|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 71 occurrences of 40 keywords
|
|
|
Results
Found 75 publication records. Showing 75 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Arunesh Sinha, Yan Li 0075, Lujo Bauer |
What you want is not what you get: predicting sharing policies for text-based content on facebook. |
AISec |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Battista Biggio, Ignazio Pillai, Samuel Rota Bulò, Davide Ariu, Marcello Pelillo, Fabio Roli |
Is data clustering in adversarial settings secure? |
AISec |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hugo Gascon, Fabian Yamaguchi, Daniel Arp, Konrad Rieck |
Structural detection of android malware using embedded call graphs. |
AISec |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Konrad Rieck |
Off the beaten path: machine learning for offensive security. |
AISec |
2013 |
DBLP DOI BibTeX RDF |
|
1 | David Stevens, Daniel Lowd |
On the hardness of evading combinations of linear classifiers. |
AISec |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jeremiah Blocki, Manuel Blum 0001, Anupam Datta |
GOTCHA password hackers! |
AISec |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Eitan Menahem, Yuval Elovici, Nir Amar, Gabi Nakibly |
ACTIDS: an active strategy for detecting and localizing network attacks. |
AISec |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Christian Wressnegger, Guido Schwenk, Daniel Arp, Konrad Rieck |
A close look on n-grams in intrusion detection: anomaly detection vs. classification. |
AISec |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad-Reza Sadeghi, Blaine Nelson, Christos Dimitrakakis, Elaine Shi (eds.) |
AISec'13, Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Co-located with CCS 2013, Berlin, Germany, November 4, 2013 |
AISec |
2013 |
DBLP BibTeX RDF |
|
1 | Alex Kantchelian, Sadia Afroz 0001, Ling Huang, Aylin Caliskan Islam, Brad Miller, Michael Carl Tschantz, Rachel Greenstadt, Anthony D. Joseph, J. D. Tygar |
Approaches to adversarial drift. |
AISec |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Anna Leontjeva, Moisés Goldszmidt, Yinglian Xie, Fang Yu 0002, Martín Abadi |
Early security classification of skype users via machine learning. |
AISec |
2013 |
DBLP DOI BibTeX RDF |
|
1 | David Mandell Freeman |
Using naive bayes to detect spammy names in social networks. |
AISec |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Blake Anderson, Curtis B. Storlie, Terran Lane |
Improving malware classification: bridging the static/dynamic gap. |
AISec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Guofei Gu |
Machine learning meets social networking security: detecting and analyzing malicious social networks for fun and profit. |
AISec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jung-Wei Chou, Shou-De Lin, Chen-Mou Cheng |
On the effectiveness of using state-of-the-art machine learning techniques to launch cryptographic distinguishing attacks. |
AISec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Alex Kantchelian, Justin Ma, Ling Huang, Sadia Afroz 0001, Anthony D. Joseph, J. D. Tygar |
Robust detection of comment spam using entropy rate. |
AISec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Christopher T. Symons, Justin M. Beaver |
Nonparametric semi-supervised learning for network intrusion detection: combining performance improvements with realistic in-situ training. |
AISec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ting Yu 0001, V. N. Venkatakrishan, Apu Kapadia (eds.) |
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012 |
AISec |
2012 |
DBLP BibTeX RDF |
|
1 | Tammo Krueger, Hugo Gascon, Nicole Krämer 0002, Konrad Rieck |
Learning stateful models for network honeypots. |
AISec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yukiko Sawaya, Ayumu Kubota, Akira Yamada 0001 |
Understanding the time-series behavioral characteristics of evolutionally advanced email spammers. |
AISec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Guido Schwenk, Alexander Bikadorov, Tammo Krueger, Konrad Rieck |
Autonomous learning for detection of JavaScript attacks: vision or reality? |
AISec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Hoi Le Thi, Reihaneh Safavi-Naini |
An information theoretic framework for web inference detection. |
AISec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Anshuman Singh, Andrew Walenstein, Arun Lakhotia |
Tracking concept drift in malware families. |
AISec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kristof Schütt, Marius Kloft, Alexander Bikadorov, Konrad Rieck |
Early detection of malicious behavior in JavaScript code. |
AISec |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sandeep Karanth, Srivatsan Laxman, Prasad Naldurg, Ramarathnam Venkatesan, John Lambert, Jinwook Shin |
ZDVUE: prioritization of javascript attacks to discover new vulnerabilities. |
AISec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Meltem Sönmez Turan |
Evolutionary construction of de bruijn sequences. |
AISec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Davide Ariu, Giorgio Giacinto, Fabio Roli |
Machine learning in computer forensics (and the lessons learned from machine learning in computer security). |
AISec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Benoit Morel |
Artificial intelligence and the future of cybersecurity. |
AISec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Qifan Wang, Luo Si |
A robust one-class bayesian approach for masquerade detection. |
AISec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Do-kyum Kim, Marti Motoyama, Geoffrey M. Voelker, Lawrence K. Saul |
Topic modeling of freelance job postings to monitor web service abuse. |
AISec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sajad Shirali-Shahreza, Mohammad Hassan Shirali-Shahreza |
Categorizing CAPTCHA. |
AISec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sajad Shirali-Shahreza, Mohammad Hassan Shirali-Shahreza |
Accessibility of CAPTCHA methods. |
AISec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Lakshmanan Nataraj, Vinod Yegneswaran, Phillip A. Porras, Jian Zhang 0004 |
A comparative assessment of malware classification using binary texture analysis and dynamic analysis. |
AISec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Anshuman Singh, Sumi Singh, Andrew Walenstein, Arun Lakhotia |
On deployable adversarial classification models. |
AISec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sushma Nagesh Bannur, Lawrence K. Saul, Stefan Savage |
Judging a site by its content: learning the textual, structural, and visual features of malicious web pages. |
AISec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Loai Zomlot, Sathya Chandran Sundaramurthy, Kui Luo, Xinming Ou, Siva Raj Rajagopalan |
Prioritizing intrusion analysis using Dempster-Shafer theory. |
AISec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yan Chen, Alvaro A. Cárdenas, Rachel Greenstadt, Benjamin I. P. Rubinstein (eds.) |
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011 |
AISec |
2011 |
DBLP BibTeX RDF |
|
1 | Blaine Nelson, Battista Biggio, Pavel Laskov |
Understanding the risk factors of learning in adversarial environments. |
AISec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Carlos Sarraute, Gerardo Richarte, Jorge Lucángeli Obes |
An algorithm to find optimal attack paths in nondeterministic scenarios. |
AISec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | David A. Cock |
Exploitation as an inference problem. |
AISec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ling Huang, Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, J. D. Tygar |
Adversarial machine learning. |
AISec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Markus Huber 0001, Martin Mulazzani, Sebastian Schrittwieser, Edgar R. Weippl |
Cheap and automated socio-technical attacks based on social networking sites. |
AISec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | David W. Richardson, Steven D. Gribble, Tadayoshi Kohno |
The limits of automatic OS fingerprint generation. |
AISec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Pranav Krishnamoorthy, Matthew K. Wright |
Towards modeling the behavior of physical intruders in a region monitored by a wireless sensor network. |
AISec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jacob Beal, Jonathan Webb, Michael Atighetchi |
Adjustable autonomy for cross-domain entitlement decisions. |
AISec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Li Pu, Boi Faltings, Qiang Yang 0001, Derek Hao Hu |
Relational network-service clustering analysis with set evidences. |
AISec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zorana Bankovic, Juan Carlos Vallejo, Pedro Malagón, Álvaro Araujo, José Manuel Moya |
Eliminating routing protocol anomalies in wireless sensor networks using AI techniques. |
AISec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Juola, Darren Vescovi |
Empirical evaluation of authorship obfuscation using JGAAP. |
AISec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Markus Miettinen, N. Asokan |
Towards security policy decisions based on context profiling. |
AISec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Taghrid Samak, Ehab Al-Shaer |
Synthetic security policy generation via network traffic clustering. |
AISec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Rachel Greenstadt (eds.) |
Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010 |
AISec |
2010 |
DBLP BibTeX RDF |
|
1 | Aaron Blum, Brad Wardman, Thamar Solorio, Gary Warner |
Lexical feature based phishing URL detection using online learning. |
AISec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Michael E. Locasto, Salvatore J. Stolfo |
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes. |
AISec |
2009 |
DBLP DOI BibTeX RDF |
anomaly detection, concept drift, model update |
1 | Jessica Staddon |
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy. |
AISec |
2009 |
DBLP DOI BibTeX RDF |
linkedin, data mining, privacy, social network, policy |
1 | George Danezis |
Inferring privacy policies for social networking services. |
AISec |
2009 |
DBLP DOI BibTeX RDF |
cohesive groups, privacy, social networks |
1 | Su Chang, Thomas E. Daniels |
P2P botnet detection using behavior clustering & statistical tests. |
AISec |
2009 |
DBLP DOI BibTeX RDF |
machine learning, network security, anomaly detection |
1 | Dirk Balfanz, Jessica Staddon (eds.) |
Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009 |
AISec |
2009 |
DBLP BibTeX RDF |
|
1 | Nico Görnitz, Marius Kloft, Konrad Rieck, Ulf Brefeld |
Active learning for network intrusion detection. |
AISec |
2009 |
DBLP DOI BibTeX RDF |
machine learning, intrusion detection, network security, anomaly detection, active learning, support vector data description |
1 | Rachel Greenstadt, Sadia Afroz 0001, Michael Brennan |
Mixed-initiative security agents. |
AISec |
2009 |
DBLP DOI BibTeX RDF |
security, artificial intelligence, mixed initiative |
1 | Faraz Ahmed, Haider Hameed, M. Zubair Shafiq, Muddassar Farooq |
Using spatio-temporal information in API calls with machine learning algorithms for malware detection. |
AISec |
2009 |
DBLP DOI BibTeX RDF |
api calls, machine learning algorithms, markov chain, malware detection |
1 | Pavel Laskov, Marius Kloft |
A framework for quantitative security analysis of machine learning. |
AISec |
2009 |
DBLP DOI BibTeX RDF |
adversarial learning, centroid anomaly detection, machine learning, intrusion detection, computer security |
1 | Tad Hogg |
Security challenges for reputation mechanisms using online social networks. |
AISec |
2009 |
DBLP DOI BibTeX RDF |
social networks, reputation, user-generated content |
1 | Markus Jakobsson |
Captcha-free throttling. |
AISec |
2009 |
DBLP DOI BibTeX RDF |
cookie theft, dns poisoning, usability, access, malware, scripting, cloning, captcha, throttle |
1 | Yan Zhou, W. Meador Inge |
Malware detection using adaptive data compression. |
AISec |
2008 |
DBLP DOI BibTeX RDF |
statistical data compression, machine learning, malware detection |
1 | Patrick Gage Kelley, Paul Hankes Drielsma, Norman M. Sadeh, Lorrie Faith Cranor |
User-controllable learning of security and privacy policies. |
AISec |
2008 |
DBLP DOI BibTeX RDF |
security and privacy policies, user-controllable learning, usable security |
1 | Christopher W. Clifton |
Opportunities for private and secure machine learning. |
AISec |
2008 |
DBLP DOI BibTeX RDF |
security, privacy, artificial intelligence |
1 | Marius Kloft, Ulf Brefeld, Patrick Düssel, Christian Gehl, Pavel Laskov |
Automatic feature selection for anomaly detection. |
AISec |
2008 |
DBLP DOI BibTeX RDF |
machine learning, feature selection, intrusion detection, network security, anomaly detection, multiple kernel learning, support vector data description |
1 | Dirk Balfanz, Jessica Staddon (eds.) |
Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008 |
AISec |
2008 |
DBLP BibTeX RDF |
|
1 | Urko Zurutuza, Roberto Uribeetxeberria, Diego Zamboni |
A data mining approach for analysis of worm activity through automatic signature generation. |
AISec |
2008 |
DBLP DOI BibTeX RDF |
automatic signature generation, malware identification, data mining, intrusion detection, honeypots |
1 | Josep Lluis Berral, Nicolás Poggi, Javier Alonso 0001, Ricard Gavaldà, Jordi Torres, Manish Parashar |
Adaptive distributed mechanism against flooding network attacks based on machine learning. |
AISec |
2008 |
DBLP DOI BibTeX RDF |
DDOS, machine learning, intrusion detection, cooperative, autonomic computing, flooding attacks |
1 | Marco Barreno, Peter L. Bartlett, Fuching Jack Chi, Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, Udam Saini, J. Doug Tygar |
Open problems in the security of learning. |
AISec |
2008 |
DBLP DOI BibTeX RDF |
adversarial learning, secure learning, machine learning, computer security, security metrics |
1 | Carl E. Landwehr |
Cyber security and artificial intelligence: from fixing the plumbing to smart water. |
AISec |
2008 |
DBLP DOI BibTeX RDF |
security, privacy, artificial intelligence |
1 | Waseem Daher, Ran Canetti |
POSH: a generalized captcha with security applications. |
AISec |
2008 |
DBLP DOI BibTeX RDF |
puzzles, password security |
1 | Krishnendu Chatterjee, Luca de Alfaro, Ian Pye |
Robust content-driven reputation. |
AISec |
2008 |
DBLP DOI BibTeX RDF |
wikipedia, reputation, user-generated content |
1 | Rachel Greenstadt, Jacob Beal |
Cognitive security for personal devices. |
AISec |
2008 |
DBLP DOI BibTeX RDF |
security automation, authentication, artificial intelligence, biometrics |
Displaying result #1 - #75 of 75 (100 per page; Change: )
|
|