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence
               and Security, Co-located with {CCS} 2013, Berlin, Germany, November
               4, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2517312},
  isbn      = {978-1-4503-2488-5},
  timestamp = {Mon, 13 Jan 2014 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/2013aisec.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics