|
Conferences in DBLP
A framework for quantitative security analysis of machine learning. [Citation Graph (, )][DBLP]
Inferring privacy policies for social networking services. [Citation Graph (, )][DBLP]
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy. [Citation Graph (, )][DBLP]
Captcha-free throttling. [Citation Graph (, )][DBLP]
P2P botnet detection using behavior clustering & statistical tests. [Citation Graph (, )][DBLP]
Security challenges for reputation mechanisms using online social networks. [Citation Graph (, )][DBLP]
Mixed-initiative security agents. [Citation Graph (, )][DBLP]
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes. [Citation Graph (, )][DBLP]
Active learning for network intrusion detection. [Citation Graph (, )][DBLP]
Using spatio-temporal information in API calls with machine learning algorithms for malware detection. [Citation Graph (, )][DBLP]
|