ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings of the 3rd ACM workshop on Artificial intelligence and security - AISec '10
Latest Publications
TOTAL DOCUMENTS
10
(FIVE YEARS 0)
H-INDEX
5
(FIVE YEARS 0)
Published By ACM Press
9781450300889
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
The limits of automatic OS fingerprint generation
Proceedings of the 3rd ACM workshop on Artificial intelligence and security - AISec '10
◽
10.1145/1866423.1866430
◽
2010
◽
Cited By ~ 13
Author(s):
David W. Richardson
◽
Steven D. Gribble
◽
Tadayoshi Kohno
Keyword(s):
Os Fingerprint
Download Full-text
Eliminating routing protocol anomalies in wireless sensor networks using AI techniques
Proceedings of the 3rd ACM workshop on Artificial intelligence and security - AISec '10
◽
10.1145/1866423.1866426
◽
2010
◽
Cited By ~ 4
Author(s):
Zorana Banković
◽
Juan Carlos Vallejo
◽
Pedro Malagón
◽
Álvaro Araujo
◽
José M. Moya
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Routing Protocol
◽
Wireless Sensor
Download Full-text
Cheap and automated socio-technical attacks based on social networking sites
Proceedings of the 3rd ACM workshop on Artificial intelligence and security - AISec '10
◽
10.1145/1866423.1866435
◽
2010
◽
Cited By ~ 7
Author(s):
Markus Huber
◽
Martin Mulazzani
◽
Sebastian Schrittwieser
◽
Edgar Weippl
Keyword(s):
Social Networking
◽
Social Networking Sites
Download Full-text
Relational network-service clustering analysis with set evidences
Proceedings of the 3rd ACM workshop on Artificial intelligence and security - AISec '10
◽
10.1145/1866423.1866432
◽
2010
◽
Author(s):
Li Pu
◽
Boi Faltings
◽
Qiang Yang
◽
Derek Hao Hu
Keyword(s):
Clustering Analysis
◽
Network Service
◽
Service Clustering
◽
Relational Network
Download Full-text
Lexical feature based phishing URL detection using online learning
Proceedings of the 3rd ACM workshop on Artificial intelligence and security - AISec '10
◽
10.1145/1866423.1866434
◽
2010
◽
Cited By ~ 62
Author(s):
Aaron Blum
◽
Brad Wardman
◽
Thamar Solorio
◽
Gary Warner
Keyword(s):
Online Learning
◽
Lexical Feature
◽
Feature Based
Download Full-text
Towards modeling the behavior of physical intruders in a region monitored by a wireless sensor network
Proceedings of the 3rd ACM workshop on Artificial intelligence and security - AISec '10
◽
10.1145/1866423.1866425
◽
2010
◽
Cited By ~ 1
Author(s):
Pranav Krishnamoorthy
◽
Matthew Wright
Keyword(s):
Wireless Sensor Network
◽
Sensor Network
◽
Wireless Sensor
Download Full-text
Adjustable autonomy for cross-domain entitlement decisions
Proceedings of the 3rd ACM workshop on Artificial intelligence and security - AISec '10
◽
10.1145/1866423.1866436
◽
2010
◽
Cited By ~ 2
Author(s):
Jacob Beal
◽
Jonathan Webb
◽
Michael Atighetchi
Keyword(s):
Cross Domain
◽
Adjustable Autonomy
Download Full-text
Towards security policy decisions based on context profiling
Proceedings of the 3rd ACM workshop on Artificial intelligence and security - AISec '10
◽
10.1145/1866423.1866428
◽
2010
◽
Cited By ~ 5
Author(s):
Markus Miettinen
◽
N. Asokan
Keyword(s):
Security Policy
◽
Policy Decisions
Download Full-text
Empirical evaluation of authorship obfuscation using JGAAP
Proceedings of the 3rd ACM workshop on Artificial intelligence and security - AISec '10
◽
10.1145/1866423.1866427
◽
2010
◽
Cited By ~ 10
Author(s):
Patrick Juola
◽
Darren Vescovi
Keyword(s):
Empirical Evaluation
Download Full-text
Synthetic security policy generation via network traffic clustering
Proceedings of the 3rd ACM workshop on Artificial intelligence and security - AISec '10
◽
10.1145/1866423.1866433
◽
2010
◽
Cited By ~ 2
Author(s):
Taghrid Samak
◽
Ehab Al-Shaer
Keyword(s):
Network Traffic
◽
Security Policy
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close