Login / Signup
AISec
2008
2013
2008
2013
Keyphrases
Publications
2013
David Stevens
,
Daniel Lowd
On the hardness of evading combinations of linear classifiers.
AISec
(2013)
Hugo Gascon
,
Fabian Yamaguchi
,
Daniel Arp
,
Konrad Rieck
Structural detection of android malware using embedded call graphs.
AISec
(2013)
Konrad Rieck
Off the beaten path: machine learning for offensive security.
AISec
(2013)
Arunesh Sinha
,
Yan Li
,
Lujo Bauer
What you want is not what you get: predicting sharing policies for text-based content on facebook.
AISec
(2013)
David Mandell Freeman
Using naive bayes to detect spammy names in social networks.
AISec
(2013)
Eitan Menahem
,
Yuval Elovici
,
Nir Amar
,
Gabi Nakibly
ACTIDS: an active strategy for detecting and localizing network attacks.
AISec
(2013)
Christian Wressnegger
,
Guido Schwenk
,
Daniel Arp
,
Konrad Rieck
-grams in intrusion detection: anomaly detection vs. classification.
AISec
(2013)
Anna Leontjeva
,
Moisés Goldszmidt
,
Yinglian Xie
,
Fang Yu
,
Martín Abadi
Early security classification of skype users via machine learning.
AISec
(2013)
Jeremiah Blocki
,
Manuel Blum
,
Anupam Datta
GOTCHA password hackers!
AISec
(2013)
AISec'13, Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, Co-located with CCS 2013, Berlin, Germany, November 4, 2013
AISec
(2013)
Battista Biggio
,
Ignazio Pillai
,
Samuel Rota Bulò
,
Davide Ariu
,
Marcello Pelillo
,
Fabio Roli
Is data clustering in adversarial settings secure?
AISec
(2013)
Alex Kantchelian
,
Sadia Afroz
,
Ling Huang
,
Aylin Caliskan Islam
,
Brad Miller
,
Michael Carl Tschantz
,
Rachel Greenstadt
,
Anthony D. Joseph
,
J. D. Tygar
Approaches to adversarial drift.
AISec
(2013)
2012
Guido Schwenk
,
Alexander Bikadorov
,
Tammo Krueger
,
Konrad Rieck
Autonomous learning for detection of JavaScript attacks: vision or reality?
AISec
(2012)
Alex Kantchelian
,
Justin Ma
,
Ling Huang
,
Sadia Afroz
,
Anthony D. Joseph
,
J. D. Tygar
Robust detection of comment spam using entropy rate.
AISec
(2012)
Anshuman Singh
,
Andrew Walenstein
,
Arun Lakhotia
Tracking concept drift in malware families.
AISec
(2012)
Kristof Schütt
,
Marius Kloft
,
Alexander Bikadorov
,
Konrad Rieck
Early detection of malicious behavior in JavaScript code.
AISec
(2012)
Blake Anderson
,
Curtis B. Storlie
,
Terran Lane
Improving malware classification: bridging the static/dynamic gap.
AISec
(2012)
Yukiko Sawaya
,
Ayumu Kubota
,
Akira Yamada
Understanding the time-series behavioral characteristics of evolutionally advanced email spammers.
AISec
(2012)
Guofei Gu
Machine learning meets social networking security: detecting and analyzing malicious social networks for fun and profit.
AISec
(2012)
Hoi Le Thi
,
Reihaneh Safavi-Naini
An information theoretic framework for web inference detection.
AISec
(2012)
Jung-Wei Chou
,
Shou-De Lin
,
Chen-Mou Cheng
On the effectiveness of using state-of-the-art machine learning techniques to launch cryptographic distinguishing attacks.
AISec
(2012)
Christopher T. Symons
,
Justin M. Beaver
Nonparametric semi-supervised learning for network intrusion detection: combining performance improvements with realistic in-situ training.
AISec
(2012)
Tammo Krueger
,
Hugo Gascon
,
Nicole Krämer
,
Konrad Rieck
Learning stateful models for network honeypots.
AISec
(2012)
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, AISec 2012, Raleigh, NC, USA, October 19, 2012
AISec
(2012)
2011
Sajad Shirali-Shahreza
,
Mohammad Hassan Shirali-Shahreza
Accessibility of CAPTCHA methods.
AISec
(2011)
Blaine Nelson
,
Battista Biggio
,
Pavel Laskov
Understanding the risk factors of learning in adversarial environments.
AISec
(2011)
Anshuman Singh
,
Sumi Singh
,
Andrew Walenstein
,
Arun Lakhotia
On deployable adversarial classification models.
AISec
(2011)
Sushma Nagesh Bannur
,
Lawrence K. Saul
,
Stefan Savage
Judging a site by its content: learning the textual, structural, and visual features of malicious web pages.
AISec
(2011)
Lakshmanan Nataraj
,
Vinod Yegneswaran
,
Phillip A. Porras
,
Jian Zhang
A comparative assessment of malware classification using binary texture analysis and dynamic analysis.
AISec
(2011)
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, AISec 2011, Chicago, IL, USA, October 21, 2011
AISec
(2011)
Sandeep Karanth
,
Srivatsan Laxman
,
Prasad Naldurg
,
Ramarathnam Venkatesan
,
John Lambert
,
Jinwook Shin
ZDVUE: prioritization of javascript attacks to discover new vulnerabilities.
AISec
(2011)
Benoit Morel
Artificial intelligence and the future of cybersecurity.
AISec
(2011)
Carlos Sarraute
,
Gerardo Richarte
,
Jorge Lucángeli Obes
An algorithm to find optimal attack paths in nondeterministic scenarios.
AISec
(2011)
David A. Cock
Exploitation as an inference problem.
AISec
(2011)
Qifan Wang
,
Luo Si
A robust one-class bayesian approach for masquerade detection.
AISec
(2011)
Loai Zomlot
,
Sathya Chandran Sundaramurthy
,
Kui Luo
,
Xinming Ou
,
Siva Raj Rajagopalan
Prioritizing intrusion analysis using Dempster-Shafer theory.
AISec
(2011)
Ling Huang
,
Anthony D. Joseph
,
Blaine Nelson
,
Benjamin I. P. Rubinstein
,
J. D. Tygar
Adversarial machine learning.
AISec
(2011)
Meltem Sönmez Turan
Evolutionary construction of de bruijn sequences.
AISec
(2011)
Do-kyum Kim
,
Marti Motoyama
,
Geoffrey M. Voelker
,
Lawrence K. Saul
Topic modeling of freelance job postings to monitor web service abuse.
AISec
(2011)
Davide Ariu
,
Giorgio Giacinto
,
Fabio Roli
Machine learning in computer forensics (and the lessons learned from machine learning in computer security).
AISec
(2011)
Sajad Shirali-Shahreza
,
Mohammad Hassan Shirali-Shahreza
Categorizing CAPTCHA.
AISec
(2011)
2010
Aaron Blum
,
Brad Wardman
,
Thamar Solorio
,
Gary Warner
Lexical feature based phishing URL detection using online learning.
AISec
(2010)
Pranav Krishnamoorthy
,
Matthew K. Wright
Towards modeling the behavior of physical intruders in a region monitored by a wireless sensor network.
AISec
(2010)
Jacob Beal
,
Jonathan Webb
,
Michael Atighetchi
Adjustable autonomy for cross-domain entitlement decisions.
AISec
(2010)
Li Pu
,
Boi Faltings
,
Qiang Yang
,
Derek Hao Hu
Relational network-service clustering analysis with set evidences.
AISec
(2010)
Zorana Bankovic
,
Juan Carlos Vallejo
,
Pedro Malagón
,
Álvaro Araujo
,
José Manuel Moya
Eliminating routing protocol anomalies in wireless sensor networks using AI techniques.
AISec
(2010)
Markus Huber
,
Martin Mulazzani
,
Sebastian Schrittwieser
,
Edgar R. Weippl
Cheap and automated socio-technical attacks based on social networking sites.
AISec
(2010)
Taghrid Samak
,
Ehab Al-Shaer
Synthetic security policy generation via network traffic clustering.
AISec
(2010)
Markus Miettinen
,
N. Asokan
Towards security policy decisions based on context profiling.
AISec
(2010)
Patrick Juola
,
Darren Vescovi
Empirical evaluation of authorship obfuscation using JGAAP.
AISec
(2010)