Search dblp for Publications

export results for "toc:db/conf/ccs/aisec2012.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ccs/AndersonSL12,
  author       = {Blake Anderson and
                  Curtis B. Storlie and
                  Terran Lane},
  editor       = {Ting Yu and
                  V. N. Venkatakrishan and
                  Apu Kapadia},
  title        = {Improving malware classification: bridging the static/dynamic gap},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2012, Raleigh, NC, USA, October 19, 2012},
  pages        = {3--14},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381896.2381900},
  doi          = {10.1145/2381896.2381900},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AndersonSL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChouLC12,
  author       = {Jung{-}Wei Chou and
                  Shou{-}De Lin and
                  Chen{-}Mou Cheng},
  editor       = {Ting Yu and
                  V. N. Venkatakrishan and
                  Apu Kapadia},
  title        = {On the effectiveness of using state-of-the-art machine learning techniques
                  to launch cryptographic distinguishing attacks},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2012, Raleigh, NC, USA, October 19, 2012},
  pages        = {105--110},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381896.2381912},
  doi          = {10.1145/2381896.2381912},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChouLC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Gu12,
  author       = {Guofei Gu},
  editor       = {Ting Yu and
                  V. N. Venkatakrishan and
                  Apu Kapadia},
  title        = {Machine learning meets social networking security: detecting and analyzing
                  malicious social networks for fun and profit},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2012, Raleigh, NC, USA, October 19, 2012},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381896.2381898},
  doi          = {10.1145/2381896.2381898},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Gu12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KantchelianMHAJT12,
  author       = {Alex Kantchelian and
                  Justin Ma and
                  Ling Huang and
                  Sadia Afroz and
                  Anthony D. Joseph and
                  J. D. Tygar},
  editor       = {Ting Yu and
                  V. N. Venkatakrishan and
                  Apu Kapadia},
  title        = {Robust detection of comment spam using entropy rate},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2012, Raleigh, NC, USA, October 19, 2012},
  pages        = {59--70},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381896.2381907},
  doi          = {10.1145/2381896.2381907},
  timestamp    = {Wed, 28 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KantchelianMHAJT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KruegerGKR12,
  author       = {Tammo Krueger and
                  Hugo Gascon and
                  Nicole Kr{\"{a}}mer and
                  Konrad Rieck},
  editor       = {Ting Yu and
                  V. N. Venkatakrishan and
                  Apu Kapadia},
  title        = {Learning stateful models for network honeypots},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2012, Raleigh, NC, USA, October 19, 2012},
  pages        = {37--48},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381896.2381904},
  doi          = {10.1145/2381896.2381904},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KruegerGKR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SawayaKY12,
  author       = {Yukiko Sawaya and
                  Ayumu Kubota and
                  Akira Yamada},
  editor       = {Ting Yu and
                  V. N. Venkatakrishan and
                  Apu Kapadia},
  title        = {Understanding the time-series behavioral characteristics of evolutionally
                  advanced email spammers},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2012, Raleigh, NC, USA, October 19, 2012},
  pages        = {71--80},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381896.2381908},
  doi          = {10.1145/2381896.2381908},
  timestamp    = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SawayaKY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SchuttKBR12,
  author       = {Kristof Sch{\"{u}}tt and
                  Marius Kloft and
                  Alexander Bikadorov and
                  Konrad Rieck},
  editor       = {Ting Yu and
                  V. N. Venkatakrishan and
                  Apu Kapadia},
  title        = {Early detection of malicious behavior in JavaScript code},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2012, Raleigh, NC, USA, October 19, 2012},
  pages        = {15--24},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381896.2381901},
  doi          = {10.1145/2381896.2381901},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SchuttKBR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SchwenkBKR12,
  author       = {Guido Schwenk and
                  Alexander Bikadorov and
                  Tammo Krueger and
                  Konrad Rieck},
  editor       = {Ting Yu and
                  V. N. Venkatakrishan and
                  Apu Kapadia},
  title        = {Autonomous learning for detection of JavaScript attacks: vision or
                  reality?},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2012, Raleigh, NC, USA, October 19, 2012},
  pages        = {93--104},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381896.2381911},
  doi          = {10.1145/2381896.2381911},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SchwenkBKR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SinghWL12,
  author       = {Anshuman Singh and
                  Andrew Walenstein and
                  Arun Lakhotia},
  editor       = {Ting Yu and
                  V. N. Venkatakrishan and
                  Apu Kapadia},
  title        = {Tracking concept drift in malware families},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2012, Raleigh, NC, USA, October 19, 2012},
  pages        = {81--92},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381896.2381910},
  doi          = {10.1145/2381896.2381910},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SinghWL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SymonsB12,
  author       = {Christopher T. Symons and
                  Justin M. Beaver},
  editor       = {Ting Yu and
                  V. N. Venkatakrishan and
                  Apu Kapadia},
  title        = {Nonparametric semi-supervised learning for network intrusion detection:
                  combining performance improvements with realistic in-situ training},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2012, Raleigh, NC, USA, October 19, 2012},
  pages        = {49--58},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381896.2381905},
  doi          = {10.1145/2381896.2381905},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SymonsB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ThiS12,
  author       = {Hoi Le Thi and
                  Reihaneh Safavi{-}Naini},
  editor       = {Ting Yu and
                  V. N. Venkatakrishan and
                  Apu Kapadia},
  title        = {An information theoretic framework for web inference detection},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2012, Raleigh, NC, USA, October 19, 2012},
  pages        = {25--36},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381896.2381902},
  doi          = {10.1145/2381896.2381902},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ThiS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2012aisec,
  editor       = {Ting Yu and
                  V. N. Venkatakrishan and
                  Apu Kapadia},
  title        = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2012, Raleigh, NC, USA, October 19, 2012},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {http://dl.acm.org/citation.cfm?id=2381896},
  isbn         = {978-1-4503-1664-4},
  timestamp    = {Tue, 12 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2012aisec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics