


default search action
3rd AISec 2010: Chicago, Illinois, USA
- Rachel Greenstadt:

Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010. ACM 2010, ISBN 978-1-4503-0088-9
Wireless security and position papers 1
- Pranav Krishnamoorthy, Matthew K. Wright

:
Towards modeling the behavior of physical intruders in a region monitored by a wireless sensor network. 1-7 - Zorana Bankovic, Juan Carlos Vallejo, Pedro Malagón, Álvaro Araujo

, José Manuel Moya
:
Eliminating routing protocol anomalies in wireless sensor networks using AI techniques. 8-13 - Patrick Juola, Darren Vescovi:

Empirical evaluation of authorship obfuscation using JGAAP. 14-18 - Markus Miettinen, N. Asokan

:
Towards security policy decisions based on context profiling. 19-23
Keynote address and session 2
- David W. Richardson, Steven D. Gribble

, Tadayoshi Kohno:
The limits of automatic OS fingerprint generation. 24-34
Network security and position papers 2
- Li Pu, Boi Faltings, Qiang Yang, Derek Hao Hu:

Relational network-service clustering analysis with set evidences. 35-44 - Taghrid Samak, Ehab Al-Shaer:

Synthetic security policy generation via network traffic clustering. 45-53 - Aaron Blum, Brad Wardman, Thamar Solorio, Gary Warner:

Lexical feature based phishing URL detection using online learning. 54-60 - Markus Huber

, Martin Mulazzani, Sebastian Schrittwieser, Edgar R. Weippl:
Cheap and automated socio-technical attacks based on social networking sites. 61-64 - Jacob Beal

, Jonathan Webb, Michael Atighetchi:
Adjustable autonomy for cross-domain entitlement decisions. 65-71

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














