Sciweavers

3556 search results - page 175 / 712
» Can machine learning be secure
Sort
View
96
Voted
CSREASAM
2004
15 years 2 months ago
The Key Authority - Secure Key Management in Hierarchical Public Key Infrastructures
We model a private key's life cycle as a finite state machine. The states are the key's phases of life and the transition functions describe tasks to be done with the key...
Alexander Wiesmaier, Marcus Lippert, Vangelis Kara...
SIGCSE
2009
ACM
149views Education» more  SIGCSE 2009»
16 years 1 months ago
GINI: a user-level toolkit for creating micro internets for teaching & learning computer networking
GINI (GINI Is Not Internet) is an open-source toolkit for creating virtual micro Internets for teaching and learning computer networking. It provides lightweight virtual elements ...
Muthucumaru Maheswaran, Alexis Malozemoff, Daniel ...
ICML
1996
IEEE
16 years 1 months ago
Learning Relational Concepts with Decision Trees
In this paper, we describe two di erent learning tasks for relational structures. When learning a classi er for structures, the relational structures in the training sets are clas...
Peter Geibel, Fritz Wysotzki
95
Voted
CCS
2007
ACM
15 years 6 months ago
Keystroke statistical learning model for web authentication
Keystroke typing characteristics is considered as one of the important biometric features that can be used to protect users against malicious attacks. In this paper we propose a s...
Cheng-Huang Jiang, Shiuhpyng Shieh, Jen-Chien Liu
111
Voted
RAID
2009
Springer
15 years 7 months ago
Protecting a Moving Target: Addressing Web Application Concept Drift
Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The re...
Federico Maggi, William K. Robertson, Christopher ...