-
1
-
-
0000710299
-
Queries and concept learning
-
D. Angluin. Queries and concept learning. Machine Learning, 2(4):319-342, 1988.
-
(1988)
Machine Learning
, vol.2
, Issue.4
, pp. 319-342
-
-
Angluin, D.1
-
2
-
-
0346044653
-
Learning nested differences in the presence of malicious noise
-
P. Auer. Learning nested differences in the presence of malicious noise. Theoretical Computer Science, 185(1):159-175, 1997.
-
(1997)
Theoretical Computer Science
, vol.185
, Issue.1
, pp. 159-175
-
-
Auer, P.1
-
3
-
-
33845989821
-
Can machine learning be secure?
-
M. Barreno, B. Nelson, R. Sears, A. D. Joseph, and J. D. Tygar. Can machine learning be secure? In Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2006.
-
(2006)
Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS)
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A. D.4
Tygar, J. D.5
-
4
-
-
33751056900
-
Towards automatic generation of vulnerability-based signatures
-
D. Brumley, J. Newsome, D. Song, H. Wang, and S. Jha. Towards automatic generation of vulnerability-based signatures. In Proceedings of the IEEE Symposium on Security and Privacy, 2006.
-
(2006)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
7
-
-
84885679117
-
Vigilante: End-to-end containment of internet worms
-
M. Cost, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: End-to-end containment of internet worms. In 20th ACM Symposium on Operating System Principles (SOSP 2005), 2005.
-
(2005)
20th ACM Symposium on Operating System Principles (SOSP 2005)
-
-
Cost, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
8
-
-
70450092967
-
Bouncer: Securing software by blocking bad input
-
M. Costa, M. Castro, L. Zhou, L. Zhang, and M. Peinado. Bouncer: Securing software by blocking bad input. In Proceedings of the 21st Symposium on Operating Systems Principles (SOSP '07), 2007.
-
(2007)
Proceedings of the 21st Symposium on Operating Systems Principles (SOSP '07)
-
-
Costa, M.1
Castro, M.2
Zhou, L.3
Zhang, L.4
Peinado, M.5
-
14
-
-
85077703150
-
Polymorphic blending attacks
-
P. Fogla, M. Sharif, R. Perdisci, O. Kolesnikov, and W. Lee. Polymorphic blending attacks. In Proceedings of the 15th Usenix Security Symposium (Security '06), 2006.
-
(2006)
Proceedings of the 15th Usenix Security Symposium (Security '06)
-
-
Fogla, P.1
Sharif, M.2
Perdisci, R.3
Kolesnikov, O.4
Lee, W.5
-
15
-
-
85084160549
-
Catch me, if you can: Evading network signatures with web-based polymorphic attacks
-
M. V. Gundy, D. Balzarotti, and G. Vigna. Catch me, if you can: Evading network signatures with web-based polymorphic attacks. In Proceedings of WOOT’07, 2007.
-
(2007)
Proceedings of WOOT’07
-
-
Gundy, M. V.1
Balzarotti, D.2
Vigna, G.3
-
16
-
-
0027640858
-
Learning in the presence of malicious errors
-
M. Kearns and M. Li. Learning in the presence of malicious errors. SIAM Journal on Computing, 22(4):807-837, 1993.
-
(1993)
SIAM Journal on Computing
, vol.22
, Issue.4
, pp. 807-837
-
-
Kearns, M.1
Li, M.2
-
19
-
-
33746389292
-
Polymophic worm detection using structural information of executables
-
C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna. Polymophic worm detection using structural information of executables. In Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID), 2005.
-
(2005)
Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID)
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
20
-
-
33751064824
-
Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resiliance
-
Z. Li, M. Shanghi, B. Chavez, Y. Chen, and M.-Y. Kao. Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resiliance. In Proceedings of the IEEE Symposium on Security and Privacy, 2006.
-
(2006)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Li, Z.1
Shanghi, M.2
Chavez, B.3
Chen, Y.4
Kao, M.-Y.5
-
22
-
-
34250091945
-
Learning quickly when irrelevant attributes abound: A new linear threshold algorithm
-
N. Littlestone. Learning quickly when irrelevant attributes abound: A new linear threshold algorithm. Machine Learning, 2(285-318), 1988.
-
(1988)
Machine Learning
, vol.2
, pp. 285-318
-
-
Littlestone, N.1
-
28
-
-
33751051489
-
Misleading worm signature generators using deliberate noise injection
-
R. Perdisci, D. Dagon, W. Lee, P. Fogla, and M. Sharif. Misleading worm signature generators using deliberate noise injection. In Proceedings of the IEEE Symposium on Security and Privacy, 2006.
-
(2006)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Perdisci, R.1
Dagon, D.2
Lee, W.3
Fogla, P.4
Sharif, M.5
-
30
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
G. E. Suh, J. Lee, and S. Devadas. Secure program execution via dynamic information flow tracking. In Proceedings of ASPLOS, 2004.
-
(2004)
Proceedings of ASPLOS
-
-
Suh, G. E.1
Lee, J.2
Devadas, S.3
|