메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Limits of Learning-based Signature Generation with Adversaries

Author keywords

[No Author keywords available]

Indexed keywords

EXTRACTION; NETWORK SECURITY;

EID: 85180803572     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (34)

References (33)
  • 1
    • 0000710299 scopus 로고
    • Queries and concept learning
    • D. Angluin. Queries and concept learning. Machine Learning, 2(4):319-342, 1988.
    • (1988) Machine Learning , vol.2 , Issue.4 , pp. 319-342
    • Angluin, D.1
  • 2
    • 0346044653 scopus 로고    scopus 로고
    • Learning nested differences in the presence of malicious noise
    • P. Auer. Learning nested differences in the presence of malicious noise. Theoretical Computer Science, 185(1):159-175, 1997.
    • (1997) Theoretical Computer Science , vol.185 , Issue.1 , pp. 159-175
    • Auer, P.1
  • 15
    • 85084160549 scopus 로고    scopus 로고
    • Catch me, if you can: Evading network signatures with web-based polymorphic attacks
    • M. V. Gundy, D. Balzarotti, and G. Vigna. Catch me, if you can: Evading network signatures with web-based polymorphic attacks. In Proceedings of WOOT’07, 2007.
    • (2007) Proceedings of WOOT’07
    • Gundy, M. V.1    Balzarotti, D.2    Vigna, G.3
  • 16
    • 0027640858 scopus 로고
    • Learning in the presence of malicious errors
    • M. Kearns and M. Li. Learning in the presence of malicious errors. SIAM Journal on Computing, 22(4):807-837, 1993.
    • (1993) SIAM Journal on Computing , vol.22 , Issue.4 , pp. 807-837
    • Kearns, M.1    Li, M.2
  • 22
    • 34250091945 scopus 로고
    • Learning quickly when irrelevant attributes abound: A new linear threshold algorithm
    • N. Littlestone. Learning quickly when irrelevant attributes abound: A new linear threshold algorithm. Machine Learning, 2(285-318), 1988.
    • (1988) Machine Learning , vol.2 , pp. 285-318
    • Littlestone, N.1
  • 30
    • 12844267418 scopus 로고    scopus 로고
    • Secure program execution via dynamic information flow tracking
    • G. E. Suh, J. Lee, and S. Devadas. Secure program execution via dynamic information flow tracking. In Proceedings of ASPLOS, 2004.
    • (2004) Proceedings of ASPLOS
    • Suh, G. E.1    Lee, J.2    Devadas, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.