Sciweavers

12 search results - page 3 / 3
» Toward Large-Scale Vulnerability Discovery using Machine Lea...
Sort
View
DAGSTUHL
2003
13 years 6 months ago
Logical Languages for Data Mining
Data mining focuses on the development of methods and algorithms for such tasks as classification, clustering, rule induction, and discovery of associations. In the database fiel...
Fosca Giannotti, Giuseppe Manco, Jef Wijsen
SOUPS
2009
ACM
13 years 11 months ago
Conditioned-safe ceremonies and a user study of an application to web authentication
We introduce the notion of a conditioned-safe ceremony. A “ceremony” is similar to the conventional notion of a protocol, except that a ceremony explicitly includes human part...
Chris Karlof, J. D. Tygar, David Wagner