ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings of the 4th ACM workshop on Security and artificial intelligence - AISec '11
Latest Publications
TOTAL DOCUMENTS
16
(FIVE YEARS 0)
H-INDEX
7
(FIVE YEARS 0)
Published By ACM Press
9781450310031
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
A robust one-class bayesian approach for masquerade detection
Proceedings of the 4th ACM workshop on Security and artificial intelligence - AISec '11
◽
10.1145/2046684.2046705
◽
2011
◽
Cited By ~ 2
Author(s):
Qifan Wang
◽
Luo Si
Keyword(s):
Bayesian Approach
◽
Masquerade Detection
Download Full-text
An algorithm to find optimal attack paths in nondeterministic scenarios
Proceedings of the 4th ACM workshop on Security and artificial intelligence - AISec '11
◽
10.1145/2046684.2046695
◽
2011
◽
Cited By ~ 15
Author(s):
Carlos Sarraute
◽
Gerardo Richarte
◽
Jorge Lucángeli Obes
Download Full-text
Exploitation as an inference problem
Proceedings of the 4th ACM workshop on Security and artificial intelligence - AISec '11
◽
10.1145/2046684.2046702
◽
2011
◽
Cited By ~ 1
Author(s):
David A. Cock
Keyword(s):
Inference Problem
Download Full-text
On deployable adversarial classification models
Proceedings of the 4th ACM workshop on Security and artificial intelligence - AISec '11
◽
10.1145/2046684.2046706
◽
2011
◽
Author(s):
Anshuman Singh
◽
Sumi Singh
◽
Andrew Walenstein
◽
Arun Lakhotia
Keyword(s):
Classification Models
◽
Adversarial Classification
Download Full-text
Understanding the risk factors of learning in adversarial environments
Proceedings of the 4th ACM workshop on Security and artificial intelligence - AISec '11
◽
10.1145/2046684.2046698
◽
2011
◽
Cited By ~ 5
Author(s):
Blaine Nelson
◽
Battista Biggio
◽
Pavel Laskov
Keyword(s):
Risk Factors
◽
Adversarial Environments
Download Full-text
A comparative assessment of malware classification using binary texture analysis and dynamic analysis
Proceedings of the 4th ACM workshop on Security and artificial intelligence - AISec '11
◽
10.1145/2046684.2046689
◽
2011
◽
Cited By ~ 71
Author(s):
Lakshmanan Nataraj
◽
Vinod Yegneswaran
◽
Phillip Porras
◽
Jian Zhang
Keyword(s):
Dynamic Analysis
◽
Texture Analysis
◽
Comparative Assessment
◽
Malware Classification
Download Full-text
Prioritizing intrusion analysis using Dempster-Shafer theory
Proceedings of the 4th ACM workshop on Security and artificial intelligence - AISec '11
◽
10.1145/2046684.2046694
◽
2011
◽
Cited By ~ 16
Author(s):
Loai Zomlot
◽
Sathya Chandran Sundaramurthy
◽
Kui Luo
◽
Xinming Ou
◽
S. Raj Rajagopalan
Keyword(s):
Dempster Shafer Theory
◽
Shafer Theory
Download Full-text
Topic modeling of freelance job postings to monitor web service abuse
Proceedings of the 4th ACM workshop on Security and artificial intelligence - AISec '11
◽
10.1145/2046684.2046687
◽
2011
◽
Cited By ~ 4
Author(s):
Do-kyum Kim
◽
Marti Motoyama
◽
Geoffrey M. Voelker
◽
Lawrence K. Saul
Keyword(s):
Web Service
◽
Topic Modeling
◽
Job Postings
Download Full-text
Artificial intelligence and the future of cybersecurity
Proceedings of the 4th ACM workshop on Security and artificial intelligence - AISec '11
◽
10.1145/2046684.2046699
◽
2011
◽
Cited By ~ 12
Author(s):
Benoit Morel
Keyword(s):
Artificial Intelligence
◽
The Future
Download Full-text
ZDVUE
Proceedings of the 4th ACM workshop on Security and artificial intelligence - AISec '11
◽
10.1145/2046684.2046690
◽
2011
◽
Cited By ~ 2
Author(s):
Sandeep Karanth
◽
Srivatsan Laxman
◽
Prasad Naldurg
◽
Ramarathnam Venkatesan
◽
J. Lambert
◽
...
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close