


default search action
4th AISec@CCS 2011: Chicago, Illinois, USA
- Yan Chen, Alvaro A. Cárdenas, Rachel Greenstadt, Benjamin I. P. Rubinstein:

Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011. ACM 2011, ISBN 978-1-4503-1003-1
Web content reputation
- Sushma Nagesh Bannur, Lawrence K. Saul, Stefan Savage:

Judging a site by its content: learning the textual, structural, and visual features of malicious web pages. 1-10 - Do-kyum Kim, Marti Motoyama, Geoffrey M. Voelker, Lawrence K. Saul:

Topic modeling of freelance job postings to monitor web service abuse. 11-20
Malware
- Lakshmanan Nataraj, Vinod Yegneswaran, Phillip A. Porras, Jian Zhang:

A comparative assessment of malware classification using binary texture analysis and dynamic analysis. 21-30 - Sandeep Karanth, Srivatsan Laxman, Prasad Naldurg, Ramarathnam Venkatesan, John Lambert, Jinwook Shin:

ZDVUE: prioritization of javascript attacks to discover new vulnerabilities. 31-42
Invited paper
- Ling Huang, Anthony D. Joseph

, Blaine Nelson, Benjamin I. P. Rubinstein
, J. D. Tygar:
Adversarial machine learning. 43-58
Intrusion detection and security primitives
- Loai Zomlot, Sathya Chandran Sundaramurthy, Kui Luo, Xinming Ou, Siva Raj Rajagopalan:

Prioritizing intrusion analysis using Dempster-Shafer theory. 59-70 - Carlos Sarraute

, Gerardo Richarte, Jorge Lucángeli Obes:
An algorithm to find optimal attack paths in nondeterministic scenarios. 71-80 - Meltem Sönmez Turan:

Evolutionary construction of de bruijn sequences. 81-86
Position papers
- Blaine Nelson, Battista Biggio

, Pavel Laskov:
Understanding the risk factors of learning in adversarial environments. 87-92 - Benoit Morel:

Artificial intelligence and the future of cybersecurity. 93-98 - Davide Ariu

, Giorgio Giacinto
, Fabio Roli
:
Machine learning in computer forensics (and the lessons learned from machine learning in computer security). 99-104
Posters
- David A. Cock

:
Exploitation as an inference problem. 105-106 - Sajad Shirali-Shahreza, Mohammad Hassan Shirali-Shahreza:

Categorizing CAPTCHA. 107-108 - Sajad Shirali-Shahreza, Mohammad Hassan Shirali-Shahreza

:
Accessibility of CAPTCHA methods. 109-110 - Qifan Wang, Luo Si:

A robust one-class bayesian approach for masquerade detection. 111-112 - Anshuman Singh, Sumi Singh, Andrew Walenstein, Arun Lakhotia:

On deployable adversarial classification models. 113-114

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














