default search action
3rd AISec 2010: Chicago, Illinois, USA
- Rachel Greenstadt:
Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010. ACM 2010, ISBN 978-1-4503-0088-9
Wireless security and position papers 1
- Pranav Krishnamoorthy, Matthew K. Wright:
Towards modeling the behavior of physical intruders in a region monitored by a wireless sensor network. 1-7 - Zorana Bankovic, Juan Carlos Vallejo, Pedro Malagón, Álvaro Araujo, José Manuel Moya:
Eliminating routing protocol anomalies in wireless sensor networks using AI techniques. 8-13 - Patrick Juola, Darren Vescovi:
Empirical evaluation of authorship obfuscation using JGAAP. 14-18 - Markus Miettinen, N. Asokan:
Towards security policy decisions based on context profiling. 19-23
Keynote address and session 2
- David W. Richardson, Steven D. Gribble, Tadayoshi Kohno:
The limits of automatic OS fingerprint generation. 24-34
Network security and position papers 2
- Li Pu, Boi Faltings, Qiang Yang, Derek Hao Hu:
Relational network-service clustering analysis with set evidences. 35-44 - Taghrid Samak, Ehab Al-Shaer:
Synthetic security policy generation via network traffic clustering. 45-53 - Aaron Blum, Brad Wardman, Thamar Solorio, Gary Warner:
Lexical feature based phishing URL detection using online learning. 54-60 - Markus Huber, Martin Mulazzani, Sebastian Schrittwieser, Edgar R. Weippl:
Cheap and automated socio-technical attacks based on social networking sites. 61-64 - Jacob Beal, Jonathan Webb, Michael Atighetchi:
Adjustable autonomy for cross-domain entitlement decisions. 65-71
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.