Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/aisec2012.bht:"
@inproceedings{DBLP:conf/ccs/AndersonSL12, author = {Blake Anderson and Curtis B. Storlie and Terran Lane}, editor = {Ting Yu and V. N. Venkatakrishan and Apu Kapadia}, title = {Improving malware classification: bridging the static/dynamic gap}, booktitle = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012}, pages = {3--14}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381896.2381900}, doi = {10.1145/2381896.2381900}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AndersonSL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChouLC12, author = {Jung{-}Wei Chou and Shou{-}De Lin and Chen{-}Mou Cheng}, editor = {Ting Yu and V. N. Venkatakrishan and Apu Kapadia}, title = {On the effectiveness of using state-of-the-art machine learning techniques to launch cryptographic distinguishing attacks}, booktitle = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012}, pages = {105--110}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381896.2381912}, doi = {10.1145/2381896.2381912}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChouLC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Gu12, author = {Guofei Gu}, editor = {Ting Yu and V. N. Venkatakrishan and Apu Kapadia}, title = {Machine learning meets social networking security: detecting and analyzing malicious social networks for fun and profit}, booktitle = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012}, pages = {1--2}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381896.2381898}, doi = {10.1145/2381896.2381898}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Gu12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KantchelianMHAJT12, author = {Alex Kantchelian and Justin Ma and Ling Huang and Sadia Afroz and Anthony D. Joseph and J. D. Tygar}, editor = {Ting Yu and V. N. Venkatakrishan and Apu Kapadia}, title = {Robust detection of comment spam using entropy rate}, booktitle = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012}, pages = {59--70}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381896.2381907}, doi = {10.1145/2381896.2381907}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KantchelianMHAJT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KruegerGKR12, author = {Tammo Krueger and Hugo Gascon and Nicole Kr{\"{a}}mer and Konrad Rieck}, editor = {Ting Yu and V. N. Venkatakrishan and Apu Kapadia}, title = {Learning stateful models for network honeypots}, booktitle = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012}, pages = {37--48}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381896.2381904}, doi = {10.1145/2381896.2381904}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KruegerGKR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SawayaKY12, author = {Yukiko Sawaya and Ayumu Kubota and Akira Yamada}, editor = {Ting Yu and V. N. Venkatakrishan and Apu Kapadia}, title = {Understanding the time-series behavioral characteristics of evolutionally advanced email spammers}, booktitle = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012}, pages = {71--80}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381896.2381908}, doi = {10.1145/2381896.2381908}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SawayaKY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SchuttKBR12, author = {Kristof Sch{\"{u}}tt and Marius Kloft and Alexander Bikadorov and Konrad Rieck}, editor = {Ting Yu and V. N. Venkatakrishan and Apu Kapadia}, title = {Early detection of malicious behavior in JavaScript code}, booktitle = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012}, pages = {15--24}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381896.2381901}, doi = {10.1145/2381896.2381901}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SchuttKBR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SchwenkBKR12, author = {Guido Schwenk and Alexander Bikadorov and Tammo Krueger and Konrad Rieck}, editor = {Ting Yu and V. N. Venkatakrishan and Apu Kapadia}, title = {Autonomous learning for detection of JavaScript attacks: vision or reality?}, booktitle = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012}, pages = {93--104}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381896.2381911}, doi = {10.1145/2381896.2381911}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SchwenkBKR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SinghWL12, author = {Anshuman Singh and Andrew Walenstein and Arun Lakhotia}, editor = {Ting Yu and V. N. Venkatakrishan and Apu Kapadia}, title = {Tracking concept drift in malware families}, booktitle = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012}, pages = {81--92}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381896.2381910}, doi = {10.1145/2381896.2381910}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SinghWL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SymonsB12, author = {Christopher T. Symons and Justin M. Beaver}, editor = {Ting Yu and V. N. Venkatakrishan and Apu Kapadia}, title = {Nonparametric semi-supervised learning for network intrusion detection: combining performance improvements with realistic in-situ training}, booktitle = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012}, pages = {49--58}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381896.2381905}, doi = {10.1145/2381896.2381905}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SymonsB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ThiS12, author = {Hoi Le Thi and Reihaneh Safavi{-}Naini}, editor = {Ting Yu and V. N. Venkatakrishan and Apu Kapadia}, title = {An information theoretic framework for web inference detection}, booktitle = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012}, pages = {25--36}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381896.2381902}, doi = {10.1145/2381896.2381902}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ThiS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2012aisec, editor = {Ting Yu and V. N. Venkatakrishan and Apu Kapadia}, title = {Proceedings of the 5th {ACM} Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012}, publisher = {{ACM}}, year = {2012}, url = {http://dl.acm.org/citation.cfm?id=2381896}, isbn = {978-1-4503-1664-4}, timestamp = {Tue, 12 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2012aisec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.