Sciweavers

619 search results - page 23 / 124
» Learning with Security
Sort
View
93
Voted
JCS
2011
138views more  JCS 2011»
14 years 11 days ago
Automatic analysis of malware behavior using machine learning
Malicious software—so called malware—poses a major threat to the security of computer systems. The amount and diversity of its variants render classic security defenses ineffe...
Konrad Rieck, Philipp Trinius, Carsten Willems, Th...
DIMVA
2010
14 years 11 months ago
Organizing Large Scale Hacking Competitions
Computer security competitions and challenges are a way to foster innovation and educate students in a highly-motivating setting. In recent years, a number of different security co...
Nicholas Childers, Bryce Boe, Lorenzo Cavallaro, L...
RFIDSEC
2010
14 years 7 months ago
Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly
Authentication for low-cost Radio-Frequency IDentification (RFID) is a booming research topic. The challenge is to develop secure protocols using lightweight cryptography, yet ensu...
Gildas Avoine, Benjamin Martin 0002, Tania Martin
AGENTS
2001
Springer
15 years 2 months ago
Learning structured reactive navigation plans from executing MDP navigation policies
Autonomous robots, such as robot office couriers, need navigation routines that support flexible task execution and effective action planning. This paper describes XFRMLEARN, a s...
Michael Beetz, Thorsten Belker
AGENTS
1997
Springer
15 years 1 months ago
Neo: Learning Conceptual Knowledge by Sensorimotor Interaction with an Environment
Recent developments in philosophy, linguistics, developmental psychology and arti cial intelligence make it possible to envision a developmental path for an arti cial agent, groun...
Paul R. Cohen, Marc S. Atkin, Tim Oates, Carole R....