


default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/aisec2010.bht:"
@inproceedings{DBLP:conf/ccs/BankovicVMAM10, author = {Zorana Bankovic and Juan Carlos Vallejo and Pedro Malag{\'{o}}n and {\'{A}}lvaro Araujo and Jos{\'{e}} Manuel Moya}, editor = {Rachel Greenstadt}, title = {Eliminating routing protocol anomalies in wireless sensor networks using {AI} techniques}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010}, pages = {8--13}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866423.1866426}, doi = {10.1145/1866423.1866426}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BankovicVMAM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BealWA10, author = {Jacob Beal and Jonathan Webb and Michael Atighetchi}, editor = {Rachel Greenstadt}, title = {Adjustable autonomy for cross-domain entitlement decisions}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010}, pages = {65--71}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866423.1866436}, doi = {10.1145/1866423.1866436}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BealWA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BlumWSW10, author = {Aaron Blum and Brad Wardman and Thamar Solorio and Gary Warner}, editor = {Rachel Greenstadt}, title = {Lexical feature based phishing {URL} detection using online learning}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010}, pages = {54--60}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866423.1866434}, doi = {10.1145/1866423.1866434}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BlumWSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuberMSW10, author = {Markus Huber and Martin Mulazzani and Sebastian Schrittwieser and Edgar R. Weippl}, editor = {Rachel Greenstadt}, title = {Cheap and automated socio-technical attacks based on social networking sites}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010}, pages = {61--64}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866423.1866435}, doi = {10.1145/1866423.1866435}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HuberMSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JuolaV10, author = {Patrick Juola and Darren Vescovi}, editor = {Rachel Greenstadt}, title = {Empirical evaluation of authorship obfuscation using {JGAAP}}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010}, pages = {14--18}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866423.1866427}, doi = {10.1145/1866423.1866427}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JuolaV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KrishnamoorthyW10, author = {Pranav Krishnamoorthy and Matthew K. Wright}, editor = {Rachel Greenstadt}, title = {Towards modeling the behavior of physical intruders in a region monitored by a wireless sensor network}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010}, pages = {1--7}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866423.1866425}, doi = {10.1145/1866423.1866425}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KrishnamoorthyW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MiettinenA10, author = {Markus Miettinen and N. Asokan}, editor = {Rachel Greenstadt}, title = {Towards security policy decisions based on context profiling}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010}, pages = {19--23}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866423.1866428}, doi = {10.1145/1866423.1866428}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MiettinenA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PuFYH10, author = {Li Pu and Boi Faltings and Qiang Yang and Derek Hao Hu}, editor = {Rachel Greenstadt}, title = {Relational network-service clustering analysis with set evidences}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010}, pages = {35--44}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866423.1866432}, doi = {10.1145/1866423.1866432}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/PuFYH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RichardsonGK10, author = {David W. Richardson and Steven D. Gribble and Tadayoshi Kohno}, editor = {Rachel Greenstadt}, title = {The limits of automatic {OS} fingerprint generation}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010}, pages = {24--34}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866423.1866430}, doi = {10.1145/1866423.1866430}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/RichardsonGK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SamakA10, author = {Taghrid Samak and Ehab Al{-}Shaer}, editor = {Rachel Greenstadt}, title = {Synthetic security policy generation via network traffic clustering}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010}, pages = {45--53}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866423.1866433}, doi = {10.1145/1866423.1866433}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SamakA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2010aisec, editor = {Rachel Greenstadt}, title = {Proceedings of the 3rd {ACM} Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010}, publisher = {{ACM}}, year = {2010}, isbn = {978-1-4503-0088-9}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2010aisec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.