Search dblp for Publications

export results for "toc:db/conf/ccs/aisec2010.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ccs/BankovicVMAM10,
  author       = {Zorana Bankovic and
                  Juan Carlos Vallejo and
                  Pedro Malag{\'{o}}n and
                  {\'{A}}lvaro Araujo and
                  Jos{\'{e}} Manuel Moya},
  editor       = {Rachel Greenstadt},
  title        = {Eliminating routing protocol anomalies in wireless sensor networks
                  using {AI} techniques},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2010, Chicago, Illinois, USA, October 8, 2010},
  pages        = {8--13},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866423.1866426},
  doi          = {10.1145/1866423.1866426},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BankovicVMAM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BealWA10,
  author       = {Jacob Beal and
                  Jonathan Webb and
                  Michael Atighetchi},
  editor       = {Rachel Greenstadt},
  title        = {Adjustable autonomy for cross-domain entitlement decisions},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2010, Chicago, Illinois, USA, October 8, 2010},
  pages        = {65--71},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866423.1866436},
  doi          = {10.1145/1866423.1866436},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BealWA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BlumWSW10,
  author       = {Aaron Blum and
                  Brad Wardman and
                  Thamar Solorio and
                  Gary Warner},
  editor       = {Rachel Greenstadt},
  title        = {Lexical feature based phishing {URL} detection using online learning},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2010, Chicago, Illinois, USA, October 8, 2010},
  pages        = {54--60},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866423.1866434},
  doi          = {10.1145/1866423.1866434},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BlumWSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HuberMSW10,
  author       = {Markus Huber and
                  Martin Mulazzani and
                  Sebastian Schrittwieser and
                  Edgar R. Weippl},
  editor       = {Rachel Greenstadt},
  title        = {Cheap and automated socio-technical attacks based on social networking
                  sites},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2010, Chicago, Illinois, USA, October 8, 2010},
  pages        = {61--64},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866423.1866435},
  doi          = {10.1145/1866423.1866435},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HuberMSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JuolaV10,
  author       = {Patrick Juola and
                  Darren Vescovi},
  editor       = {Rachel Greenstadt},
  title        = {Empirical evaluation of authorship obfuscation using {JGAAP}},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2010, Chicago, Illinois, USA, October 8, 2010},
  pages        = {14--18},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866423.1866427},
  doi          = {10.1145/1866423.1866427},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JuolaV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KrishnamoorthyW10,
  author       = {Pranav Krishnamoorthy and
                  Matthew K. Wright},
  editor       = {Rachel Greenstadt},
  title        = {Towards modeling the behavior of physical intruders in a region monitored
                  by a wireless sensor network},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2010, Chicago, Illinois, USA, October 8, 2010},
  pages        = {1--7},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866423.1866425},
  doi          = {10.1145/1866423.1866425},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KrishnamoorthyW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MiettinenA10,
  author       = {Markus Miettinen and
                  N. Asokan},
  editor       = {Rachel Greenstadt},
  title        = {Towards security policy decisions based on context profiling},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2010, Chicago, Illinois, USA, October 8, 2010},
  pages        = {19--23},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866423.1866428},
  doi          = {10.1145/1866423.1866428},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MiettinenA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PuFYH10,
  author       = {Li Pu and
                  Boi Faltings and
                  Qiang Yang and
                  Derek Hao Hu},
  editor       = {Rachel Greenstadt},
  title        = {Relational network-service clustering analysis with set evidences},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2010, Chicago, Illinois, USA, October 8, 2010},
  pages        = {35--44},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866423.1866432},
  doi          = {10.1145/1866423.1866432},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/PuFYH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RichardsonGK10,
  author       = {David W. Richardson and
                  Steven D. Gribble and
                  Tadayoshi Kohno},
  editor       = {Rachel Greenstadt},
  title        = {The limits of automatic {OS} fingerprint generation},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2010, Chicago, Illinois, USA, October 8, 2010},
  pages        = {24--34},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866423.1866430},
  doi          = {10.1145/1866423.1866430},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/RichardsonGK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SamakA10,
  author       = {Taghrid Samak and
                  Ehab Al{-}Shaer},
  editor       = {Rachel Greenstadt},
  title        = {Synthetic security policy generation via network traffic clustering},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2010, Chicago, Illinois, USA, October 8, 2010},
  pages        = {45--53},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866423.1866433},
  doi          = {10.1145/1866423.1866433},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SamakA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2010aisec,
  editor       = {Rachel Greenstadt},
  title        = {Proceedings of the 3rd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2010, Chicago, Illinois, USA, October 8, 2010},
  publisher    = {{ACM}},
  year         = {2010},
  isbn         = {978-1-4503-0088-9},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2010aisec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics