The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
2008 (conf/ccs/2008aisec)

  1. POSH: a generalized captcha with security applications. [Citation Graph (, )][DBLP]

  2. User-controllable learning of security and privacy policies. [Citation Graph (, )][DBLP]

  3. Open problems in the security of learning. [Citation Graph (, )][DBLP]

  4. Cognitive security for personal devices. [Citation Graph (, )][DBLP]

  5. Opportunities for private and secure machine learning. [Citation Graph (, )][DBLP]

  6. Robust content-driven reputation. [Citation Graph (, )][DBLP]

  7. Adaptive distributed mechanism against flooding network attacks based on machine learning. [Citation Graph (, )][DBLP]

  8. Cyber security and artificial intelligence: from fixing the plumbing to smart water. [Citation Graph (, )][DBLP]

  9. Malware detection using adaptive data compression. [Citation Graph (, )][DBLP]

  10. A data mining approach for analysis of worm activity through automatic signature generation. [Citation Graph (, )][DBLP]

  11. Automatic feature selection for anomaly detection. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002