The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
2009 (conf/ccs/2009aisec)


  1. A framework for quantitative security analysis of machine learning. [Citation Graph (, )][DBLP]


  2. Inferring privacy policies for social networking services. [Citation Graph (, )][DBLP]


  3. Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy. [Citation Graph (, )][DBLP]


  4. Captcha-free throttling. [Citation Graph (, )][DBLP]


  5. P2P botnet detection using behavior clustering & statistical tests. [Citation Graph (, )][DBLP]


  6. Security challenges for reputation mechanisms using online social networks. [Citation Graph (, )][DBLP]


  7. Mixed-initiative security agents. [Citation Graph (, )][DBLP]


  8. Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes. [Citation Graph (, )][DBLP]


  9. Active learning for network intrusion detection. [Citation Graph (, )][DBLP]


  10. Using spatio-temporal information in API calls with machine learning algorithms for malware detection. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002